Vast and growing data volumes and the shifting nature of threats are complicating the CISO’s job. Experts say a sound foundational risk management approach and essential data protection tools can help ...
If you have a large or small business, you might be fearful of cyber crooks hacking through your IT defense. However, a new report (by the Ponemon Institute, sponsored by Trend Micro Inc) states ...
Virtualization security can enable organizations to apply the approaches and tactics of the new U.S. National Cybersecurity Strategy strategy in virtualized environments. The National Cybersecurity ...
As Data Privacy Week (January 27-31) and Data Protection Day (January 28) approach, it's the perfect time to spotlight the critical role data protection plays in the ...
User data protection is a universal concern for businesses across all industries. In the digital age, personal data is a valuable asset, and its compromise can lead to severe financial and ...
A lengthy investigation into the European Union’s use of Microsoft 365 has found the Commission breached the bloc’s data protection rules through its use of the cloud-based productivity software.
Anyone who’s been along to Infosecurity Europe in the past few years will know that there’s a problem with today’s cars. Many of us can remember the ‘hacking on demand’ demos at Infosec, with a ...
Today the Council adopted new rules to improve cooperation between national data protection bodies when they enforce the General Data Protection Regulation (GDPR) in order to speed up the process of ...
Data-protection methods that rely solely on tape devices will someday appear as inadequate as using two tin cans and a string for telephony. That day could be sooner than you think, as companies seek ...