Cloud Data Sovereignty and Collaboration only Possible through Sharing Data Securely
Introduction How do we guarantee that our data remains within the jurisdiction we choose and remains governed by the laws that we are knowledgeable of,…
Introduction How do we guarantee that our data remains within the jurisdiction we choose and remains governed by the laws that we are knowledgeable of,…
Multiple governments have been eagerly trying to push for tech companies to build backdoors into their systems for some time now, for easy government access,…
Millions (nearing 7 million) Dropbox accounts have been hacked and hundreds of passwords have been leaked on an anonymous information sharing site Pastebin. Dropbox have…
Cloud Security Alliance (CSA), an organisations aimed at promoting the use of best practice in the cloud, has released the new updated controls for cloud…
The ICO have uncovered that the data protection policies at the Council of the Isle of Scilly are not adequate. Two breaches have recently occurred…
New documents have once again brought to light the relationship the NSA has with Microsoft and how they use our data collected from Skype, Outlook.com…
With only a personal server maintaining the privacy of records, a mistake by a physician, when he mistakenly switched it off, has led to the…
A researcher in Germany has discovered that email attachments for POP, IMAP and ActiveSync accounts are not encrypted when stored on certain Apple devices, iPhone…
There is a notable trend within companies, which we have seen first-hand, to migrate email from on premise/in-house email servers to cloud- based servers such…
A recent risk analysis conducted by the National Health Service (NHS) on its new patient database system concluded that the proposed system is susceptible to…