Please turn on your JavaScript for this page to function normally.
person
User data privacy decisions can be easily manipulated

Data privacy is an important topic in the digitalized economy. Recent policy changes have aimed to strengthen users’ control over their own data. Yet new research from …

cloud complexity
Government IT decision makers worried about security risks related to cloud migration

Nearly 70% of U.S. government IT decision makers surveyed view security risks as the top barrier when migrating to modern cloud platforms, a Morning Consult survey reveals. Of …

SAP
How prepared are organizations for the challenges of the changing SAP landscape

The Tricentis, Capgemini and Sogeti report explores current SAP adoption and implementation trends, and organizations’ preparedness to deal with the challenges emerging from …

backup
A unified approach is the future of data backup

Though disaster recovery and backup solutions have always been critical components for any business, the pandemic put a spotlight on the many threats to data today. Cybercrime …

vault
Image encryption technique could keep photos safe on popular cloud photo services

The past decade has witnessed scandal after scandal over private images maliciously or accidentally made public. A study from computer scientists at Columbia Engineering …

lock
How do I select a data recovery solution for my business?

Ransomware attacks have been hitting hard lately, with over half of organizations experiencing at least one this year, according to a recent study. Recovering data often means …

identity theft
Is differential privacy the ideal privacy-enhancing computation technique for your business?

As security & risk management (SRM) leaders globally adjust to a “new normal” brought about by the COVID-19 pandemic, businesses must adapt their privacy programs for …

syringe
Vaccinate your data: Addressing and adapting to new data risks

It seems like only yesterday that we were all reading up on what the implementation of the European Union’s General Data Protection Regulation (GDPR) would mean for businesses …

iPhone
Protect your smartphone from radio-based attacks

By now, most of us are aware that smartphones are powerful computers and should be treated as such. It’s not a coincidence that most of the security tips given to smartphone …

backup
Move to all-flash object storage to occur within five years

Scality announced the results of a Vanson Bourne survey completed by IT decision makers across the UK, France and Germany. It revealed a fundamental shift in the industry …

healthcare
Ensuring HIPAA compliance when using the cloud

Accelerated by the pandemic, health IT has continued to innovate at pace, while having to balance data protection and regulatory rules. However, critical transformations – …

insider threat
What is the cost of an insider data breach?

As companies emerge from the pandemic, and 40% of employees are planning to switch jobs, corporate data is at risk. Files are being uploaded, shared, synced and emailed by …

Don't miss

Cybersecurity news