May 2019 marks the first anniversary of the General Data Protection Regulation (GDPR), and early numbers make clear that its implementation has been a success as a breach notification law. As such, GDPR has affected multiple aspects of a business. It has created increased requirements for...
Read More
Today’s organisations realise that data is a critical enterprise asset, so protecting that data and the applications that hold it makes good business sense. However, different types of information have different protection and privacy requirements. Therefore, organisations must take a holistic...
Read More
Weak passwords have plagued businesses and security parameters for generations. People tend to set passwords that are easy for them to remember without considering how a weak password will impact the security of their data. This translates to corporate environments where employees tend to use...
Read More
Cybercrime is no longer monopolised by elite criminals and no longer consigned to the dark web alone. Recent investigations indicate that hackers have become much braver and are now operating in the open, using popular apps to conduct illegal dealings. Criminals are now using consumer applications...
Read More
Identity theft has become a major problem. It has steadily escalated globally as the need for...
Read More
The IT security landscape has changed over the last few years. Historically organisations focused...
Read More
Digital transformation has changed the face of business, driving disruptive change and creating...
Read More
When the General Data Protection Regulation (GDPR) came into effect in May 2018, businesses from...
Read More
Beth Hood is a former advisor to the government on protective security. She now runs Verosa – a...
Read More
When budgets shrink, spending scrutiny grows — every penny is expected to fuel the highest...
Read More
The Cloud Security Alliance (CSA) has released a survey which discusses who should be taking...
Read More
As organizations digitally transform, critical systems and sensitive information can be accessed by...
Read More