The U.K. is strengthening its data protection laws through the Data Protection Bill (DPB), keeping in line with the GDPR and the changing technological landscape.
The GDPR is fast approaching and it is important to identify the weak links in your enterprise. Where can security be improved? Past experience has shown that third party suppliers are particularly susceptible to attacks.
Vulnerable enterprise servers are being compromised by individuals or groups looking for resources to mine cryptocurrency. The latest victims are automobile-maker Tesla and users of Jenkins servers.
Users of a lightweight blogging platform maybe have had their database passwords exposed on a public log. This issue brings around DevOps concerns, as well as questions about data protection regulations and compliance.
Fitness tracking app Strava published a heatmap of its fitness app's user activity that could have accidentally revealed the hidden locations of U.S. military bases, patrols, and forward operating bases.
Data is the currency in today’s technology-driven world, and its ever-significant value also drives the extent and increased sophistication of cyberattacks. But how exactly can data be misused to perpetrate cybercrime?
Security researchers and the Norwegian Consumer Council group recently released their findings on several smartwatches designed for kids and reported several vulnerabilities that can compromise privacy and security.
A database containing information on employees from America's top companies and military organizations has been leaked, and the incident reveals the risks involved when companies collect and sell valuable personal data
Research on how the healthcare sector has evolved as a preferred target for cybercriminals, how stolen records are monetized, what types of data are stolen, and how much they're sold for in the underground.