Last May marked a seismic shift in global privacy and information rights with the implementation of the General Data Protection Regulation (GDPR) and the Data Protection Act 2018. In the intervening period we have seen other countries follow suit with the California Consumer Privacy Act (CCPA)...
Read More
More than a year after coming into effect, the General Data Protection Regulation (GDPR) has transformed the data landscape and its effects look set to extend into the future, as nations worldwide adopt similar laws. Furthermore, big tech companies are leading the way with assurances of greater...
Read More
Insider threat remains high on the list of issues keeping CISOs awake at night, and for good reason. Unlike external actors, insiders are already within the network perimeter, often with privileged access to the company’s critical data, systems, and applications. They are a trusted part of the...
Read More
Criminals are tirelessly attacking critical infrastructure (CRITIS) around the world and compromising the Industrial Control System (ICS) and the Supervisory Control and Data Acquisition (SCADA) systems that control these infrastructures. In 2010, the Stuxnet worm infiltrated numerous control...
Read More
Gartner predicts that 25 billion connected things will be in use by 2021. This presents a huge...
Read More
Fighting cybercrime is a never-ending arms race. If businesses want to get ahead of the bad guys,...
Read More
It now seems kind of quaint that cybercriminals go after computers. The kind of threats we now...
Read More
Cyber attacks are inevitable, but it’s how an organisation deals with them that can make or break...
Read More
Rest assured, 5G is coming and it promises to be faster with less latency and better support for...
Read More
Artificial Intelligence is widely perceived as ‘the next big thing’ in cyber security. But with...
Read More
Businesses have been scrambling to leverage the power of the Internet of Things (IoT) for years....
Read More
Earlier this year a US software engineer hacked into a server holding the personal information of...
Read More