Why does GDPR Matter in the Tech and Media Industry?

Why does GDPR Matter in the Tech and Media Industry?

Robust have never been so high-profile. The introduction of the EU GDPR (General Data Protection Regulation) in May 2018 put personal data protection firmly in the public consciousness. Cybercrime continues to grab ...
Sink or Swim with Shadow IT

Glass Class: Mitigating Risk before Shadow IT

In today’s cloud-first world, employees are sometimes trusted to manage their own projects, giving them freedom to work with the tools of their choosing to complete their tasks. Occasionally, these tools are ...

GDPR and Penetration Testing

GDPR has already been endorsed as the most stringent data protection regulation after it was passed in April 2016. Coming.. The post GDPR and Penetration Testing appeared first on BreachLock ...
How to (better) Secure APIs in an Open Banking Partnership – Part One

How to (better) Secure APIs in an Open Banking Partnership – Part One

| | Finance, Privacy, regulation, Trust
By going one step further than authentication and verification to find and protect private information itself – at rest, in transit and in use – financial institutions can be data-first in their ...
Education in the Cloud

Cloud Security Needs in Higher Education

Organizations in higher education have a unique set of challenges when it comes to cybersecurity. They store and process a wide variety of data in the course of their day-to-day operations and, ...
Ransomware to land cyber-crooks decades in Maryland prisons if new bill passes

Ransomware to land cyber-crooks decades in Maryland prisons if new bill passes

Ransomware attacks have been increasing steadily for a few years, and operators gain confidence with every new strike. While cyber-experts burn the midnight oil coming up with solutions to thwart this dangerous ...
Cloud Security Priorities 2019

How to Prioritize Cloud Security in 2019

When migrating to the cloud, enterprises are faced with a number of security concerns that, if not properly addressed, can expose data on a wide scale. While threats in the cloud are ...
GDPR Data Subject Rights

Phishing the GDPR Data Subject Rights

| | identity, Privacy, regulation
Companies across the globe are now working toward compliance with the EU GDPR, while phishers may be preparing to exploit their new compliance processes. Airbnb first fell prey to a GDPR-related scam, ...
Security Boulevard
UK Treasury committee report: regulation is closing in on cryptocurrency

UK Treasury committee report: regulation is closing in on cryptocurrency

Bitcoin has truly taken off, at a current worth of more than 5,000 euros. Other cryptocurrencies are slowly catching up, but there is one special surprise waiting for investors and exchanges that ...
Collect or Store TCP/IP Log Data

Is it Unlawful to Collect or Store TCP/IP Log Data for Security Purposes?

It is a common and accepted practice for entities to collect, store, process and analyze log data. This log data includes the IP addresses of every person (computer) that accessed or attempted ...
Security Boulevard
Loading...