More than a year after GDPR implementation, half of UK businesses are not fully compliant
52% of UK businesses are not fully compliant with the regulation, more than a year after its implementation, according to a survey of UK GDPR decision-makers conducted on …
61% of CIOs believe employees leak data maliciously
There is a perception gap between IT leaders and employees over the likelihood of insider breaches. It is a major challenge for businesses: insider data breaches are viewed as …
Fewer than 28% of gov.uk using DMARC effectively in line with guidelines
Only 28% of gov.uk domains have been proactive in setting up DMARC appropriately, in line with UK Government Digital Service (GDS) advice in preparation for the retirement of …
New infosec products of the week: March 1, 2019
SecBI launches new solution to help MSSPs maximize their productivity and scalability SecBI announced an automated threat detection and response solution designed to help …
Egress releases new software to enhance protection against email data breaches
People-centric data security provider Egress has announced its latest releases, which use machine learning to improve sender and end user experience, and enhance protection …
Accidental data breaches are often compounded by a failure to encrypt
83 percent of security professionals believe that employees have accidentally exposed customer or business sensitive data at their organization. Accidental data breaches are …
How can we improve adoption and ROI on security investments?
Traditionally, whenever employees are required to interact with security solutions, they push back because they don’t want their lives to be made more complicated with extra …
Privacy laws do not understand human error
In a world of increasingly punitive regulations like GDPR, the combination of unstructured data and human error represents one of the greatest risks an organization faces. …
Featured news
Sponsored
Don't miss
- How insider threats can cause serious security breaches
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap
- Applying DevSecOps principles to machine learning workloads