article thumbnail

Retail Privacy Network

Data Matters

You are invited to join privacy professionals in the retail sector for topical conversation, learning and networking at the first Retail Privacy Network meeting. This interactive meeting will include hot topics in UK/EU data privacy and cybersecurity with practical case studies on retail industry issues.

Retail 68
article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

According to a recent Ponemon Institute study , some 59% of companies experienced a third-party data breach in 2018, yet only 16% believe they are effectively mitigating third-party risk. Members gain access to third-party IT security risk management best practices via case studies, surveys, whitepapers, webinars, meetings and conferences.

Risk 117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 461 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Private Plane Owners’ Data Linked to LA Intl.

Security 110
article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

VAMOSI: Cybersecurity insurance. I would have had to spend a million of that just on cybersecurity. You know, we're talking about a couple of years old, and like any financial decision, I make the joke that security cybersecurity people were newcomers to this space of financial security. Should you do it, should you not?

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Boost your organization’s IT literacy with ongoing cybersecurity training so they recognize the threats posed by malware attacks. In cybersecurity, a bot typically refers to an infected device containing malicious software. While this case study is just a snapshot, vigilance in the app store is required.

Phishing 104