BLOG

GDPR – Keeping a Continuous Focus on Compliance

The General Data Protection Regulation (GDPR) came into force on 25 May 2018. In the months that followed, the regulators were quiet, but businesses would have been unwise to have been lured into a false sense of security. In fact, data breach notifications were being collected and enforcement actions beginning behind the scenes. By Michael Mittel, President and GM, RapidFire Tools, a Kaseya Company.

Read More

BLOG

The role of Information Assurance in managing data security

A new year is the time for lots of pledges of how things will be done differently: new targets to meet, processes to drive forward and the chance to make positive changes. By Dan Panesar, VP EMEA, Certes Networks.

Read More

BLOG

When Mobile Security and Compliance Clash – The MDM crisis

Out of all the IT security risks we face, mobile devices are the hardest to defend from cyber attacks, according to a 2018 cybersecurity report. This is not surprising as they have unique vulnerabilities that nefarious parties can exploit. Some examples of malicious tactics include spoofing free Wi-Fi in order to steal data and credentials from off-site employees, creating phony apps for smartphones, and even physically stealing a device as a whole. By Anurag Kahol, CTO at Bitglass.

Read More

BLOG

Cyber security predictions for 2019

Corporate Cybersecurity is a huge concern for both customers and business owners alike with the number of attacks keep growing month on month. 2018 has seen a multitude of hacks and breaches coming from a wide array attack vectors. Companies have been left with data losses, stolen customer information and compromised networks. Big business just hasn’t been able to respond to the challenge fast enough, resulting in successful hacks that have resulted in data loss, and malicious cybersecurity...

Read More

BLOG

How can a CDO tackle conflicting data demands?

The role of a chief data officer (CDO) has changed significantly over the past decade. Ten years ago, the job title was, more typically, data processing manager or head of data processing, and the job itself tended not to be recognised as a driver of added value. By Ken Mortensen, Data Protection Officer, Global Trust & Privacy, InterSystems.

Read More

BLOG

Be cyber attack free during the festive period

It has been a tumultuous year for cybersecurity, with endless security breaches hitting the headlines. Perhaps most recently, social media giant, Facebook, saw its largest security breach ever in September, with 50 million Facebook users allegedly left exposed by a security flaw. It’s no surprise that the adoption of IT security solutions in corporate businesses is on the rise, with 1.9 billion personal and sensitive data records compromised between January 2017 and March 2018. By Adrian...

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more