Search Results for: gdpr

The importance of TLS/SSL decryption in a zero-trust model

With upwards of two-thirds of UK adults set to work remotely for the remainder of this year, it’s clear that the pandemic will create a larger attack surface, and increase opportunities for cyber criminals. In effect, the enterprise perimeter has not only expanded but it has also become much more distributed.

Likewise, modern cyber attacks are not just limited to network intrusion from the outside. Internal threat actors can often be found at the center of sophisticated attacks. Therefore, today, threats come from both inside and outside the organization, via the business partner and supplier ecosystem, and through employees working remotely. This means we need to re-assess and re-think the way we defend our networks, users and data. For example, organizations will need more support around connecting and managing BYOD devices on the home network, including sharing of policies and tools around sensitive data, which could be accessed via insecure Wi-Fi. Additionally, with ransomware, phishing and DDoS attacks growing exponentially, they will also be looking for technologies that enable them to protect networks from cyber attacks, especially those that threaten network availability.

Continue reading

How AI can help enterprises stay on top of data governance [Q&A]

Data governance

Security breaches and privacy violations can cost businesses dearly. not only in financial penalties but also by causing damage to their reputation.

Keeping tabs on your data and how it's used is an essential part of staying in control and it's an area where AI can help. We spoke to Amar Kanagaraj, founder and CEO of AI-powered data protection and data governance specialist oneDPO to find out more.

Continue reading

The challenge of effectively securing collaboration tools [Q&A]

remote work

The COVID-19 pandemic has forced many more organizations to adopt remote working. This in turn has led to a boom in the use of tools like Teams and Zoom to help employees communicate.

Securing those tools though presents some serious challenges ensuring that, for example, they aren't used, inadvertently or on purpose, to leak sensitive information.

Continue reading

COVID crisis drives increased security investment

Lock and money

A new report from Thycotic reveals that 58 percent of IT security decision makers say their organizations plan to add more security budget in the next 12 months, and almost three out of five believe that in the next financial year they will have more security budget because of COVID-19.

More than three quarters (77 percent) of respondents have received boardroom investment for new security projects either in response to a cyber incident in their organization (49 percent) or through fear of audit failure (28 percent).

Continue reading

Four steps to securing sensitive data in the cloud

Data cloud lock

For organizations across the globe, the journey to effectively manage, and extract value from, sensitive data in the cloud isn’t a new one. IT and security professionals have long struggled with challenges to the easy adoption of cloud technologies, and the question of how to ensure that data, including personal identifiable information (PII) or sensitive data, stays safe and compliant with regulatory requirements, without sacrificing data utility, remains a top challenge.

In 2020, the ongoing global pandemic increases this obstacle as remote work drives businesses to move more activity to the cloud quickly. A cloud usage survey released in May found organizations had already surpassed their 2020 cloud spend budget by 23 percent -- highlighting the question of how well data is being protected during this shift to home offices.

Continue reading

The challenges of hybrid cloud adoption [Q&A]

cloud data cable

Cloud is used for all kinds data processing nowadays, but there are still some things that need to be kept in-house, either for performance, compliance or other reasons.

This has given rise to the hybrid model, offering a mix of cloud and on-premise solutions, becoming increasingly popular. We spoke to Derek Taylor, lead principal security consultant at Trustwave, to find out more about the security and supply chain challenges that hybrid adoption presents.

Continue reading

Why vishing is the new phishing and how to guard against it [Q&A]

vishing smishing

We're all familiar with the menace of phishing but, particularly following the recent Twitter attack, other methods of stealing credentials have been on the rise.

These include 'smishing' (phishing via SMS) and 'vishing' (phishing by voice call). We spoke to Ed Bishop, CTO at email security company Tessian to find out how businesses can identify vishing and smishing attacks, how the attacks work, and how companies can protect their employees.

Continue reading

Dataguise allows enterprises to report breaches faster and more accurately

Data breach

Personal data management software specialist Dataguise is launching a new system that enables organizations to report the impact of a data breach faster and more accurately than ever before.

GDPR requires reporting of breaches within 72 hours of becoming aware, and notifying affected individuals without delay. Dataguise is able to extrapolate the number of unique data elements in a data set quickly, with greater than 90 percent accuracy, using a patent-pending approach based on neural network technologies.

Continue reading

Why corporate communication tools are the new threat vector [Q&A]

video conference

In the new normal world where more work is being carried out remotely, corporate communications have increased in importance but they have also come under greater threat.

As the recent Twitter attack shows, communication tools offer hackers an attractive extra method of getting hold of sensitive information like login details.

Continue reading

New store provides a one-stop-shop for privacy apps

Privacy

When choosing data privacy applications in the past businesses have had to choose between a broad spectrum of capabilities of a focus on particular issues.

Now though SAP-backed data discovery and intelligence company BigID is launching a new Application Marketplace that allows organizations to build their optimum data solution, choosing specific capabilities that best fit their needs.

Continue reading

How traffic analysis can help protect business networks [Q&A]

Networked computers

One of the biggest challenges that cybersecurity teams face at the moment is alert noise which can blind them to real threats.

Corporate performance management (CPM) specialist Prophix Software recently chose to adopt a network traffic analysis (NTA) solution to address this issue. We spoke to Kristofer Laxdal, the company's director of information security to discover why it chose invest in NTA technology and what benefits it's seeing.

Continue reading

Why DevOps teams need to take container security seriously [Q&A]

DevOps

Earlier this year hackers were able to exploit container platform Kubernetes to install cryptomining software in Microsoft Azure.

Fei Huang, chief strategy officer at container security platform NeuVector believes that this should be a wake up call to get the attention of enterprise DevOps and DevSecOps teams. We spoke to him to find out more about the risks and how they can be addressed.

Continue reading

Cloud computing in Europe: Speculations on EU cloud tech in post-pandemic era

Cloud visibilty

We see the European market today as the hottest area of the global cloud in a pivotal moment. While US cloud giants battle for world domination, China is building its "Great Cloud," Russia is testing its sovereign internet, and Europe is busy creating its own digital sovereignty.

The EU recently declared a massive digital transformation for its economy in the next decade where cloud and AI technologies will play an essential role. So what exactly can we expect from the European cloud industry in the short term?

Continue reading

How technology can help protect against identity fraud [Q&A]

unknown identity

The COVID-19 pandemic has led to a tide of cybercriminal activity seeking to exploit things like government payments.

We spoke to Michael Magrath, director, global regulations and standards at anti-fraud and digital identity solutions company OneSpan to find out how governments and enterprises can use technology to guard against the threat.

Continue reading

How ransomware attacks are making the most of the COVID-19 crisis [Q&A]

Ransomware

Ransomware is a business that's thriving in the current climate, but what's behind this and what wider problems do attacks create for businesses?

We had a socially-distanced chat with Chris Morales, head of security analytics at network detection and response specialist Vectra to find out more.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.