Search Results for: GDPR Blog Post €2.9 Million Issued in Fines in Q2 2020 Under GDPR August 27, 2020 The COVID-19 pandemic brought on many problems for organizations from all industries across the world. Organizations that were able to... Blog Post Cybersecurity Compliance Laws in 2021 – Keeping Your Organization on the Right Side of the Law March 24, 2021 Cybersecurity and regulatory compliance are becoming increasingly entwined, especially regarding businesses for which consumer data is a key resource. Learning... Blog Post How To Include Information Security In Project Management? February 2, 2021 When the internet and computer systems were getting popular in the 1980s and 1990s, security was not a significant concern.... Blog Post Is IASME a viable alternative to ISO 27001 certification? July 15, 2021 ISO/IEC 27001 is considered by many to be the de facto international standard on how to manage information security. In... Blog Post France Fines Google, Facebook €210 Million Over Privacy Violating Tracking Cookies January 31, 2022 The general public and government authorities are becoming increasingly conscientious about protecting data privacy online. In recent years, we’ve seen... Blog Post Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many... Blog Post 46% of Databases Globally are Not Secure – and You Could be One of Them October 12, 2021 If there is one piece of advice that all cybersecurity experts agree on, it is this: patch and update your... Blog Post Google Fined $57 million For GDPR Violations January 24, 2019 Google was fined $57 million by France’s National Data Protection Commission (CNIL) under General Data Protection Regulation (GDPR). This is... Blog Post Ransomware Backlash: Patients Are Suing Scripps Health August 5, 2021 We usually measure the cost of a data breach or cyberattack in terms of financial damage to organizations. However, a... Blog Post Blackbaud Security Incident August 16, 2020 The cybercrime industry is as vast as it is costly, accounting for trillions of dollars in losses. This constantly growing... Blog Post Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge.... Blog Post Segregation Of Duties: Common Approaches, Issues, And Implementation January 27, 2021 For modern-day businesses, segregation of duties (SoD) is a primary requirement to demonstrate compliance with various laws, regulations, and standards.... Blog Post GDPR Extortion Campaigns are on the Horizon August 9, 2018 In recent years, DDoS and ransomware attacks have been the norm in cybercrime activity. Following the implementation of EU’s General... Blog Post Here are The Top Cybersecurity Risks in Cloud Computing March 10, 2021 In the past few years, the demand for cloud computing has increased dramatically. However, the transition to the cloud has... Blog Post What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either...
Blog Post €2.9 Million Issued in Fines in Q2 2020 Under GDPR August 27, 2020 The COVID-19 pandemic brought on many problems for organizations from all industries across the world. Organizations that were able to...
Blog Post Cybersecurity Compliance Laws in 2021 – Keeping Your Organization on the Right Side of the Law March 24, 2021 Cybersecurity and regulatory compliance are becoming increasingly entwined, especially regarding businesses for which consumer data is a key resource. Learning...
Blog Post How To Include Information Security In Project Management? February 2, 2021 When the internet and computer systems were getting popular in the 1980s and 1990s, security was not a significant concern....
Blog Post Is IASME a viable alternative to ISO 27001 certification? July 15, 2021 ISO/IEC 27001 is considered by many to be the de facto international standard on how to manage information security. In...
Blog Post France Fines Google, Facebook €210 Million Over Privacy Violating Tracking Cookies January 31, 2022 The general public and government authorities are becoming increasingly conscientious about protecting data privacy online. In recent years, we’ve seen...
Blog Post Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many...
Blog Post 46% of Databases Globally are Not Secure – and You Could be One of Them October 12, 2021 If there is one piece of advice that all cybersecurity experts agree on, it is this: patch and update your...
Blog Post Google Fined $57 million For GDPR Violations January 24, 2019 Google was fined $57 million by France’s National Data Protection Commission (CNIL) under General Data Protection Regulation (GDPR). This is...
Blog Post Ransomware Backlash: Patients Are Suing Scripps Health August 5, 2021 We usually measure the cost of a data breach or cyberattack in terms of financial damage to organizations. However, a...
Blog Post Blackbaud Security Incident August 16, 2020 The cybercrime industry is as vast as it is costly, accounting for trillions of dollars in losses. This constantly growing...
Blog Post Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge....
Blog Post Segregation Of Duties: Common Approaches, Issues, And Implementation January 27, 2021 For modern-day businesses, segregation of duties (SoD) is a primary requirement to demonstrate compliance with various laws, regulations, and standards....
Blog Post GDPR Extortion Campaigns are on the Horizon August 9, 2018 In recent years, DDoS and ransomware attacks have been the norm in cybercrime activity. Following the implementation of EU’s General...
Blog Post Here are The Top Cybersecurity Risks in Cloud Computing March 10, 2021 In the past few years, the demand for cloud computing has increased dramatically. However, the transition to the cloud has...
Blog Post What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either...