- Advertisement -

Insights

Insights and opinions on data protection, privacy and cybersecurity contributed by thought leaders from around the world.

Hardware Security Risks: Plans for Reentering the Workplace With Compromised Devices

With the significant increase in the number of cyberattacks, focus of employees returning to the office should not only be…

3 days ago

Hackers Are Targeting Remote Workers; Identity Security and Credential Management Are Essential to Keeping Your Company Safe

As the technology that supports the modern workplace expands, so do the needs for identity management and credential assurance. Rigorous…

4 days ago

The Evolution From VPN to SDP Won’t Happen Overnight

While VPNs do function well when it comes to tunneling and encrypting data from authorized users, there are a couple…

5 days ago

Electoral Register Data Is Power, So Why Do Breaches Keep Happening?

In March, electoral data for 75% of the Maltese population was exposed in a data breach, including their polling booth,…

1 week ago

Mitigating Online Social Harm: Why Enterprises Need to Start Prepping for Stricter Age Verification Laws Now

Digital identity verification connected to a government-issued identity document can help organizations confirm who users claim to be and regulate…

1 week ago

How to Seamlessly Enforce CCPA Guidelines in the Age of COVID-19

Ensuring data privacy and compliance with regulations like the CCPA involves layered, complex challenges for any business especially in the…

2 weeks ago

The Case Against Google Analytics for Organizations Collecting Personal Data

Almost 30 million website owners choose Google Analytics to gather data about their visitors. But even if you trust Google’s…

2 weeks ago

“Some Devices Allowed” – Secure Facilities Face New RF Threats

RF-enabled devices are now prevalent in the enterprise and RF security is getting harder to enforce in secure facilities that…

2 weeks ago

Tracking the Trackers: Cookies Are Subject to Opt-In Under GDPR and a Sale Under the CCPA

Those little automated data tracking mechanisms are subject to special treatment, consent, opt in and opt out requirements. Have you…

3 weeks ago

Building Cyber Resilience Post-COVID-19

As enterprises work to weather the COVID-19 crisis, they are applying the lessons learned to strengthen their cyber resilience, and…

3 weeks ago
- Advertisement -
- Advertisement -
- Advertisement -
- Advertisement -