compliance
                                More than 40% of privacy compliance technology will rely on AI by 2023
Over 40% of privacy compliance technology will rely on artificial intelligence (AI) by 2023, up from 5% today, according to Gartner. The research was conducted online among …
                                Are CISOs ready for zero trust architectures?
Zero trust is a concept that is gaining an increasingly large and dedicated following, but it may mean different things to different audiences, so let’s start with a …
                                The top four Office 365 security pain points
Many novice Office 365 (O365) shops do not know where platform-specific security vulnerabilities lie, or even that they exist. The threats that you are unaware exist do not …
                                Jon Callas: Encryption is a technology that rearranges power
In anticipation of his keynote at HITB Security Conference 2020 in Amsterdam, we talked to Jon Callas, a world-renowned cryptographer, software engineer, UX designer, and …
                                Employees aware of privacy risks, but unsure of how they affect the workplace
62 percent of employees are unsure if their organization has to comply with the recently-enacted CCPA, which gives California residents enhanced consumer data privacy rights, …
                                What the government infosec landscape will look this year
The information security landscape seems to evolve at a faster clip each year. The deluge of ever-changing threats, attack techniques and new breaches making headlines can be …
                                How CISOs can justify cybersecurity purchases
Sometimes a disaster strikes: ransomware encrypts critical files, adversaries steal sensitive data, a business application is compromised with a backdoor… This is the stuff …
                                Companies: Lean into consumer privacy to win
The California Consumer Privacy Act became effective on the first day of 2020 and will affect millions of consumers and tens of thousands of companies. The advent of the CCPA …
                                Why outsourcing your DPO role is an effective insurance policy
Organizations are starting to take a much more considered approach to data protection as high-profile regulatory action for data mishandlings has raised both the stakes and …
                                Data ownership vs. data processing: A moral dilemma?
Work around data seems to never end. Between collection, sharing and use – the burden of this falls onto the shoulders of the CISO, the broadness of which, seems to be …
                                How Google applies Europe’s Right to Be Forgotten
Five years ago, after a landmark ruling of the Court of Justice of the European Union, Google began receiving, evaluating and acting upon requests to delist certain URLs …
                                PCI Point-to-Point Encryption Standard 3.0 released
The PCI Security Standards Council (PCI SSC) has updated the PCI Point-to-Point Encryption Standard (P2PE) and supporting program. PCI P2PE Version 3.0 simplifies the process …
Featured news
Resources
Don't miss
- How nations build and defend their cyberspace capabilities
 - Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military