Navigating the General Data Protection Regulation mini guide
By: McAfee, Inc. View more from McAfee, Inc. >>
Download this next:
Data privacy under the GDPR, machine learning, and more
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week’s Computer Weekly, we take an in-depth look at GDPR – the new EU General Data Protection Regulation.
With a May 2018 deadline and severe fines for non-compliance, organisations need to prepare for what could be the most significant changes in data management in the past twenty years.
We also hear how one firm is using machine learning to revolutionise online fashion retail, examine how CIOs can apply lessons from buying software to improve digital transformation, and much more.
Read the issue now.
These are also closely related to: "Navigating the General Data Protection Regulation mini guide"
-
Top MITRE ATT&CK techniques from criminal/APT groups
By: McAfee
Type: Research Content
McAfee’s latest report incorporates not only the malware zoo, but new analysis for what’s being detected in the wild.
It also covers:
- Threats to sectors and vectors
- Sunburst malware and the SolarWinds supply chain compromise
- Top MITRE ATT&CK techniques in Q4 2020 from criminal/APT groups
- And much more
Download the full report to uncover it all.
-
Data protection: Not just about personal data and compliance
By: TechTarget ComputerWeekly.com
Type: eGuide
Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.
Fortunately, the need to comply with the General Data Protection Regulation (GDPR) from 25 May 2018 and planned UK legislation designed to align perfectly with the GDPR is likely to drive most companies handling EU citizens’ data to reassess their data protection capabilities, particularly in relation to personal data.
However, the need for every business to pay attention to data protection is underlined by the fact that data breaches have been shown to have a direct correlation to falls in share prices, sometimes wiping off tens of millions from the market value.
Data protection is not only important from a compliance and business value protection point of view, it is also key to fostering the digital economy and gaining a competitive edge, according to UK information commissioner Elizabeth Denham.
Failure to protect and handle data correctly can also result in punitive actions for companies participating in the digital economy, as Google found out recently when a consumer protection organisation in Denmark asked the government to investigate allegations that Google is breaking privacy laws by not limiting how long it stores personal data.
As companies move increasingly into the cloud, it is important that they adapt their data protection strategies accordingly, but at the same time, experts say enterprises should not forget tape storage when it comes to data protection, nor should they overlook cloud storage because of the agility it affords.
However, before launching into cloud-based storage, there are several key questions organisations need to ask to ensure that a cloud-based data storage and protection strategy is right for them.
Find more content like what you just read:
-
Understanding Zero Trust Security
By: Atlassian
Type: White Paper
Inside this white paper, find the current state of workplace security, the basic principles of the Zero-Trust security model, and how you can begin your journey towards a Zero Trust-secure workplace environment.
-
Corporate Web Security - Market Quadrant 2021
By: Cisco Secure
Type: Analyst Report
Radicati Market Quadrants are designed to identify top vendors within specific technology markets. Get this report to learn why Cisco Umbrella is ranked as a Top Player by Radicati and to compare strengths and weaknesses against other web security leaders.
-
Remediating IT vulnerabilities: Quick hits for risk prioritization
By: TechTarget Security
Type: eGuide
There's no way to eradicate all IT vulnerabilities, but the ability to spot critical ones is essential. This expert tip provides best practices to identify and prioritize vulnerabilities that will have the greatest impact and how to deploy limited resources in the most effective way.
-
Computer Weekly – 7 November 2017: The ethics of software development
By: TechTarget ComputerWeekly.com
Type: Ezine
Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.
-
MITRE ATT&CK, a guide for businesses in 2022
By: TechTarget ComputerWeekly.com
Type: eBook
Mitre ATT&CK is a framework, but it can also serve as a foundation to address cybersecurity as a whole moving forward. Download this e-guide and learn more about the Mitre ATT&CK framework, and which trends are shaping the way this tool can be applied to cyber security around the globe.
-
PCI DSS AS A FOUNDATION FOR GDPR COMPLIANCE
By: Comforte AG
Type: White Paper
The latest iteration of EU legislation regarding personal data is the GDPR, applies to many more organizations than the DPD and the repercussions for non-compliance are significantly more severe. Download this white paper to access a roadmap on how organizations can effectively protect personal and cardholder data.
-
Top Mobile Data Protection Best Practices
By: TechTarget Security
Type: eGuide
Mobile data protection is an extremely relevant topic in this day and age. With people now combining their work phones with their personal phones, important data is at risk in multiple ways. Check out this expert E-Guide and learn about the top five ways to secure your phone and make sure your personal and work information stays yours.
-
Debunking APT myths: What it really means and what you can do about it
By: TechTarget Security
Type: eGuide
This E-Guide defines APT, dispels common myths and explains what you can do about this adversary. Additionally, uncover why the idea of keeping intruders out with traditional, perimeter-based security is useless against APT and how you can best protect against modern security threats.
-
Mobile data protection best practices
By: TechTarget Security
Type: eGuide
Check out this E-Guide for the top 5 mobile data protection best practices to ensure your corporation's protection.
