Cybersecurity Awareness Month Blog Series: Alright boys, it’s time we have “The Talk”

| | Data Security
As a father of two teenage boys, I should have seen this coming. It was time to have the talk... The post Cybersecurity Awareness Month Blog Series: Alright boys, it’s time we ...
Washington Orthopedic Practice Confirms Data Security Event

Washington Orthopedic Practice Confirms Data Security Event

A Washington medical group practice specializing in orthopedics has notified individuals of a data security event that might have exposed some of their personal information. On 5 October, Rebound Orthopedics & Neurosurgery ...
A new era for customer data – could security be ‘the new green’ for businesses?

A new era for customer data – could security be ‘the new green’ for businesses?

| | Data Security
There was a tipping point not so long ago in the realm of environmental responsibility for businesses. For some time,... The post A new era for customer data – could security be ...
Heathrow Airport Fined £120,000 Following Data Security Incident

Heathrow Airport Fined £120,000 Following Data Security Incident

The Information Commissioner’s Office (ICO) issued a fine of £120,000 to Heathrow Airport Limited (HAL) following a data security incident that occurred in 2017. On 8 October, ICO announced the penalty under ...
Working with Our Partners to Mitigate the Faxploit Threat

Working with Our Partners to Mitigate the Faxploit Threat

At Safe-T, we’ve been delivering innovative, award-winning solutions based on our Software Defined Access solution for years. Part of the value we offer is in accelerating ROI by enabling customers to plug-in ...
Data-Centric Security and Big Data

Data-Centric Security and Big Data

| | Data Security
As Cybersecurity continues to be heavily focused on solving the problem of attacks against software vulnerabilities and system access, one... The post Data-Centric Security and Big Data appeared first on Data Security ...
Employee Hacks: Spotting Insider Threats

Employee Hacks: Spotting Insider Threats

Organizations face security threats such as data breaches from numerous sources, however many only consider attacks from external sources. However, 60 percent of attacks are the result of trusted insiders with access ...
Security Boulevard
Read: How To Build Resilient Cloud Configuration Shields

Read: How To Build Resilient Cloud Configuration Shields

Configurable systems have a high level of flexibility and are better adapted to most customer needs, but their management isn’t a trivial task in complex cloud deployments. The configuration management concept isn’t ...
Overcoming the Shadow IT Catch-22

Overcoming the Shadow IT Catch-22

Trying to prevent shadow IT from sweeping through your organization is like trying to protect your sand castle from the waves when high tide rolls in—it can’t be done. Employees expect to ...
Security Boulevard
Full steam ahead for EMVCo (and partners) in the fight against online commerce fraud

Full steam ahead for EMVCo (and partners) in the fight against online commerce fraud

| | Data Security
EMVCo was formed in the early 1990s and for many years concentrated, almost exclusively, on developing the detailed specifications for... The post Full steam ahead for EMVCo (and partners) in the fight ...
Loading...