2021 Data Security Trends in the US, UK, and Middle East

The pandemic fundamentally changed the way we work and at the same time opened a massive gap in cybersecurity. This was highlighted by a seemingly never-ending news cycle of high-profile breaches at organizations that were not equipped to adequat… Continue reading 2021 Data Security Trends in the US, UK, and Middle East

Data Breach at German Supermarket Chain tegut

The German supermarket chain “tegut” was recently the target of a cyberattack (source in German) and on April 24 the company activated emergency procedures that shut down their entire central IT network and disconnected it from the internet. While… Continue reading Data Breach at German Supermarket Chain tegut

Three Years of GDPR – a Look Back

It might be hard to imagine, but it has been three years since the General Data Protection Regulation (GDPR) was implemented on 25 May 2018. Time certainly does fly by when you are trying to protect data. Nevertheless, the term ‘GDPR’ has set a pr… Continue reading Three Years of GDPR – a Look Back

How South Africa’s POPIA will Affect your Business

It goes without saying that data is an invaluable asset to any company. On the other hand, privacy is an invaluable asset to us as individuals. In order to reconcile these two points, a variety of regulations have imbued individuals with the right… Continue reading How South Africa’s POPIA will Affect your Business

Accidental Data Exposure at the Free University of Berlin

According to a report by netzpolitik.org, on January 12, an update to the Campus Management System of the Freie Universität (FU) Berlin inadvertently set some students’ accounts to “God Mode” potentially enabling them to access, and in some cases,… Continue reading Accidental Data Exposure at the Free University of Berlin

How Data-Centric Security Enables Cross-Regulatory Compliance

GDPR. CCPA. HIPAA. PCI DSS. The number of acronyms within the data security and privacy sphere is forever mounting as governments and industry regulators try to keep pace with modern enterprise’s demands for data. Data has arguably become one of, … Continue reading How Data-Centric Security Enables Cross-Regulatory Compliance

16 Reasons to use Third Party Cloud Security and not Salesforce Shield

tl;dr: Salesforce Shield has a hefty price tag on top of the SFDC license, despite offering limited protection within Salesforce and zero protection to other applications.
The post 16 Reasons to use Third Party Cloud Security and not Salesforce Sh… Continue reading 16 Reasons to use Third Party Cloud Security and not Salesforce Shield

Mass Move to the Cloud – 3 Essential Tips for Cloud Migration

Cloud technology has become indispensable for many organizations, however there are common mistakes and misconceptions that you should be aware of in order to keep your data secure, even as it travels off premises.
The post Mass Move to the Cloud … Continue reading Mass Move to the Cloud – 3 Essential Tips for Cloud Migration

PCI DSS 4.0 and the Changing Approach to Compliance

In the past, the focus of PCI compliance was to store as little sensitive data as possible and keep it secured. In today’s data driven world, that focus has changed. 
The post PCI DSS 4.0 and the Changing Approach to Compliance appeared first on S… Continue reading PCI DSS 4.0 and the Changing Approach to Compliance