Wednesday, 21st August 2019
Logo
BLOG

GDPR – one year on

How has GDPR changed the security and compliance landscape? Over the following pages, you’ll find a range of views and opinions as to what’s changed, for better and worse! Here, we start with a GDPR Q and A with Mark Thompson, Global Privacy Lead, KPMG.

Read More

BLOG

The five myths of GDPR

May 2019 marks the first anniversary of the General Data Protection Regulation (GDPR), and early numbers make clear that its implementation has been a success as a breach notification law. As such, GDPR has affected multiple aspects of a business. It has created increased requirements for businesses to deal with issues such as security, compliance, data ownership, training and data management. The new regulation will require, for many of businesses, a fundamental change to their internal process...

Read More

BLOG

Why organisations should mask data on demand to protect privacy across enterprise

Today’s organisations realise that data is a critical enterprise asset, so protecting that data and the applications that hold it makes good business sense. However, different types of information have different protection and privacy requirements. Therefore, organisations must take a holistic approach to protecting and securing their business-critical information. By AJ Thompson, CCO of Northdoor plc.

Read More

BLOG

The all new Chief Data Officer (CDO)

Digital transformation has changed the face of business, driving disruptive change and creating spiralling amounts of data in its wake. By Steve Abbott, CEO at DocAuthority.

Read More

BLOG

GDPR Compliance – Reverting to Best Practice Security

When the General Data Protection Regulation (GDPR) came into effect in May 2018, businesses from all sectors struggled to meet the deadline. According to our research announced around the same time, more than two thirds of companies were not confident of being fully compliant ahead of the GDPR deadline. By Apricorn.

Read More

BLOG

IAM and GDPR: How can security teams ensure they work in tandem?

As organizations digitally transform, critical systems and sensitive information can be accessed by more users in an organisation than ever before. With the added pressure of GDPR, organisations have to ensure that strong security practices are implemented in the systems that people use to access data. This is where Identity Access Management (IAM) and Data Access Governance (DAG) comes in, giving granular access to the systems and data individuals use. Like with any security implementation howe...

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more