BLOG

GDPR – one year on

How has GDPR changed the security and compliance landscape? Over the following pages, you’ll find a range of views and opinions as to what’s changed, for better and worse! Here, we start with a GDPR Q and A with Mark Thompson, Global Privacy Lead, KPMG.

Read More

BLOG

The five myths of GDPR

May 2019 marks the first anniversary of the General Data Protection Regulation (GDPR), and early numbers make clear that its implementation has been a success as a breach notification law. As such, GDPR has affected multiple aspects of a business. It has created increased requirements for businesses to deal with issues such as security, compliance, data ownership, training and data management. The new regulation will require, for many of businesses, a fundamental change to their internal...

Read More

BLOG

Why organisations should mask data on demand to protect privacy across enterprise

Today’s organisations realise that data is a critical enterprise asset, so protecting that data and the applications that hold it makes good business sense. However, different types of information have different protection and privacy requirements. Therefore, organisations must take a holistic approach to protecting and securing their business-critical information. By AJ Thompson, CCO of Northdoor plc.

Read More

BLOG

The future of passwords in the enterprise

Weak passwords have plagued businesses and security parameters for generations. People tend to set passwords that are easy for them to remember without considering how a weak password will impact the security of their data. This translates to corporate environments where employees tend to use personal passwords, meaning they are inevitably putting their corporate network at risk as it is now far easier for cybercriminals to get hold of an individual's’ personal information and, in turn,...

Read More

BLOG

Apps: the gateway to your private data

Cybercrime is no longer monopolised by elite criminals and no longer consigned to the dark web alone. Recent investigations indicate that hackers have become much braver and are now operating in the open, using popular apps to conduct illegal dealings. Criminals are now using consumer applications like Telegram and social media platforms to trade valuable personally identifiable data (PII) such as stolen payment card details. By Terry Ray, SVP, Imperva.

Read More

BLOG

The implications of integrating facial authentication to protect customer data

Identity theft has become a major problem. It has steadily escalated globally as the need for digital identities continues to rise. In the UK, it was reported that 174,523 cases of fraudulent activity were identity fraud, with 95% involving the impersonation of someone else, and eight out of ten fraudulent applications were made online. By Steve Cook, VP of business development of EMEA at FaceTec.

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more