All Security Breaches and Attacks articles – Page 18
-
Feature
10 ways cybersecurity will evolve in the next five years
Looking back just 10 years, the cyber threat landscape is almost unrecognisable. Back then most IT security threats were unsophisticated malware programs (mostly viruses, worms or trojans) written by people whose main aim was simply to cause trouble.
-
Feature
Data masking: Anonymisation or pseudonymisation?
Among the arsenal of IT security techniques available, pseudonymisation or anonymisation is highly recommended by the GDPR regulation. Such techniques reduce risk and assist “data processors” in fulfilling their data compliance regulations.