You've requested...

Share this with your colleagues:

Navigating the General Data Protection Regulation mini guide

If a new window did not open, click here to view this asset.

Download this next:

Top 10 cyber crime stories of 2018

The year of 2018 was marked by several reports on the spiralling cost of cyber crime to businesses as well as to the national and the global economy, as the cyber security industry turned to the bottom line as a motivator for decision makers to prioritise defence against cyber criminal activities. Here are Computer Weekly’s top 10 cyber crime stories of 2018.

These are also closely related to: "Navigating the General Data Protection Regulation mini guide"

  • Preventing data leaks & securing remote access: Case study

    For Caglayanlar, an automotive parts distributor, data is constantly growing, and they needed an effective way to manage and secure remote access to their data.

    Read this case study to discover how they overcame the following challenges:

    • An increasingly complex security environment
    • No central management console
    • End to end protection across remote & mobile devices

  • Top 10 IT security stories of 2018

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here’s a look back over Computer Weekly’s top 10 IT Security stories of 2018.

Find more content like what you just read:

  • Top 10 IT security stories of 2018

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.

    Download

  • Data privacy under the GDPR, machine learning, and more

    In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.

    Download

  • Cyber Threats: A perfect storm about to hit Europe?

    As the internet of things becomes increasingly popular, some European countries lack the capabilities to defend against cyber security threats. Meanwhile, in the private sector, hackers are stepping up attacks on manufacturing and telecommunications companies, this report from Marsh & McLennan reveals.

    Download

  • Computer Weekly – 15 October 2019: Securing the internet of things

    In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.

    Download

  • CW ANZ: Prepare for EU data law

    Faced with the double whammy of complying with Australia's upcoming data breach notification law and Europe's new data protection rules, Australian firms are behind where they need to be in their compliance efforts. In this month's CW ANZ, learn how Australia is getting ready for the GDPR and the challenges they are facing in meeting the new laws.

    Download

  • Your GDPR guide

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

    Download

  • Computer Weekly – 15 October 2019: Securing the internet of things

    In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.

    Download

  • Managing data breaches

    In this e-guide, read about the data breaches that have occurred across the region in recent years and the lessons you can learn to respond better to data breaches, which are all but inevitable at every organisation large and small.

    Download

  • Computer Weekly – 16 January 2018: How to fix the Meltdown and Spectre chip flaws

    In this week's Computer Weekly, as CIOs come to terms with the Meltdown and Spectre processor flaws that make every computer a security risk, we examine how to protect your IT estate. We find out how Alexa-style smart speakers can help with CRM strategies. And we look at how the public sector is implementing DevOps. Read the issue now.

    Download

  • The complete guide to preventing data leaks

    Organizations tend to spend their efforts on protecting their data against hackers while overlooking the impacts of data leaks caused by human error. This e-guide provides comprehensive insight into the causes and risks of data leaks, as well as preventative measures and compliance best practices – read on to get started.

    Download

  • Computer Weekly – 24 October 2017: Where will AI take us?

    In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.

    Download

  • State of GDPR in mainland Europe

    The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.

    Download

  • Buyer's Guide to EU General Data Protection

    The race is on to get ready for GDPR next year. In this 16-page buyer's guide, Computer Weekly looks at how to deal with data under the regulation, how compliance will affect businesses, and what organizations should do to prepare.

    Download

  • Your expert guide to the highlights of Infosecurity Europe 2017

    Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.

    Download

  • CW Benelux May 2018

    GDPR becomes law at the end of this month, so we take a look at how organisations in the Netherlands are preparing for it. Cover your eyes if you are squeamish as you only have days left to get things right.We lead this issue with a story published in February, so perhaps things have changed. But if not, some organisations should be concerned.

    Download

  • GDPR: Risk, opportunity and what it means for security professionals

    This article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.

    Download

  • Hacking the Human Operating System

    Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.

    Download

  • 2021: CPA, GDPR, and NYDFS compliance

    Get a closer look at CCPA, steps for securing data to comply with GDPR, and 5 secure steps to NYDFS compliance, all inside the 2021 Data Privacy Toolkit.

    Download

  • Ransomware in the industrial sector

    Ransomware has steadily become one of the most prevalent and destructive cyberthreats, especially across the industrial sector. Read this research report to dive deeper into ransomware observations, research findings, common attack patterns, predictions, and more.

    Download

  • Computer Weekly – 3 July 2018: Future-proofing Gatwick Airport's technology

    In this week's Computer Weekly, we go behind the scenes at London Gatwick Airport and talk to its CIO about a critical network upgrade to support passenger growth. Our latest buyer's guide examines automation and intelligent systems management. And we assess the latest technologies for boosting storage performance. Read the issue now.

    Download

  • Continuous monitoring and log management for business-critical apps

    Learn how Onapsis allows you to deliver actionable risk intelligence, continuous threat monitoring, and automated policy and risk governance.

    Download

  • CW APAC, June 2020: Trend Watch - data protection

    Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.