-
An effective mobile device security policy
By: TechTarget Security
Type: eGuide
Read this expert E-Guide to find your starting point on how to write an effective mobile device security policy and reign successful over the threats they present.
-
4 ways to scale to any size
By: Atlassian
Type: White Paper
With both remote work and cloud becoming foundational for most workspaces, scalability has become one of the top priorities for IT organizations across industries and across the globe. In this report, explore 4 ways Atlassian Cloud helps you scale, from any size to enterprise.
-
Endpoint and antimalware protection for small to large businesses
By: Carbon Black
Type: eGuide
Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.
-
Cross-regulatory compliance made simple-read more
By: Comforte AG
Type: White Paper
Understanding current regulatory expectancies and complying accordingly is crucial to the survival of any business storing potentially at risk data. Read this white paper to learn about recent international data protection regulations and discover how you can develop a data-centric compliance strategy.
-
SASE: The driver of your SaaS security journey
By: Palo Alto Networks
Type: White Paper
SaaS applications have become popular in recent years due to their widespread availability, ease of use, and low costs – but they’re not always secure. In this white paper, you will learn about how a SASE solution is designed to assist your cloud transformation and safely adopt SaaS applications. Download now to learn about solution benefits.
-
Protect, detect, and recover data from ransomware – quickly and fully
By: Commvault
Type: White Paper
Access this white paper to discover how you can protect, detect, and recover data successfully to mitigate the risk of ransomware for your business using Commvault.
-
Industry solution brief: Cyber insurance
By: Symmetry Systems
Type: Product Overview
Organizations and the data they manage are major targets for cybercriminals, resulting in an increase in the demand for cyber insurance. This product overview explores how Symmetry Systems DataGuard can help organizations gain greater visibility into their data, facilitating more effective cyber insurance with lower premiums. Read on to learn more.
-
MicroScope January 2014: A special issue looking at software defined networking
By: TechTarget Security
Type: Ezine
The first issue of 2014 provides some insight in managed services, software defined networking, security and data centres
-
How tech companies can improve security with DataGuard
By: Symmetry Systems
Type: Product Overview
Technology companies are defined by their ability to drive innovation. Because of frontier-like spaces that these organizations occupy, they are naturally predisposed to security risk. This solution brief investigates the potential security benefits technology companies can gain by utilizing Symmetry Systems DataGuard. Read on to learn more.
-
How DataGuard secures manufacturers
By: Symmetry Systems
Type: Case Study
Manufacturing organizations collect vast amounts of data from their customers, supply partners, research & development projects, and more. With so much data, manufacturers are high-priority targets for cybercriminals. Download this white paper to learn how Symmetry Systems DataGuard can help defend manufacturers from cyberthreats.
-
February Essentials Guide on Threat Management
By: TechTarget Security
Type: Essential Guide
Today, security pros must fight on multiple fronts as cybercriminals find new ways to exploit customers and their users. In this Information Security Essential Guide, get a comprehensive look into today’s threat landscape and gain new strategies to tackle emerging cyberattacks.
-
Threat Management: Devising a new strategy to tackle today's cyberattacks
By: TechTarget Security
Type: Essential Guide
This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
-
ISM Essentials Guide – Threat Management
By: TechTarget Security
Type: Essential Guide
In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.
-
How DataGuard can defend retail customer data
By: Symmetry Systems
Type: Product Overview
Retail and e-commerce businesses have been all over the news, being the victims of a plethora of cyberattacks. With customer data at stake, a cyberattack places retail and e-commerce at significant risk. This solution brief looks at how Symmetry Systems DataGuard can help secure e-commerce organizations and their data. Read on to learn more.
-
Increasing Compliance with Regulations in Digital Banking
By: jscrambler
Type: White Paper
While digital banking has taken the financial services sector like wildfire it has come with new risks, and new compliances. This white paper presents an analysis of compliance and regulation for digital financial services, focusing on specific compliance laws, breaking them down, and guiding you through them. Read on to learn more.
-
DataGuard for communications & media companies
By: Symmetry Systems
Type: Product Overview
As communications and media companies rely heavily on customer data, they are a prime target for hackers trying to steal that data. DataGuard is a data security posture management (DSPM) solution that communication & media organizations can use to better understand their data, so that they can better secure it. Read on to learn more.
-
MicroScope – June 2019: Sourcing IT among the clouds
By: MicroScope
Type: Ezine
Outsourcing is changing as the anything-as-a-service model takes off.
-
Securing energy, oil & natural gas companies’ data
By: Symmetry Systems
Type: Case Study
Energy, oil, & natural gas companies are integral to the way the modern world runs. When malicious threat actors attack these organizations, they are attacking infrastructure that is critical to homes, cities, and entire industries. Read on to see
-
The Complete Pocket E-Guide to Cloud Security
By: Nexum
Type: eGuide
As today’s organizations come to rely on cloud applications, capabilities and environments in order to conduct their business, cloud security has become a necessity. Read this e-guide to learn about today’s cloud security challenges and how to develop your own cloud security strategy.
