Blog

GDPR: Top 10 Technologies To Aid Compliance (Part 5 of 5)

Max Pritchard

In Part 1 of this GDPR blog series, we looked at the PII threat landscape and the legal & financial consequences of technology failure. In Part 2, we highlighted the major provisions in the GDPR for technological measures to protect data. In Part 3, we examined some of the guiding principles to be considered in relation to the technological impact of the GDPR within an organization.

more →

Blog

Spectre And Meltdown, The Good News

Max Pritchard

Vulnerabilities in modern computers leak passwords and sensitive data

Spectre and Meltdown are the names of theoretical attack techniques which exploit weaknesses in many modern microprocessor chips. The attacks seem to be extremely limited in scope – able only to allow an unauthorised programme to read data from parts of the computer memory that it ought not to have access to.

more →

Blog

GDPR – Is Data Encryption Really Necessary?

Max Pritchard

It’s no secret that the proposed EU General Data Protection Regulation is technology-agnostic. It demands that companies implement proportionate, cost-effective controls to protect the personal data of EU residents, as well as enabling data subjects to exercise their rights over their own personal data. The only technology areas specifically mentioned in the regulation, currently, are pseudonymization and data encryption.

more →

Blog

Making A DDoS Hacker – Games, Cheats, Booters And Remote Control

Max Pritchard

 

There’s something magical about remote control.

The world I grew up in involved getting up and crossing the room to select from one of three channels of TV – or turning the box off. Today, remote controls festoon every surface of my living room and the idea of getting up to operate a device is as anachronistic as using the word “box” to describe a television.

more →