Search Results for: gdpr

Why vishing is the new phishing and how to guard against it [Q&A]

vishing smishing

We're all familiar with the menace of phishing but, particularly following the recent Twitter attack, other methods of stealing credentials have been on the rise.

These include 'smishing' (phishing via SMS) and 'vishing' (phishing by voice call). We spoke to Ed Bishop, CTO at email security company Tessian to find out how businesses can identify vishing and smishing attacks, how the attacks work, and how companies can protect their employees.

Continue reading

Dataguise allows enterprises to report breaches faster and more accurately

Data breach

Personal data management software specialist Dataguise is launching a new system that enables organizations to report the impact of a data breach faster and more accurately than ever before.

GDPR requires reporting of breaches within 72 hours of becoming aware, and notifying affected individuals without delay. Dataguise is able to extrapolate the number of unique data elements in a data set quickly, with greater than 90 percent accuracy, using a patent-pending approach based on neural network technologies.

Continue reading

Why corporate communication tools are the new threat vector [Q&A]

video conference

In the new normal world where more work is being carried out remotely, corporate communications have increased in importance but they have also come under greater threat.

As the recent Twitter attack shows, communication tools offer hackers an attractive extra method of getting hold of sensitive information like login details.

Continue reading

New store provides a one-stop-shop for privacy apps

Privacy

When choosing data privacy applications in the past businesses have had to choose between a broad spectrum of capabilities of a focus on particular issues.

Now though SAP-backed data discovery and intelligence company BigID is launching a new Application Marketplace that allows organizations to build their optimum data solution, choosing specific capabilities that best fit their needs.

Continue reading

How traffic analysis can help protect business networks [Q&A]

Networked computers

One of the biggest challenges that cybersecurity teams face at the moment is alert noise which can blind them to real threats.

Corporate performance management (CPM) specialist Prophix Software recently chose to adopt a network traffic analysis (NTA) solution to address this issue. We spoke to Kristofer Laxdal, the company's director of information security to discover why it chose invest in NTA technology and what benefits it's seeing.

Continue reading

Why DevOps teams need to take container security seriously [Q&A]

DevOps

Earlier this year hackers were able to exploit container platform Kubernetes to install cryptomining software in Microsoft Azure.

Fei Huang, chief strategy officer at container security platform NeuVector believes that this should be a wake up call to get the attention of enterprise DevOps and DevSecOps teams. We spoke to him to find out more about the risks and how they can be addressed.

Continue reading

Cloud computing in Europe: Speculations on EU cloud tech in post-pandemic era

Cloud visibilty

We see the European market today as the hottest area of the global cloud in a pivotal moment. While US cloud giants battle for world domination, China is building its "Great Cloud," Russia is testing its sovereign internet, and Europe is busy creating its own digital sovereignty.

The EU recently declared a massive digital transformation for its economy in the next decade where cloud and AI technologies will play an essential role. So what exactly can we expect from the European cloud industry in the short term?

Continue reading

How technology can help protect against identity fraud [Q&A]

unknown identity

The COVID-19 pandemic has led to a tide of cybercriminal activity seeking to exploit things like government payments.

We spoke to Michael Magrath, director, global regulations and standards at anti-fraud and digital identity solutions company OneSpan to find out how governments and enterprises can use technology to guard against the threat.

Continue reading

How ransomware attacks are making the most of the COVID-19 crisis [Q&A]

Ransomware

Ransomware is a business that's thriving in the current climate, but what's behind this and what wider problems do attacks create for businesses?

We had a socially-distanced chat with Chris Morales, head of security analytics at network detection and response specialist Vectra to find out more.

Continue reading

Evolution of privacy protection over the coming years

data privacy

The war over data privacy has been raging for 25 years and is far from over. Large corporations, states and criminal networks are improving tracking tools, trying to dictate their own rules, and control and manage people's need to protect their personal data. The issue of privacy is getting unbelievable traction on different levels, including the GDPR (General Data Protection Regulation) and CCPA (California Consumer Privacy Act).

The value of personal data is constantly increasing, as it's getting harder to collect, and the possibilities of making money on it are endless. Will users ever be able to decide for themselves what information they are willing to share? To address this question, let's move away from individual cases and look at how privacy protection technologies in general will develop in the coming years.

Continue reading

Why payroll security is even more essential now remote work is the norm

The COVID-19 pandemic is changing the way people work and do business. As governments worldwide impose compulsory community quarantines and lockdowns, many are turning to the internet to continue operating their businesses or doing their jobs. Teleworking is becoming the new normal with everyone expected to observe physical distancing to avoid the pandemic spreading.

Among other systems, payroll is one of the workflows worth examining amidst the changes brought about by the pandemic. As companies adopt remote work arrangements to avoid complete operational shutdown, those that have been manually processing their payroll need to find ways to adjust to the new situation.

Continue reading

Google Meet is now free for everyone, making it a viable alternative to Zoom

Google logo on white wood

It's only a few days since Facebook launched Messenger Room to serve as an alternative to video conferencing service Zoom. Now Google is getting in on the action, making is own video meeting tool available for free.

Google Meet has been opened up to everyone with a Google account -- previously only people with a paid-for G Suite account were able to start calls. From now until September meetings of any length involving up to 100 people are completely free, but at the end of September some restrictions will be introduced.

Continue reading

Why malicious domain registrations are a growing problem [Q&A]

TLD extensions

More than 16,000 COVID-19 related domains have been registered since January and while some are legitimate many have been set up to serve malware, create phishing pages, or scam site visitors.

And malicious domains aren't just a problem during the current pandemic, they're a growing issue across the internet. This is not helped by privacy rules which mean it's become harder for security researchers to use Whois to see who owns a domain.

Continue reading

Microsoft seeks to elevate Teams above Zoom with commitments to privacy and security

Colorful Microsoft logo

Video conferencing tools like Zoom, Microsoft Teams and Skype have been the center of attention in recent weeks because of companies' increased reliance on them during coronavirus lockdowns. Zoom has been in the headlines for many of the wrong reasons, however, and Microsoft is keen to ensure it doesn't get tarred with the same brush.

The company had made a series of commitments about its Teams software, promising users that their virtual conversations are private and secure.

Continue reading

Microservices, identity, and privacy by design

Part 2: The advent of Microservices has dramatically opened up the ability to rapidly develop and update applications and services. This is done by breaking them into very small pieces, where each piece can be managed by a single team or one team can manage several pieces. Each of these pieces then comes together with hundreds or thousands other pieces to create a larger framework or workflow. They are at the heart of the DevOps methodology, and an expectation today with the idea of a continues development or continuous delivery mindset.

This provides application and service owners the ability to rapidly scale, update, and develop their services is something that most modern business application service owners want. This also makes businesses run more efficiently. An example is when you need more delivery job servers, with Microservices you spawn more job services and you don’t go down.  Easier and more efficient. However, in today’s world, we need to remember that privacy and security have to be top concerns. And in today’s world, Microservices are lacking in this area.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.