We address insider rIsk using protections across three key technologies: data protection, contextual risk-based access controls, and analytics. This blend of protection helps organizations take control over the risk that insiders pose in a manner which no combination of point solutions could possibly do. That’s because with Netskope Intelligent SSE our protections work together, with single-pass policy enforcement and the capabilities to visualize, understand, and control insider risk.more →
This month we are sharing a blog from our security partner Radware that takes a look back over the 12 months since GDPR came into force.
Data breaches are expensive, and the costs are only going up.
Those reporting attacks that cost 10 million USD/EUR/GBP or more almost doubled from last year — from 7% in 2018 to 13% in 2019.more →
You can’t turn on the news without hearing about Brexit, but exactly how it is going to affect your business in relation to data protection?
What UK companies should do about data protection and GDPR when we Brexit
Six Steps to GDPR Compliance post Brexit:
- Get a hold of yourself.
Health insurance company BUPA has been hitting the headlines over the past year or so due a significant data breach that took place in early 2017.
Between January 6th – March 11th 2017, an employee managed to access their customer relationship management system (SWAN), and extract credentials of 547,000 global customers.more →
2018 was a big year for cybersecurity, with increased usage in areas such as cloud adoption, AI and a move away from perimeter-based security systems. 2019 looks set to be an equally important year so we thought we would look ahead to what we think will be at the forefront in the next 12 months and list our 2019 Cybersecurity Predictions.more →
Living In the Clouds
You really can’t talk about IT these days without mentioning cloud or something-as-a-service. For some it is hard to remember a time when we did not have the cloud, at least in some basic form. But I do remember the beginnings, and for me the whole cloud journey has come full circle.more →
Ever wondered what it’s like to experience a cyber-attack? Want to know what the warning signs are? This article recreates a typical ransomware attack scenario of what a business may go through in the first 24 hours when experiencing a data breach.
Fictional high street shoe retailer Shoes-4-U, with branches in every town nationwide, has recently received an email from a supplier.more →
In Part 1 of this GDPR blog series, we looked at the PII threat landscape and the legal & financial consequences of technology failure. In Part 2, we highlighted the major provisions in the GDPR for technological measures to protect data. In Part 3, we examined some of the guiding principles to be considered in relation to the technological impact of the GDPR within an organization.more →