Data Privacy & Security

Surge in Mobile Phishing Demands Robust Enterprise Security Measures
Endpoint & Device Security Surge in Mobile Phishing Demands Robust Enterprise Security Measures

Mobile phishing and other malicious activities targeting enterprise environments have surged alarmingly. The Lookout Mobile Threat Landscape Report for Q2 2024 has shown a dramatic increase in mobile threats, evidencing a 70% year-over-year (YOY) rise in phishing attempts aimed at mobile devices.

How Will the Proofpoint-CyberArk Partnership Secure Your Identity?
Identity & Access Management How Will the Proofpoint-CyberArk Partnership Secure Your Identity?

The digital transformation of businesses and the increasing complexity of cyber threats have shifted the need for more robust and adaptive security measures. Traditional endpoint and network defenses alone are no longer sufficient; instead, identity-centric security measures have become crucial.

Was Your Social Security Number Stolen in the National Public Data Hack?
Identity & Access Management Was Your Social Security Number Stolen in the National Public Data Hack?

In today's increasingly interconnected world, the integrity of our personal information is more vulnerable than ever. The recent National Public Data breach serves as yet another stark reminder of this reality, affecting potentially billions of personal records. Understanding how to mitigate the

Could Slim CD's Data Breach Expose You to Financial Fraud?
Data Protection & Privacy Could Slim CD's Data Breach Expose You to Financial Fraud?

A recent data breach at Slim CD, a prominent payment gateway provider, has affected nearly 1.7 million individuals, involving unauthorized access to sensitive financial information. This alarming incident, occurring between June 14 and 15, 2024, resulted in the theft of full names, physical

TCS and Google Cloud Unite to Fortify AI-Powered Cloud Security
Data Protection & Privacy TCS and Google Cloud Unite to Fortify AI-Powered Cloud Security

In today's digital age, the prevalence of cyber threats continues to surge, becoming more advanced and complex. To address these challenges, Tata Consultancy Services (TCS) and Google Cloud have announced a strategic partnership aimed at enhancing cloud security through cutting-edge AI-powered

DMG's Systemic Trust Achieves SOC 2 Type 1, Boosts Data Security Standards
Data Protection & Privacy DMG's Systemic Trust Achieves SOC 2 Type 1, Boosts Data Security Standards

DMG Blockchain Solutions Inc., a prominent player in the digital asset and blockchain sectors, has hit a significant milestone. Its subsidiary, Systemic Trust Company (STC), has achieved SOC 2 Type 1 compliance, underscoring the company's commitment to top-tier data security standards. Let's delve

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later