Regulatory compliance and standard requirements



Preventing identity theft in a data breach
In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.
News : Regulatory compliance and standard requirements
-
March 01, 2021
01
Mar'21
Digital secretary Dowden outlines UK post-Brexit data approach
The UK government is searching for a new information commissioner with an updated remit to use data to support growth and innovation, and plans on reaching new international data partnerships
-
February 25, 2021
25
Feb'21
GCHQ sets out rules of the road for AI in cyber
A paper produced by GCHQ shows how the intelligence agency can use artificial intelligence responsibly as a tool to protect the UK’s national security
-
February 25, 2021
25
Feb'21
Npower shuts off app after credential stuffing attack
Npower customers will have to log in to their accounts on its website after its app was withdrawn following a security breach
-
February 24, 2021
24
Feb'21
Transport for NSW hit by Accellion breach
Australian state agency Transport for New South Wales is the latest victim of the supply chain attack against Accellion’s legacy file transfer system
In Depth : Regulatory compliance and standard requirements
-
Is it time to ban ransomware insurance payments?
The former head of the NCSC recently called for a dialogue over whether or not it is time to ban insurers from covering ransomware payments. Is he on the right track? Continue Reading
-
How can healthcare organisations fight increased cyber crime in 2021?
As the Covid-19 pandemic enters what may be its most dangerous phase, we explore how healthcare organisations can ward off cyber threats while preserving their ability to deliver critical care Continue Reading
-
Picking the right IAM tools is based on more than today’s needs
With remote working now normal, it is important to take proactive steps in managing credentials across platforms that can be subject to multiple data protection regulations. IAM services can streamline this process, but care must be taken to ensure the correct one is chosen Continue Reading
Blog Posts : Regulatory compliance and standard requirements
-
How C3M is easing multi-cloud management
Managing and securing access to multiple public cloud services can be a challenge for enterprises that are embarking on a multi-cloud strategy. Besides making sure that only authorised members of ... Continue Reading
-
GDPR: Irish Data Protection Commission may show where the WWW is heading
The Irish Data Protection Commission's (DPC) annual report makes interesting reading, given that the World Wide Web is celebrating its 30th birthday this month. People regularly give away vast ... Continue Reading
-
European Court hearing into EU-US data transfer system will not happen for at least 18 months
By Kevin Cahill The European Court of Justice may not have a hearing into crucial questions about the legality of the EU-US data transfer system for at least 18 months according to a spokesperson ... Continue Reading
Opinion : Regulatory compliance and standard requirements
-
Security Think Tank: Towards a united state of security
As US president Joe Biden sets out his agenda for the next four years, we consider the opportunities for renewed international collaboration on cyber security, what aspects of cyber Biden should focus on, and ask how the industry can make its voice heard Continue Reading
-
Security Think Tank: Renewed US stability may ease cyber tensions
As US president Joe Biden sets out his agenda for the next four years, we consider the opportunities for renewed international collaboration on cyber security, what aspects of cyber Biden should focus on, and ask how the industry can make its voice heard Continue Reading
-
Security Think Tank: Biden must address insider security threat first
As US president Joe Biden sets out his agenda for the next four years, we consider the opportunities for renewed international collaboration on cyber security, what aspects of cyber Biden should focus on, and ask how the industry can make its voice heard Continue Reading
Videos : Regulatory compliance and standard requirements
-
Video: Lauri Love – why we need volunteers to fight malware
Lauri Love talks to Computer Weekly about plans to collaborate with others to tackle malware and use cryptocurrencies to create new ways for businesses to work
-
Lauri Love: how reformed hackers halted the WannaCry virus
Lauri Love presents a compelling story of the WannaCry malware that nearly brought down the NHS, and the behind the scenes work of former hackers, and security researchers that helped to prevent lives being lost. Love is facing extradition to the US after allegedly taking part in a hacking protest over the death of internet pioneer Aaron Swartz, who faced jail for using a hidden computer to downloading academic journals at MIT.
-
Lauri Love - my battle with extradition
A court ruled today that Lauri Love, a 31-year old electrical engineering student, from Suffolk, can be extradited to the US to face hacking charges.