Understanding post-Brexit penalties and fines for GDPR
Now that the set period for Brexit transition has come to an end, there are two different versions of the General Data Protection Regulation (GDPR) that…
Now that the set period for Brexit transition has come to an end, there are two different versions of the General Data Protection Regulation (GDPR) that…
Recent months have seen headlines full of cyberattack victims, from fuel pipeline networks to businesses and universities. Malware is a common component of these assaults,…
US cybersecurity researchers have released new case studies detailing the activities of fraudsters using voice messages in recent campaigns to con users into parting with…
How well do you Know Your Customers? Sure, you perform KYC (Know Your Customer) checks on all new clients, but is that enough? How do…
Based on experience and areas of expertise, cybersecurity professionals all possess a unique viewpoint on the most effective protocols to protect companies from
A recent cyberattack on the health service for Ireland forced the government institution to take its dedicated IT systems offline, causing disruption.
Cybercriminals not only exploit technical vulnerabilities but increasingly take advantage of the human element of firms to access private information. For this reason, people themselves…
Schools need to securely store and share a lot of sensitive data as part of their day-to-day operations, from financial information to personal details. All…
The private data files of officers of Washington’s Metropolitan Police Department (MPD) have been leaked by a rising threat on the cybercriminal scene, the Babuk…
From the fines levied against firms taking insufficient security measures, to the constantly evolving tactics of threat operators and ransomware gangs, protecting data has never…