
Employees aware of privacy risks, but unsure of how they affect the workplace
62 percent of employees are unsure if their organization has to comply with the recently-enacted CCPA, which gives California residents enhanced consumer data privacy rights, …

What the government infosec landscape will look this year
The information security landscape seems to evolve at a faster clip each year. The deluge of ever-changing threats, attack techniques and new breaches making headlines can be …

How CISOs can justify cybersecurity purchases
Sometimes a disaster strikes: ransomware encrypts critical files, adversaries steal sensitive data, a business application is compromised with a backdoor… This is the stuff …

Privacy ROI: Benefits from data privacy averaging 2.7 times the investment
Customer demands for increased data protection and privacy, the ongoing threat of data breaches and misuse by both unauthorized and authorized users, and preparation for the …

NIST Privacy Framework 1.0: Manage privacy risk, demonstrate compliance
Our data-driven society has a tricky balancing act to perform: building innovative products and services that use personal data while still protecting people’s privacy. To …

Companies: Lean into consumer privacy to win
The California Consumer Privacy Act became effective on the first day of 2020 and will affect millions of consumers and tens of thousands of companies. The advent of the CCPA …

Why outsourcing your DPO role is an effective insurance policy
Organizations are starting to take a much more considered approach to data protection as high-profile regulatory action for data mishandlings has raised both the stakes and …

Data ownership vs. data processing: A moral dilemma?
Work around data seems to never end. Between collection, sharing and use – the burden of this falls onto the shoulders of the CISO, the broadness of which, seems to be …

Most security pros admit to accidental internal breaches at their organization
44% percent of executives believe employees have erroneously exposed personally identifiable information (PII) or business-sensitive information using their company email …

What are the qualities of a good digital identity management program?
Growing consumer expectations, the breakdown of traditional “walls” and emerging technologies are making it hard for organizations to devise a successful digital identity …

Exploring the proper use of pseudonymisation related to personal data
In the light of the General Data Protection Regulation (GDPR), the challenge of proper application of pseudonymisation to personal data is gradually becoming a highly debated …

The rise of continuous crowdsourced security testing for compliance
A large percentage of organizations and institutions are moving toward a rigorous, continuous testing model to ensure compliance, a Synack report reveals. As part of this …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains