All Security Breaches and Attacks articles – Page 18

  • Cyber-security-e1453217189792-470x267
    Feature

    10 ways cybersecurity will evolve in the next five years

    2018-01-01T17:26:00Z

    Looking back just 10 years, the cyber threat landscape is almost unrecognisable. Back then most IT security threats were unsophisticated malware programs (mostly viruses, worms or trojans) written by people whose main aim was simply to cause trouble.

  • Data masking hacker
    Feature

    Data masking: Anonymisation or pseudonymisation?

    Among the arsenal of IT security techniques available, pseudonymisation or anonymisation is highly recommended by the GDPR regulation. Such techniques reduce risk and assist “data processors” in fulfilling their data compliance regulations.