Lisa Sotto, partner and chair of the global privacy and cybersecurity practice at Hunton Andrews Kurth LLP, joins three ISMG editors to discuss important cybersecurity and privacy issues, including how U.S. enterprises are harmonizing three disparate privacy laws, and ransomware preparedness.
In today's business landscape, more people are working remotely. Far-flung teams work together across geographies and time zones. And your users are finding new ways to collaborate. Is your organization struggling to keep up? Download this e-book to explore the challenges of capturing and managing Slack, Microsoft...
With automotive standard ISO 21434 just around the corner, this tutorial focuses on how it will form a key protective component against the cyber threats facing automation software developers.
If you're not "on board" with the Functional Safety Standard EN 50128:2011 - “Railway
applications - Communication, signaling and processing systems - Software for
railway control and protection systems" - you'll need to run to catch up.
Currently the systems included under EN 50128 include
signaling, railway...
In 2020, 16 million COVID-19-related threats, including malicious URLs, spam, and malware were detected, according to a Trend Micro report. At the start of the pandemic, many IT and cybersecurity measures were hastily put into place to deal with the crisis. Today, organizations must take stock of these measures, and...
According to a recent study ,78% of senior executives express lack of confidence in their company’s cybersecurity posture. The study also found, that this eventually prompted 91% of executives to increase 2021 budgets. Most Senior Executives agree that cyber risk is now the most critical category of risk across all...
Key challenges from the recent State of Cybersecurity 2021 report include "integrating risk with maturity and keeping up with industry trends," says Jenai Marinkovic, member of the ISACA Emerging Trends Working Group.
This paper will lay out key steps to help organisations sensibly adopt a better data protection posture and with it, build a firm foundation towards onward compliance. The key principles of Classification by Design will be introduced as a logical, yet robust start point.
We summarize with the overarching takeaway...
Announced in September 2020 as part of the new Digital Finance Strategy, the Digital Operational Resilience Act (DORA) is being carried out by the EU to harmonize Information and Communications Technology (ICT) risk requirements across Europe. This regulation specifically targets the banking and financial services...
The European Commission has released two new tools aimed at easing the current legal hurdles associated with data sharing by European Union-based organizations and other businesses operating in the region. Tech giants embroiled in controversy over the EU's data -sharing polices welcomed the move.
Election security improvements, the push for all software to ship with a "bill of materials" and the results of a long-running investigation into a lucrative digital advertising scam are among the latest cybersecurity topics to be featured for analysis by a panel of Information Security Media Group editors.
One consistent theme in Andrea Szeiler's career: She’s always been drawn to "the challenge." And in her roles as global CISO for Transcom and president of WITSEC, she’s currently tackling some meaningful ones.
As employees connect to servers each morning via VPN to download the valuable corporate data that they need for the day, compliance and security are easily jeopardized. As soon as the employee disconnects from the VPN, corporate oversight goes blind, and compliance can't be maintained.
There are precautions and...
Banking institutions are seeing a significant spike in
multichannel financial crimes. Data and analytics can be
key differentiators in the effort to protect sensitive
financial information.
Download this eBook to learn more about:
Financial crime trends and how they’ve evolved in 2020;
The manifestation of...
In this new era, every enterprise is suddenly "cloud first." But there are significant data security gaps to avoid before putting critical data in the cloud. Imperva's Terry Ray shares strategies to maximize simplicity and regulatory compliance.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.