Data Privacy & Security

Can Google Ensure True Data Sovereignty in the UK?
Data Protection & Privacy Can Google Ensure True Data Sovereignty in the UK?

In the ever-evolving landscape of cloud technology, Google's latest strategy to ensure data sovereignty with its Google Cloud Gemini 2.5 Flash service in the UK tackles a critical concern among many organizations: the need for data to remain within national boundaries. Sensitive sectors such as

How Will Microsoft's Windows Upgrades Prevent Future Outages?
Malware & Threats How Will Microsoft's Windows Upgrades Prevent Future Outages?

Rupert Marais, a seasoned specialist in endpoint and device security, joins us today to discuss Microsoft's efforts to strengthen Windows' operational resilience. In the wake of the 2024 global IT outage, Microsoft is preparing significant platform upgrades intended to protect enterprise customers

Ahold Delhaize Cyberattack Exposes Data of 2 Million Plus Individuals
Data Protection & Privacy Ahold Delhaize Cyberattack Exposes Data of 2 Million Plus Individuals

What would you do if your most sensitive data—your Social Security number, health records, and bank account details—fell into the wrong hands? This alarming situation has become a reality for over 2 million individuals affected by a recent significant cyberattack on Ahold Delhaize USA. The company,

Transforming Compliance Into a Strategic Cybersecurity Asset
Endpoint & Device Security Transforming Compliance Into a Strategic Cybersecurity Asset

In today's fast-evolving cybersecurity landscape, organizations grapple with the challenge of maintaining compliance while combating increasingly sophisticated threats. A prevalent pitfall involves equating compliance with protection, which can lead to a false sense of security. With the surge of

Non-Human Identity Management – Review
Infrastructure & Network Security Non-Human Identity Management – Review

Non-Human Identity Management (NHI) has emerged as a pivotal development in the realm of cybersecurity, reshaping how organizations manage the vast landscape of non-human digital identities. With this trend gaining traction, there's an urgent need to evaluate its progress. This overview examines

Is Phishing Training Failing to Protect Organizations?
Data Protection & Privacy Is Phishing Training Failing to Protect Organizations?

Cyber threats have emerged as a significant concern for organizations globally, with phishing, in particular, being a dominant method employed by malicious actors. Companies have traditionally relied on phishing awareness training to bolster employee vigilance against these deceptive tactics.

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later