I had a great time talking with Min Kyriannis about the dangers of misinformation and how to begin disentangling the online web of lies and half-truths.
I had a great time talking with Min Kyriannis about the dangers of misinformation and how to begin disentangling the online web of lies and half-truths.
Happy Privacy Day to all those privacy professionals out there that work to make our digital world more safe, respectful, and private.
Now more than ever, respecting privacy in our rapidly digitizing world, is important. Over the past many years, pri
Accountability in Privacy Management
Today the privacy trends analyzed and issues that most of the organizations or service providers face across industries and geographies is one thing noticed as a common theme among the trends that have emerged is A
The case for making dashboards; clinical and business; providing real-time and actionable information goes beyond the traditional advantages. Do it right and you get the opportunity to shape the organization from the ground up!!!!
Making Actionable Da
Recently, we were pentesting a Data mining and Analytics company. The amount of data that they talked about is phenomenal and they are planning to move to Big Data. They invited me to write a blog on state of the art, Big Data security concerns and c
This is a study done by Ponemon Institute on 2016 Cost of Data Breach Study in India. This report includes 150 Indian Organisations who have participated in the benchmarking process.
This study examines the costs incurred by 37Indian companies in 12i
|
NAKIVO releases its much-awaited Backup & Replication solution v9.1. The new release takes data protection to a new level. The backup functionality extends to the untouched zones. The new release adds support for backup to tape and Linux Server Backu
(this is cross-posted from Anton on Security)
As I am expanding my responsibilities to cover some exciting data security topics (like, say, our cloud data discovery DLP), I wanted to briefly discuss a few broader issues I have noticed related to moder
This post is my admittedly imperfect attempt to “reconnect” data security controls to threats. It is also my intent to continue pulling on the thread I touched in this post— so expect more posts about that.
Let’s first get this out of the way: there a
The California Consumer Privacy Act (CCPA) has been around since 2018, as the more protective data privacy legislation of any state, but not all businesses have been acting ethically in their compliance and respect for user privacy.
As a result, the
We are surrounded! Smart devices are everywhere and being integrated into all facets of our lives, from toothbrushes to automobiles. Entire cities are becoming ‘smart’, as are factories, governments, global retail, freight logistics, and all nation
Happy Privacy Day! Now go check to see if EMOTET botnet has stolen your email and password.
Europol and a team of global law enforcement have successfully taken down part of the EMOTET botnet infrastructure and seized private data harvested by the c
Register Here : https://info.cisoplatform.com/understanding-cloud-attack-vectors
Key Pointers:
Register Here : …
Register Here : https://info.cisoplatform.com/incident-response-exercise-lifecycle-program-for-cyber-resilience
Key Discussion Pointers: