3 Foundations of a Data Security Strategy

Data is one of the most important assets your organization has, and protecting it is no longer optional. Cyberattacks can come in multiple forms, including outsider attacks such as phishing or malware, as well as insider threats via social engineering… Continue reading 3 Foundations of a Data Security Strategy

Life-saving 3D-printed airway stent biodegrades when its job is done

For patients with an injured or compromised trachea, the insertion of a stent is often required in order to keep their airway open. A new type of airway stent should remain in place better than others, and will biodegrade when no longer needed.Continue… Continue reading Life-saving 3D-printed airway stent biodegrades when its job is done

New 3D printing tech changes objects’ shapes by moving build platform

Ordinarily, if you want to change the shape in which an object is 3D-printed, you have to alter the computer model that tells the printer what to do. A new and simpler technique, however, allows the printer to initiate the changes itself, as the print … Continue reading New 3D printing tech changes objects’ shapes by moving build platform

Cyber Security Roundup for February 2021

A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, January 2021.
Throughout January further details about the scale and sophistication of SolarWinds suspe… Continue reading Cyber Security Roundup for February 2021

Data Loss Prevention: Artificial Intelligence vs. Human Insight

The cybersecurity landscape continues to evolve as cybercriminals become ever more sophisticated, and digital security tools accelerate to mitigate the risks as much as possible. 2020 presented even more opportunities for hackers to strike, for exam… Continue reading Data Loss Prevention: Artificial Intelligence vs. Human Insight

Check, Please! Adding up the Costs of a Financial Data Breach

Guest article by Andrea Babbs, UK General Manager at VIPRE
Reliance on email as a fundamental function of business communication has been in place for some time. But as remote working has become a key factor for the majority of business during 2020, it… Continue reading Check, Please! Adding up the Costs of a Financial Data Breach

Samsung’s Premiere 4K UST laser projectors start shipping next month

Last month we brought news of a couple of new ultra-short-throw 4K laser projectors from Samsung both sporting the Premiere moniker. Now full specs have dropped, along with pricing and a shipping date.Continue ReadingCategory: Home Entertainment, Techn… Continue reading Samsung’s Premiere 4K UST laser projectors start shipping next month

From Google Cloud Blog: “Improving security, compliance, and governance with cloud-based DLP data…

From Google Cloud Blog: “Improving security, compliance, and governance with cloud-based DLP data discovery”
So, I’ve been doing some blogging at Google Cloud blog with most posts connected to products, launches, etc. However, I am also doing a fun blo… Continue reading From Google Cloud Blog: “Improving security, compliance, and governance with cloud-based DLP data…

Is it possible to ensure detection and logging of all attempts to copy data out of a system?

I am cross-posting this question from Serverfault, because I am in doubt where it fits best.
Say I have a server set up for processing sensitive data. The few authorised users of the system are instructed not to copy any of the sensitive d… Continue reading Is it possible to ensure detection and logging of all attempts to copy data out of a system?