Over 700 Councils Reported Data Breaches in 2020

Over 700 Councils Reported Data Breaches in 2020

Hundreds of councils across the UK suffered data breaches last year, according to new Freedom of Information (FOI) research from Redscan. The managed security services provider used official FOI responses from over 60% of the country’s 398 local authorities to compile its new report, Disjointed and under-resourced: Cyber security across UK councils. Extrapolating these results, Redscan estimated that there were over 700 breaches reported to data protection regulator the Information Commissioner’s Office (ICO) last year. The average number…

Read More

IT Governance Blog: writing an ISO 27001 risk assessment procedure

IT Governance Blog: writing an ISO 27001 risk assessment procedure

As part of your ISO 27001 certification project, your organisation will need to prove its compliance with appropriate documentation. ISO 27001 says that you must document your information security risk assessment process. Key elements of the ISO 27001 risk assessment procedure Clause 6.1.2 of the Standard states that organisations must “define and apply” a risk assessment process. An information security risk assessment is a formal, top management-driven process and sits at the core of an…

Read More

5 minutes with Nick Heywood – Security considerations for the hybrid workplace

5 minutes with Nick Heywood – Security considerations for the hybrid workplace

5 minutes with Nick Heywood – Security considerations for the hybrid workplace | 2021-06-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

From books to biometrics: Jeff Bezos’ lasting footprint on security

From books to biometrics: Jeff Bezos’ lasting footprint on security

From books to biometrics: Jeff Bezos’ lasting footprint on security | 2021-06-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Do the Benefits of Bitcoin Outweigh the Risks?

Do the Benefits of Bitcoin Outweigh the Risks?

What do Burger King and the popular “Doge” meme have in common? They both have cryptocurrencies named after their likeliness. WhopperCoin and Dogecoin are just two examples of the thousands of types of cryptocurrencies that have caught users’ attention over the past few years. Cryptocurrencies are digital tokens generated by a computer after solving complex mathematical functions. These functions are used to verify the authenticity of a ledger, or blockchain.   Bitcoin is the most popular cryptocurrency today, increasing its…

Read More

Do the Benefits of Bitcoin Outweigh the Risks?

Do the Benefits of Bitcoin Outweigh the Risks?

What do Burger King and the popular “Doge” meme have in common? They both have cryptocurrencies named after their likeliness. WhopperCoin and Dogecoin are just two examples of the thousands of types of cryptocurrencies that have caught users’ attention over the past few years. Cryptocurrencies are digital tokens generated by a computer after solving complex mathematical functions. These functions are used to verify the authenticity of a ledger, or blockchain.   Bitcoin is the most popular cryptocurrency today, increasing its…

Read More

Do the Benefits of Bitcoin Outweigh the Risks? | McAfee Blogs

Do the Benefits of Bitcoin Outweigh the Risks? | McAfee Blogs

What do Burger King and the popular “Doge” meme have in common? They both have cryptocurrencies named after their likeliness. WhopperCoin and Dogecoin are just two examples of the thousands of types of cryptocurrencies that have caught users’ attention over the past few years. Cryptocurrencies are digital tokens generated by a computer after solving complex mathematical functions. These functions are used to verify the authenticity of a ledger, or blockchain.   Bitcoin is the most popular cryptocurrency today, increasing its…

Read More

How to be prepared for a ransomware attack: Check your data and backups

How to be prepared for a ransomware attack: Check your data and backups

Expert says ransomware attacks will happen, and your company has to be prepared long before the attack hits. TechRepublic’s Karen Roby spoke to Jim McGann, VP of Index Engines, about ransomware and how to recover from an attack. The following is an edited transcript of their conversation. Karen Roby: Jim, we talk about cybersecurity quite often, of course, but most people in mainstream America, they didn’t know what a ransomware attack even was until just…

Read More

Open XDR vs. SIEM

Open XDR vs. SIEM

Matching Resources and Business Risk with the Right Solution Gaining visibility and responding to attacks across the entire enterprise infrastructure (endpoints, servers, applications, SaaS, cloud, users, etc.) is a very tall order in today’s cybersecurity environment. Enterprises are forced to create complex security stacks consisting of SIEM, UEBA, SOAR, EDR, NDR, TIP and other tools in order to meet this challenge. For many enterprises, SIEM is the main tool for aggregating and analyzing data from…

Read More
1 3,308 3,309 3,310 3,311 3,312 3,592