BLOG

Privacy + development = securer applications

Privacy and security are essential not only to bring peace of mind to users but also to comply with industry guideline and regulations worldwide. This guide is designed to help developers to apply privacy principles in order to create more secure apps. By Margaret Alston, Consulting Programme Director, TrustArc.

Read More

BLOG

Privacy + development = securer applications: an app developer’s guide

Privacy and security are essential not only to bring peace of mind to users but also to comply with industry guideline and regulations worldwide. This guide is designed to help developers to apply privacy principles in order to create more secure apps. By Margaret Alston, Consulting Programme Director, TrustArc.

Read More


BLOG

How cloud service providers can help plug the data privacy skills gap

Last May marked a seismic shift in global privacy and information rights with the implementation of the General Data Protection Regulation (GDPR) and the Data Protection Act 2018. In the intervening period we have seen other countries follow suit with the California Consumer Privacy Act (CCPA) scheduled for implementation in 2020 and a raft of similar regulations on the horizon across the Asia Pacific region. It’s clear that GDPR is just the opening act in a narrative that will result in a...

Read More

BLOG

Two’s a party – why collaboration can help you to avoid privacy pitfalls

More than a year after coming into effect, the General Data Protection Regulation (GDPR) has transformed the data landscape and its effects look set to extend into the future, as nations worldwide adopt similar laws. Furthermore, big tech companies are leading the way with assurances of greater privacy for customers, in the form of increased powers to personalise and even opt out of data collection. In short, privacy regulation is here to stay. By Tim Abraham, Director, Second-Party Data,...

Read More

BLOG

How to establish insider threat programmes and conduct investigations

Insider threat remains high on the list of issues keeping CISOs awake at night, and for good reason. Unlike external actors, insiders are already within the network perimeter, often with privileged access to the company’s critical data, systems, and applications. They are a trusted part of the company ecosystem, and their actions are therefore typically more difficult to detect and contain. A malicious insider breach is also one of the most financially ruinous types of data breaches....

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more