How Advanced WAF can bolster app security The boundary between data compliance and breaking the law is becoming increasingly fine.…
Browsing: Data Protection
Cloud Security Alliance Global Enterprise Advisory Board Publishes State of Cloud Security 2018 The report, authored by the CSA Global Enterprise…
More interesting ideas emerged when the panel discussed data protection officers (DPOs). It was agreed that these shouldn’t take on…
It has been reported that Telegram has been banned in Russia, after they refused to hand over encryption keys. Russia’s…
Yesterday, Great Western Railway sent a number of password reset email notifications to its customers, in response to it becoming aware of “unauthorised…
Following the news that vulnerabilities have been found in Natus Medical devices, Leon Lerman, Co-Founder and CEO at Cynerio commented below. Leon…
Even given the recent Facebook/Cambridge Analytica scandal, Mark Zuckerberg just announced that the social media platform won’t apply the stringent new…
It has been revealed that the cyberattack the American airline Delta suffered last year may have exposed customer payment information. The airline…
From Firewall Rules to Router Hardening: 3 Steps to Solidify SD-WAN Security Software-defined wide access networks (SD WANs) are becoming…
Crowd Research Partners today released the 2018 Cloud Security Report which includes the following takeaways: Cloud Security Issues-The top three security…