Remove 10
Remove 2016 Remove 2017 Remove Financial Services Remove IT
article thumbnail

“Am I a CII operator?” – New regulation in China provides more clarity

Data Protection Report

China’s Cyber Security Law ( CSL ), enacted in 2016, requires operators of critical information infrastructure ( CII ) to follow a number of enhanced security obligations, including storing within China all personal information and important data collected or generated during their operations in China. Scope and identification of CII.

article thumbnail

SER’s growth double that of ECM market competition

Info Source

(29 May 2018 – Bonn) Around 10% revenue growth: The SER Group has further strengthened its top positioning as the largest European software vendor for enterprise content management * (ECM). In the fiscal year 2017, the SER Group grew more than twice as much as the entire ECM market [1] [1]. compared to 2016.

ECM 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Cybersecurity Startups to Watch in 2022

eSecurity Planet

We’ll start with the top 10 overall and then look at other noteworthy startups in a number of markets. Top 10 Cybersecurity Startups. Series A SenseOn 2017 London, UK 61 $26.4 Enterprise and service providers are currently available, with a free community subscription coming soon. Series B SECURITI.ai

article thumbnail

U.S. Warns of Threat to Financial Industry Posed by North Korean Cyberattacks

Data Matters

a 2017 ransomware cyberattack that infected hundreds of thousands of computers and IT resources in over 150 countries, and the Digital Currency Exchange Hack, a hack into a digital currency exchange that stole approximately $250 million worth of digital currency. Recent examples of cyberattacks attributed to North Korea include WannaCry 2.0,

article thumbnail

Integrating Long-Term Digital Preservation into Your Information Governance Program: First Steps

Preservica

The 2016 IGI Benchmark Report on The Governance of Long-term Digital Information confirmed that nearly all organizations represented have digital records and information that keep or need to keep in excess of 10 years. Download the Information Governance Initiative (IGI) benchmark report and the 2017 benchmark highlights.

article thumbnail

Nation-State-Sponsored Attacks: Not Your Grandfather’s Cyber Attacks

Data Matters

Distributed denial-of-service (DDoS) attacks have long been a choice weapon to disrupt power grids or shut down access to servers and websites. DDoS attacks attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

article thumbnail

Six big takeaways for financial institutions from CBA LIVE

CGI

Six big takeaways for financial institutions from CBA LIVE. Tue, 07/10/2018 - 04:34. From 2012-2016, attendees listed the regulatory environment as their number one concern. After coming in second in 2017, “innovating and creating new products and solutions” broke through as the top issue this year.