Please turn on your JavaScript for this page to function normally.
face
How to glean user insight while respecting personal privacy

While each person has a unique personality and identity, the digital world has no patience for individuality. The web tries with its every fiber to store, analyze, and …

GDPR
661 fines issued since GDPR became enforceable, totaling €292 million

3 years since rolling out in May 2018, there have been 661 GDPR fines issued by European data protection authorities. Every one of the 28 EU nations, plus the United Kingdom, …

cloud
Privacy regulations making cloud migration complex

Digital transformation is driving multi-cloud migrations, as 85 percent of organizations use at least two cloud providers for data storage and analytics, while 40 percent use …

ship
Navigating the waters of maritime cybersecurity

In January 2021, new International Maritime Organization (IMO) guidelines on maritime cyber risk management went into effect. Around the same time, the U.S. government …

connected car
CAM sector cybersecurity challenges and how to mitigate them

ENISA discloses an in-depth analysis of the cybersecurity challenges faced by the connected and automated mobility (CAM) sector and provides actionable recommendations to …

hands
Solve evolving enterprise issues with GRC technology

For this interview, we sat down with Blake Brannon, CTO at OneTrust, to discuss governance, risk management, and compliance (GRC). More than 8,000 customers, including half of …

gap
Middle market companies facing a record number of data breaches

Middle market companies possess a significant amount of valuable data but continue to lack appropriate levels of protective controls and staffing, according to a report from …

Door
Encryption is either secure or it’s not – there is no middle ground

The principle of end-to-end encryption underpins a system of communication where only the communicating users can read the messages. To this end, it exists to prevent any …

person
The impact of the CCPA on companies’ privacy practices

A new DataGrail report examined how millions of California consumers are exercising their privacy rights – to access their data, delete their data, and stop the sale of …

user
3 steps to meeting data privacy regulation compliance through identity programs

Cybersecurity is undeniably a business-critical function. That’s only been reinforced over the past few months by the SolarWinds and Exchange attacks. Consequently, a recent …

shield
Why certificate automation is no longer just “nice to have”

We’ve all heard the shocking stories about the outages at what should have been bullet-proof organizations like Microsoft, Spotify, and a California Covid-19 testing …

fist
What businesses need to know to evaluate partner cyber resilience

Many recent high-profile breaches have underscored two important cybersecurity lessons: the need for increased scrutiny in evaluating access and controls of partners handling …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools