Phishing a popular tactic in cyber-crime

Phishing a popular tactic in cyber-crime

An increasingly popular form of cyber-crime-Phishing poses a very real and significant threat to organisations as well as individuals around the world. According to a recent report by Verizon, in the last ...
The EU’s ePrivacy Regulation

The EU’s ePrivacy Regulation

Presently a draft EU legislative instrument, the EU’s ePrivacy Regulation is intended to replace the existing Privacy and Electronic Communications Directive, this directive, was adopted by the UK in 2003. The new ...
The Impact of HIPAA

The Impact of HIPAA

In 1996 the US congress passed a new regulation for the healthcare industry: The Health Insurance and Portability and Accountability Act (HIPAA), designed to protect the privacy and security of sensitive health ...
The Top Five Cybersecurity Issues Trending in 2019

The Top Five Cybersecurity Issues Trending in 2019

With the average cost of a data-breach rising year on year, (with some estimates being close to $4million) it underscores the importance of why cyber security needs to be taken seriously. Cyber-security ...
CCPA and the Future of Data Privacy

CCPA and the Future of Data Privacy

In May 2018 the European Union introduced the GDPR regulation across Europe, which comprehensively updated EU data privacy laws; at roughly the same time the US state of California introduced its own ...
A Data-First Approach to Security

A Data-First Approach to Security

With news of the Marriott Hotel data breach questions arose as to how such a breach could occur in the first place when the hotel industry in particular has a history of ...
May We Please Get Back to the Data?

May We Please Get Back to the Data?

Knowing where your data resides – and who should be using it – is the first step toward safely enabling analytics within your organization. The post May We Please Get Back to ...

Secure Guardrails