-
Essential Guide to Threat Management
By: TechTarget Security
Type: eGuide
Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.
-
Data Protection Ascends the Business Agenda
By: TechTarget ComputerWeekly.com
Type: eGuide
This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.
-
Meeting compliance with integrated risk platforms
By: ServiceNow
Type: White Paper
In our age of digital innovation as threats and risks continue to advance, it can be difficult for legacy systems to keep up. Along with this, rapid shifts in regulations have forced companies to adapt faster than their systems allow them to. Read this white paper to learn more about the potential benefits of an integrated risk platform.
-
The 6 board duties for promoting high cybersecurity standards
By: SubRosa
Type: White Paper
Dive into this white paper for the 6 duties of modern boards for maintaining high cybersecurity standards, as well as a look at the role of integrated risk management systems in today's businesses.
-
Financial services & insurance security: Protecting customer & financial data
By: Symmetry Systems
Type: Product Overview
Legacy cybersecurity technologies and processes are designed to defend the perimeter and endpoints, not the sensitive data the threat actors want to attain. This product overview addresses the challenges financial services and insurance companies face when securing data and looks at how DataGuard can help solve them. Read on to learn more.
-
How to approach ASM step-by-step
By: Halo Security
Type: eBook
In the absence of attack surface management, many traditional approaches to minimizing external risk fail to secure every asset within a business. Download this e-book to access a guided approach to attack surface management, complete with a 7-step plan to testing and monitoring the security of your attack surface.
-
3 phases of privacy program automation
By: OneTrust
Type: eBook
As privacy legislation has expanded in recent years, so has the scope of the privacy programs that support it. This e-book looks at how automation allows organizations to simplify and navigate the increasingly complex privacy compliance landscape. Download now to learn more.
-
Why visibility is key when responding to a data breach
By: PKWare
Type: eBook
The impact of a data breach will be felt far beyond just the theft of or inability to access sensitive and private data. Read on to understand why data security should be a top business priority so that organizations can minimize the far-reaching ripple effects of a sensitive data breach.
-
The core tenets of data stewardship
By: FormAssembly
Type: eBook
For organizations that need to collect and process personal data, an erosion of consumer trust and an increasingly complex regulatory environment present new challenges. But through good data stewardship, organizations can collect personal information in a fair and transparent manner. Download this e-book to explore how.
-
eGuide: Information Security - Buyer's Guide to Messaging Security
By: TechTarget Security
Type: eGuide
Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.
-
Implementing a Governance, Risk and Compliance (GRC) Strategy – North America Edition
By: ISC2
Type: White Paper
Governance, risk and compliance (GRC) facilitates the collaboration needed to achieve strategic goals. This white paper serves as a guide to GRC implementation, giving an introduction to GRC strategy and its benefits, followed by an in-depth analysis of several compliance regulations. Read on to learn more.
-
5 important cybersecurity & privacy regulations to review
By: Graylog
Type: eBook
Examine this 23-page e-book to gain insight into the top 5 most important cybersecurity & privacy regulations to keep top of mind, alongside detailed frameworks for constructing log monitoring and breach response processes.
-
Building a Safer Future in Finance
By: Kaspersky
Type: White Paper
Tap into this paper to examine 8 key trends in the Financial Services landscape in 2021 and how cyber risks connected with these new trends can potentially damage customer trust.
-
Addressing security compliance with privileged access management (PAM)
By: CyberArk
Type: eBook
Complying with data privacy and information security regulations is a challenge for most organizations. This e-book reviews privileged access management (PAM) requirements imposed by various data privacy and information security regulations, and looks to formulate strategies that you can use to maintain compliance with PAM. Read on to learn more.
-
Tips to Achieve Compliance with GDPR in Cloud Storage
By: Parsec Labs
Type: eGuide
Organizations that must retain GDPR compliance should have an operational policy and protocols related to their business’ storage and processing of personal data—this imperative extends to cloud storage, as well. Read the following e-guide to achieve cloud storage GDPR compliance with expert tips.
-
Breakdown of location & industry compliance requirements
By: Arctic Wolf
Type: eBook
To stay on top of your company’s compliance obligations, access this 26-page cybersecurity compliance e-book, which includes an overview of compliance requirements for a myriad of industries and locations (local and international).
-
Simplifying GDPR Compliance
By: PKWare
Type: eBook
Since its inception in 2018, the General Data Protection Regulation (GDPR) has cost organizations in the EU more than $330 million USD in collective fines as a result of non-compliance. Read this e-book to learn more about the costs of non-compliance and discover insights for simplifying GDPR efforts.
-
IT Decision Checklist: Messaging Security
By: TechTarget Security
Type: eGuide
Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.
-
MicroScope – May 2018: Bundles deliver surprise package for SMEs
By: MicroScope
Type: Ezine
An issue looking at the growing attraction of bundles for small customers plus a look at network security issues.