Classification, checklists and practical tips for the correct approach to cookies and other web technologies. Consent in everyday life consists mainly of a “yes or no” question. In contrast, the General Data Protection Regulation (GDPR) adopts a far more multi-layered term for consent and links strict requirements to valid consent. A simple situation which becomes […]
ebooks
eBook: Privacy Management Solution Buyer’s Guide
A privacy solution is the backbone of a solid privacy program, and choosing the right one for your particular business can be confusing and overwhelming at times. What answers from your own organization should you ask before you begin? What questions should you ask potential vendors as you evaluate? What minimum requirements should the solution […]
eBook: Rethinking Data Protection: The Human-centric Approach
The truth about traditional data security Traditional cybersecurity was hinged on event-centric responses: Build a wall at the perimeter, control what passes in and out through that wall, and respond when something suspicious happens. That was the defense, and it was relatively straightforward to implement. But fast-forward to today and the traditional perimeter defense method […]
eBook: Nine reasons why security leaders need to re-evaluate email security
In September 2020 Gartner released an update of its Market Guide for Email Security. The report begins by stating that “Dramatic increases in the volume and success of phishing attacks and migration to cloud email requires a re-evaluation of email security controls and processes. Security and risk management leaders must ensure that their existing solution […]
Whitepaper: Four Technologies Combine To Protect You From Ransomware Attacks
Why Read This Report As the ones responsible for recovering from outages, infrastructure and operations (I&O) pros have successfully managed recoveries from all failures but one: ransomware. Ransomware attacks do not result in the familiar type of outage; they often put the backup infrastructure itself under siege. It’s not about just recovering from a backup; […]
eBook: Tackling Data Security and Compliance Challenges – Three questions every CIO should ask about their data storage security
Three questions every CIO should ask about their data storage security. As a chief information officer, it’s your job to ask tough questions. After all, your CEO depends on you to oversee the technological direction of your organization—and to do it while striking a delicate balance between managing costs and providing the technical capabilities your […]
eBook: Company-issued Computers: What are employees really doing with them?
Now more than ever, organizations are issuing computing devices – laptops, mobile phones, desktops – en masse to their staff. There was no choice, as in March a certain submicroscopic infectious agent arrived uninvited to obliterate 2020. For so many organizations around the world, one day in March was the last day in the office […]
Whitepaper: Ransomware Protection Buyer’s Guide – Facts, myths, and real-world examples of how to protect your data from ransomware
The Growing Need for Ransomware Defense Ransomware impacts both big and small organizations across every industry. Attacks are on the rise, and their costs continue to soar. In fact, ransomware attacks increased 41% globally in 2019, with 205,000 businesses having lost access to their data. This year, ransomware is expected to cost organizations up to […]
Whitepaper: Compliance in the Age of the Cloud
Every era has its defining business risk. And as more and more data breaches hit the headlines, it’s clear that now and forevermore, data security and compliance risks will result in serious financial repercussions and loss of customer trust. Data security and compliance have always been important but previously, compliance did not have the high […]
Whitepaper: Data Leakage Prevention, Evolution or Revolution?
An Obsolete Concept: Data Leakage Stop using the term “data leakage”. The concept that data can leak out from the perimeters of an organization’s network has become obsolete. That horse has left the barn some time ago, since the unstructured data pandemic and the use of cloud infrastructure, platforms and services. To read the full […]