Zero-Trust is an Adjective Without a Noun

People love to talk about zero-trust right now, for a number of reasons. It has the word “zero” in there, which has some history in the information security world (e.g., zero-day vulnerabilities). It’s also a simple and eye-catching phrase, so it fits… Continue reading Zero-Trust is an Adjective Without a Noun

How do I select a data recovery solution for my business?

Ransomware attacks have been hitting hard lately, with over half of organizations experiencing at least one this year, according to a recent study. Recovering data often means negoitating with cybercriminals, but why put an organization in such positio… Continue reading How do I select a data recovery solution for my business?

Is differential privacy the ideal privacy-enhancing computation technique for your business?

As security & risk management (SRM) leaders globally adjust to a “new normal” brought about by the COVID-19 pandemic, businesses must adapt their privacy programs for better scale and performance on ever-tighter budgets. While juggling these compe… Continue reading Is differential privacy the ideal privacy-enhancing computation technique for your business?

Data Protection Officer (DPO): Why Your Business Needs One

A data protection officer (DPO) ensures that a company’s processing of individuals’ personal data is done in a GDPR-compliant manner. Learn more.
The post Data Protection Officer (DPO): Why Your Business Needs One appeared first on Security Boulevard.
Continue reading Data Protection Officer (DPO): Why Your Business Needs One

Top 5 NCSC Cloud Security Principles for Compliance

There are many important factors to consider when choosing a cloud provider for your cloud use cases. For organizations in heavily regulated industries, compliance with relevant regulations is one of the most important things to think about. Whether yo… Continue reading Top 5 NCSC Cloud Security Principles for Compliance

CISO Interview Series: How Aiming for the Sky Can Help Keep Your Organization Secure

Organizations need the right internal personnel like a CISO to keep their systems and data secure. But what kind of skills do these leaders need? And how should they guide their employers in a way that doesn’t overlook the evolving threat landscape? To… Continue reading CISO Interview Series: How Aiming for the Sky Can Help Keep Your Organization Secure

The Second Wave of a Ransomware Pandemic

In January, we published the Ransomware Pandemic, a report discussing the ever-evolving threat of ransomware and the growing devastation disseminated by these malicious malware strains. The report discussed the future forecast for ransomware and how w… Continue reading The Second Wave of a Ransomware Pandemic

Vaccinate your data: Addressing and adapting to new data risks

It seems like only yesterday that we were all reading up on what the implementation of the European Union’s General Data Protection Regulation (GDPR) would mean for businesses operating in (or handling data collection with organizations in) the EU. For… Continue reading Vaccinate your data: Addressing and adapting to new data risks

Protect your smartphone from radio-based attacks

By now, most of us are aware that smartphones are powerful computers and should be treated as such. It’s not a coincidence that most of the security tips given to smartphone users – such as refraining from opening suspicious links or downloading untrus… Continue reading Protect your smartphone from radio-based attacks

What is a PCI Audit? And How to Get Your Business Ready

Today, payment card fraud is a booming business with no signs of slowing—out of every hundred dollars spent …
Read More
The post What is a PCI Audit? And How to Get Your Business Ready appeared first on Hyperproof.
The post What is a PCI Audit? And … Continue reading What is a PCI Audit? And How to Get Your Business Ready