Many companies are introducing Bring Your Own Device (BYOD) schemes to their working practices.
Browsing: Data Protection
Security experts comment on the White House’s creation of a new federal agency to coordinate the United States’ cyber threat intelligence.
Sue Trombley of Iron Mountain urges customers to understand the full implications (and changes) involved with the new EU data protection proposals.
Michael Hall of DriveSavers provides a list of steps customers should take to protect themselves from a data breach.
Experts in the information security industry comment on the recent data breach at Anthem, America’s second largest health insurer.
Richard Moulds of Thales e-Security comments on an important partnership between Gem and Thales to bring HSM security to Bitcoin transactions and wallets.
Tom Neaves of Trustwave discusses how the increased awareness about cyber security at the board level is a step in the right direction.
Recently, the Websense Security Labs issued a blog post announcing the discovery of “f0xy,” a new and emerging malware downloader.
Trustwave shares its proof-of-concept exploit code for the “GHOST” buffer overflow vulnerability in glibc (CVE-2015-0235).
Organisations that are unprepared for the new EU data protection laws could be missing out on a significant competitive advantage, says Iron Mountain.