news

Data Protection and Cybersecurity Post-Brexit

Uncertainty over Brexit is high and its full implications are still unknown, especially since no date has been set for the U.K. to exit the EU. But many are concerned about the impact Brexit could have on data privacy and U.K. cybersecurity. Data Privacy Regulations In terms of data protection, the U.K. will still be […]

news

IT Outsourcing Grouth- Data Security and Privacy Concern

A new report released by Research and Markets, forecasts IT Outsourcing (ITO) market growth, for Asia and  Pacific market (APAC) while showing a real concern regarding data security and privacy. IT Outsourcing is growing In the report, industry expert say that ITO market in APAC will grow 5.80% by 2020. A key factors for this growth is the cloud computing: […]

news

Vine – source code data loss case

Twitter’s Vine short video application was released today online by accident in July. Vine was acquired by Twitter in 2012 and creates six seconds videos. The dataloss was published by a security researcher that found a subdomain on Vine’s website which led to him discovering Vine’s entire source code available for download. The source code for apps and […]

news

Mobile Security Models

Every organization today needs to have a mobile security road map. According to the 2016 Mobile Security & Business Transformation Study from ISMG, 99 percent of enterprise workers currently use mobile devices to perform their work tasks. Securing all of those devices requires that organizations take a formal approach to mobile security models — an […]

news

EU-US Privacy Shield

On 12 July 2016, the European Commission adopted the replacement for the EU-US Safe Harbor scheme – the so-called ‘Privacy Shield’. This is the new, EU-approved mechanism for the transatlantic transfer of personal data. The Privacy Shield will enter into force immediately and companies will be able to self-certify with the US Department of Commerce […]

news

Cyber threats continue to mount

As threats continue to mount, understanding and managing cybersecurity risks have become top of mind for leaders in business and government. Organisations are responding by taking action. Increasingly, they are adopting innovative technologies like cloud-enabled cybersecurity, Big Data analytics and advanced authentication to reduce cyber-risks and improve cybersecurity programmes. Businesses are also embracing a more […]

  • 1
  • 2