Protecting Collaboration Channels for Remote Work

As COVID-19 unfolded in the first half of 2020, many of us set out to explore its long-term ramifications and imagine what the ‘new normal’ could look like. We also wanted to understand the second- or third-order effects of remote working and accelera… Continue reading Protecting Collaboration Channels for Remote Work

What is Schrems II and how does it affect your data protection in 2021?

Over six months on, the Schrems II verdict is proving to be a difficult obstacle for many businesses when it comes to data management. Find out why here.
The post What is Schrems II and how does it affect your data protection in 2021? appeared first on… Continue reading What is Schrems II and how does it affect your data protection in 2021?

Tom Cruise, TikTok and Fraud: How to combat DeepFakes

In this blog, we look into how the TikTok videos of Tom Cruise were created and the malicious implications of the technology.
The post Tom Cruise, TikTok and Fraud: How to combat DeepFakes appeared first on Security Boulevard.
Continue reading Tom Cruise, TikTok and Fraud: How to combat DeepFakes

Security Automation: The Future of Enterprise Defense

When it comes to giving cyber security experts the tools they need to take action, automation and machine learning (ML) can make a big difference. Many companies are working with high volumes of data, and types and variants of attack are always growing and changing. It can become too much for people to process in […]

The post Security Automation: The Future of Enterprise Defense appeared first on Security Intelligence.

Continue reading Security Automation: The Future of Enterprise Defense

How can we prevent sophisticated document fraud in 2021?

Document fraud such as forgery is becoming more sophisticated every year. We discuss how to stay ahead of scammers.
The post How can we prevent sophisticated document fraud in 2021? appeared first on Security Boulevard.
Continue reading How can we prevent sophisticated document fraud in 2021?

How to Shut Down Business Units Safely

A nimble organization needs to be ready for growth — and cuts. Sometimes business closure or shutting down a unit is needed, either as part of the evolution of a company, as part of a company’s growth via merger and acquisition, or as the result of restructuring or for some other reason, such as a […]

The post How to Shut Down Business Units Safely appeared first on Security Intelligence.

Continue reading How to Shut Down Business Units Safely

Data Privacy Day: Three ways to keep consumer data secure

Here we discuss where organisations can improve their data protection practices given the turbulence we experienced in moving services online during 2020.
The post Data Privacy Day: Three ways to keep consumer data secure appeared first on Security Bou… Continue reading Data Privacy Day: Three ways to keep consumer data secure

How is Enterprise Security Like Writing a Novel?

Pen, paper and ink alone do not make a novel. In the same way, anti-malware, firewalls and SIEM tools alone do not make an enterprise secure. Too many organizations think that buying lots of security solutions and deploying them will make them secure. However, just having a security tool running does not make an enterprise […]

The post How is Enterprise Security Like Writing a Novel? appeared first on Security Intelligence.

Continue reading How is Enterprise Security Like Writing a Novel?

Enterprises Increase Security Spending but not Efficacy

One of the constants in cybersecurity is that wherever there is a breach there is a high probability that there’s a stolen credential involved. With that perspective in mind, a recent report by security vendor Pulse Secure and the CyberRisk Alliance s… Continue reading Enterprises Increase Security Spending but not Efficacy

How to make sure your digital transformation is secure

With more companies embracing digital transformation, how can they maintain a high level of cybersecurity while incorporating new technologies? We discuss in this blog
The post How to make sure your digital transformation is secure appeared first on Se… Continue reading How to make sure your digital transformation is secure