Category: EN

Shhh. Did you hear that?

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> It’s Day One of EFF’s summer membership drive for internet freedom! Gather round the virtual campfire because I’ve got special treats and a story for you: New…

UK Retailers Sue Amazon For £1bn Claiming Data Misuse

Independent retailers sue Amazon for £1bn in biggest-ever UK retail case alleging company misused their data to launch rival products This article has been indexed from Silicon UK Read the original article: UK Retailers Sue Amazon For £1bn Claiming Data…

WeLiveSecurity wins Best Cybersecurity Vendor Blog award!

The award is an excellent opportunity for us to thank our readers and to recognize the depth of talent of ESET’s security researchers and writers This article has been indexed from WeLiveSecurity Read the original article: WeLiveSecurity wins Best Cybersecurity…

Cloud migration expands the CISO role yet again

The CISO role used to be focused primarily on information security — creating and implementing policies to safeguard an organization’s data and IT infrastructure from cybersecurity threats. However, as organizations rapidly migrate to cloud environments, the responsibilities and challenges for…

GDPR turns six: Expert discusses AI impact

The European Union’s GDPR policy came into effect six years ago. Since then, it has become widely regarded as the standard for data sharing, but the rise of new technology has questioned its suitability and relevance. In this Help Net…

Security providers view compliance as a high-growth opportunity

85% of managed service and security providers face significant challenges maintaining compliance for customers, with lack of resources, expertise, or technology cited as the most common roadblocks to offering managed compliance, according to Apptega. That being said, the survey also…

Growing Cyber Threats Amid Israel-Palestine Tensions

Growing Cyber Threats Focus on Ransomware, Infostealers, and Defacements This blog continues our geopolitical series, highlighting the growing cyber threats during the ongoing Israel-Palestine tensions. Recent months have seen a significant increase in cyberattacks targeting Israeli institutions, with a particular…

Cloud Penetration Testing: Tools, Methodology & Prerequisites

Businesses increasingly migrate to cloud-based solutions for storage, applications, and critical functions. While the cloud offers scalability and agility, it also introduces new security challenges. Cloud penetration testing is a crucial defence mechanism for proactively identifying and addressing these vulnerabilities.…