Data breach reports delayed as organizations struggle to achieve GDPR compliance

March 15, 2019

Businesses routinely delayed data breach disclosure and failed to provide important details to the ICO in the year prior to the GDPR’s enactment. On average, businesses waited three weeks after discovery to report a breach to the ICO, while the […]

Seeking Mature Data Privacy and Security Compliance

March 14, 2019

Life used to be so simple, according to Aberdeen research. Rather, regarding enterprise data privacy and compliance, things used to be simpler. It used to be that you’d deny access by default and allow access by selective exception. Now, the […]

How to address IoT’s two biggest challenges: data and security

March 5, 2019

You don’t even need to Google “data growth and IoT” to see the trend for the internet of things; all research shows a steep curve up and to the right. The reason is pretty simple: We’re collectively trying to capture […]

Network security, Vulnerabilities

Why You Should Integrate IoT Security Into Your Vulnerability Management Program

March 19, 2019

Via: Security Intelligence

It’s safe to say that the internet of things (IoT) is mature enough that it’s on everyone’s radar by now. The IoT as we know it has been around for more than a decade, but it wasn’t until about five […]

Network security

EU adopts EU Law Enforcement Emergency Response Protocol for massive cyberattacks

March 19, 2019

Via: Security Affairs

Europol announced the adoption of a new protocol for law enforcement bodies in the EU and abroad to respond to major cyber cross-border cyberattacks. The protocol dubbed EU Law Enforcement Emergency Response Protocol aims at handling major attacks such as […]

Mobile security, Privacy protection

Android Q will come with improved privacy protections

March 18, 2019

Via: Help Net Security

Android Q, the newest iteration of Google’s popular mobile OS, is scheduled to be made available to end users at the end of August. While we still don’t know what its official release name will be, the first preview build […]

Cloud security, Malware

Cryptojacking of businesses’ cloud resources still going strong

March 18, 2019

Via: Help Net Security

In the past year or so, many cybercriminals have turned to cryptojacking as an easier and more low-key approach for “earning” money. While the value of cryptocurrencies like Bitcoin and Monero has been declining for a while now and Coinhive, […]