Michael Hall of DriveSavers provides a list of steps customers should take to protect themselves from a data breach.
Browsing: Data protection
Experts in the information security industry comment on the recent data breach at Anthem, America’s second largest health insurer.
Richard Moulds of Thales e-Security comments on an important partnership between Gem and Thales to bring HSM security to Bitcoin transactions and wallets.
Tom Neaves of Trustwave discusses how the increased awareness about cyber security at the board level is a step in the right direction.
Recently, the Websense Security Labs issued a blog post announcing the discovery of “f0xy,” a new and emerging malware downloader.
Trustwave shares its proof-of-concept exploit code for the “GHOST” buffer overflow vulnerability in glibc (CVE-2015-0235).
Organisations that are unprepared for the new EU data protection laws could be missing out on a significant competitive advantage, says Iron Mountain.
Ilia Kolochenko of High-Tech Bridge weighs in on the growing threat of ransomweb attacking businesses’ website server.
An infographic reviews the forces that threaten the security of our data, and it investigates the ways we can protect it more effectively.
Information security experts comment on International Privacy Day 2015 and the increasing need to protect users’ data.