Bank executives mostly concerned about cybercrime

A research released by Computer Services suggests growing concerns among bank executives around recruiting and retaining talent as well as fighting cybercrime threats. In the survey, which collected responses from 279 executives from financial institut… Continue reading Bank executives mostly concerned about cybercrime

Companies woefully unprepared for CCPA compliance

Only 11% of companies are able to fully meet CCPA requirements, especially when managing Data Subject Access Requests (DSARs), according to a CYTRIO research. The research also showed a disconnect in compliance with 44% of companies not providing any m… Continue reading Companies woefully unprepared for CCPA compliance

Understaffing persistently impacting enterprise privacy teams

A research from ISACA explores the latest trends in enterprise privacy — from privacy workforce and privacy by design to privacy challenges and the future of privacy. The report highlights the persistent understaffing that is impacting enterprise priva… Continue reading Understaffing persistently impacting enterprise privacy teams

Is cloud the solution to optimized data privacy?

In this interview with Help Net Security, Sophie Stalla-Bourdillon, Senior Privacy Counsel and Legal Engineer at Immuta, talks about data privacy, what organizations can a must do to keep data secure, and explains the technologies that can help optimiz… Continue reading Is cloud the solution to optimized data privacy?

The security of devices held by public sector employees

Apricorn announced new findings from Freedom of Information (FoI) requests submitted to 16 government departments into the security of devices held by public sector employees. NHS Digital recorded a total of 393 lost or stolen devices between September… Continue reading The security of devices held by public sector employees

Data security in the age of insider threats: A primer

Of course, your employees are diligent, security conscious and loyal. But the real world tells a different story. A grand total of 94% of organizations had an insider data breach in the past year, with 84% of the data breaches resulting from human erro… Continue reading Data security in the age of insider threats: A primer

Omnichannel E-commerce Growth Increases API Security Risk

Today, a lot of the digital innovation we see is largely thanks to the application programming interface (API). Without APIs, rapid development would be nearly impossible. After all, the API is the link between computers, software and computer programs. But wherever there’s a link, a potential data security weakness exists.      Essential for modern mobile, SaaS […]

The post Omnichannel E-commerce Growth Increases API Security Risk appeared first on Security Intelligence.

Continue reading Omnichannel E-commerce Growth Increases API Security Risk

Preventing document fraud in a world built on digital trust

All digital markets are built on trust and that trust has been reduced to an algorithm driven by proof of identity, which currently remains heavily reliant on formal documents such as a passport or driving license. Anyone looking to misrepresent who th… Continue reading Preventing document fraud in a world built on digital trust

Data Protection: What Needs to Be Protected?

Where is your organization’s data? From global data centers to PCs to mobile apps, data is strewn all over the place. So how do you protect it all?  You can’t encrypt everything, right? It’s too expensive and time-consuming. Even the most stringent regulations don’t demand that level of data protection. For example, GDPR focuses primarily […]

The post Data Protection: What Needs to Be Protected? appeared first on Security Intelligence.

Continue reading Data Protection: What Needs to Be Protected?

It’s time for a unified approach to securing data, applications, and the edge

Organizations usually manage the security of data, applications and edge computing from disparate technologies and across different teams. That traditional approach will not work going forward because your IT infrastructure is changing rapidly, the way… Continue reading It’s time for a unified approach to securing data, applications, and the edge