Remove links-resources
Remove Data Remove Exercises Remove Retail Remove Security
article thumbnail

2022 Cyber Security Review of the Year

IT Governance

Although there have still been a few surprises, with the death of Queen Elizabeth II and blazing heatwaves across the UK to name but two, it was a familiar year in the cyber security landscape. Cyber criminals continued to wreak havoc, with the likes of Twitter , Uber and Neopets all reporting mammoth data breaches.

Security 132
article thumbnail

A Practical Guide to Cyber Incident Response

IT Governance

Expert insight from our cyber incident responder Cyber attacks and data breaches are a matter of when, not if. A determined attacker will always be able to find their way around your defences, given enough time and resources. Now, she’s part of our cyber incident response team, helping clients with their cyber security requirements.

Risk 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Good, Bad, And The Ugly: Key Takeaways From California’s New Privacy Law

Privacy and Cybersecurity Law

California law also requires businesses that suffer a breach of security to disclose the breach to consumers, and in some instances law enforcement, if sensitive information is compromised. CCPA Background. Those amendments were the subject of a contentious battle between interested stakeholders. The CCPA does not define “household.”

Privacy 58
article thumbnail

The Good, Bad, And The Ugly: Key Takeaways From California’s New Privacy Law

Privacy and Cybersecurity Law

California law also requires businesses that suffer a breach of security to disclose the breach to consumers, and in some instances law enforcement, if sensitive information is compromised. CCPA Background. Those amendments were the subject of a contentious battle between interested stakeholders. The CCPA does not define “household.”

Privacy 58
article thumbnail

The Hacker Mind Podcast: Going Passwordless

ForAllSecure

Is there something more secure? Simon Moffatt from CyberHut joins The Hacker Mind to discuss how identity and access management (IAM) is fundamental to everything we do online today, and why even multi-factor access, while an improvement, needs to yield to more effortless and more secure passwordless technology that’s coming soon.