    Download

  • Discover the most successful types of cyberattacks

    As technology continues to advance, cybercriminals are leveraging new capabilities into more sophisticated cyberattacks. PandaLabs, Panda Security's anti-malware laboratory, tracks threat data in real time and has compiled it into a report. Download the report for highlights of 2018's cybersecurity trends, as well as emerging threats for 2019.

    Download

  • Intro to email & file transfer security

    As email grows in importance as a communication tool, it becomes an increasingly attractive target for cybercriminals – and protecting inboxes becomes more critical than ever. Read this white paper to discover the essentials of email security and ensure your organization is equipped to handle today’s threats.

    Download

  • How companies can implement an effective data security strategy

    In this white paper, learn how by adopting a truly effective data security strategy, organizations can avoid damage and establish a rock-solid foundation for cybersecurity best practices that supports the organization's business objectives in all areas.

    Download

  • CCPA: 6 key actions to take before 2020

    CCPA is one of the latest in a series of new privacy regulations globe that affects businesses and comes with significant penalties. This whitepaper outlines the key steps necessary to prepare for CCPA and highlights the importance of data-centric security to ensure your organization is adequately prepared for 2020.

    Download

  • A Computer Weekly buyer's guide to data protection

    Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture.

    Download

  • A Computer Weekly buyer's guide to data protection

    Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture.

    Download

  • Essential Guide: Securing hybrid IT infrastructure

    In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.

    Download

  • ROI of a modern privacy program

    Cisco estimates that the return on investment (ROI) for modern privacy program spending is about 2.7x the initial investment. But what about the other benefits – like competitive advantages, customer trust and even compliance? Read this e-guide for a comprehensive overview of the benefits of a modern privacy program.

    Download

  • How to keep your databases up to date with data privacy legislation

    For companies that collect user data, the GDPR was just the beginning of a regulatory onslaught; the CCPA signifies a start of a wave of similar legislation across another country, with more to follow. Check out this white paper to learn how you can map privacy controls to databases and meet data privacy requirements with MongoDB.

    Download

  • Cybercrime: How it costs more than money

    $945 billion is the estimated monetary loss from cybercrime. This is a significant figure – but when you take a closer look, you’ll see that when it comes to organizational stability, efficiency, brand damage and trust, the cost of cybercrime goes far beyond what’s taken by criminals. View this report to learn the hidden costs of cybercrime.

    Download

  • Jargon buster guide to GDPR

    In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.

    Download

  • The complete guide to database & big data security

    This report provides an overview of database and big data security market along with guidance and recommendations for finding the sensitive data protection and governance products that best meet your requirements. Read this 75-page report to enhance your understanding of the market and discover how to find a solution best-fit to your needs.

    Download

  • The complete guide to database & big data security

    This report provides an overview of database and big data security market along with guidance and recommendations for finding the sensitive data protection and governance products that best meet your requirements. Read this 75-page report to enhance your understanding of the market and discover how to find a solution best-fit to your needs.

    Download

  • Protect data from device to cloud: McAfee solution brief

    Nearly every company today uses cloud services to some extent, most store sensitive data in the cloud – however, those with effective cloud security measures represent a small fraction of the overall user base. Read this solution brief for a closer look at McAfee’s Unified Cloud Edge – designed to protect cloud data and devices.

    Download

  • Protect data from device to cloud: McAfee solution brief

    Nearly every company today uses cloud services to some extent, most store sensitive data in the cloud – however, those with effective cloud security measures represent a small fraction of the overall user base. Read this solution brief for a closer look at McAfee’s Unified Cloud Edge – designed to protect cloud data and devices.

    Download

  • Why public breaches cost more than just money

    A September 2018 attack on British Airways costing them close to $1B USD did not involve data encryption or ransom demands. Instead it saw cybercriminals using third-party code on the BA website to fraud 380,000 people out of their credit card numbers. These ‘public breaches’ are on the rise – read this white paper to learn more.

    Download

  • Out of sight, out of compliance?

    Download this whitepaper to learn more about the five key challenges for IT in 2020 that this survey uncovered.

    Download

  • SME cyber security is increasingly a business imperative

    A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.

    Download

  • Encryption for GDPR compliance

    Since the GDPR was enacted, organizations in the EU have had to tread carefully when it comes to security solutions. As it happens, the world is becoming more encrypted, and this encryption carries significant implications in data privacy. Access this white paper to learn about SecurDPS, an encryption architecture that keeps you GDPR compliant.

    Download

  • The currency of trust: why banks and insurers must make customer data safer and more secure

    Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.

    Download

  • The 12 pillars of Soccour cybersecurity

    Soccour offers 12 key cybersecurity services designed to provide their customers with scalable and manageable protection – read this portfolio overview for an exclusive look at each of Soccour’s security services, including the potential benefits it could bring to your organization.

    Download

  • Refining best practices in incident response

    Learn how your organization can revisit your incident response plans and be prepared to detect, respond, and recover as quickly as possible.

    Download

  • Compliance rules and requirements for your industry

    Download this guide to read about compliance requirements for your industry and location. Included is a summary of each rule and key requirements, along with resources for more information.

    Download

  • CW ANZ: Trend Watch – Security

    With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.

    Download

  • State of GDPR in mainland Europe

    The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.

    Download