GDPR A Phenomenal change to The Data Protection Industry

April 17, 2019

The General Data Protection Regulation 2016/679 (GDPR) replaces the old 1995 Data Protection Directive 95/46/EC, setting a new bar for privacy rights, security, and compliance around the world. GDPR regulates the processing of personal data belonging to people living in any of the EU member states (Data Subjects). The GDPR, a pivotal change in the history of data privacy regulations, affects each and every organization worldwide that collects, stores, and processes data on persons in the EU. The GDPR will replace legal complexity with a single, unified law.

Spotlight

WinMagic

WinMagic Inc. provides application aware Intelligent Key Management for everything encryption, with robust, manageable and easy-to-use data security solutions. WinMagic’s SecureDoc secures data wherever it is stored, providing enterprise grade data encryption and key management policies across all operating systems while enabling a unified encryption strategy across any end point and virtualized or Cloud IaaS environment. SecureDoc is trusted by thousands of enterprises and government organizations worldwide to minimize business risks, meet privacy and regulatory compliance requirements, while protecting valuable information assets against unauthorized access.

OTHER WHITEPAPERS
news image

Threat Connect Cyber Survey Report

whitePaper | January 4, 2022

Whether you are in financial services, farming, or public infrastructure, the security threat to organizations has never been greater. Today, almost every company is a technology company in some shape or form and this can be a soft underbelly - open to attack. Cyber risk is the fastest-growing risk faced by businesses globally. A wide range of statistics and sources make it clear that attackers have become even more proficient over recent years, using automation to exploit vulnerabilities at an accelerated pace and frequency. Threats are even more widespread and complex than before.

Read More
news image

The Importance of Cybersecurity Threat Detection for Utilities

whitePaper | November 25, 2019

Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive approach to ensuring cyber protection is essential and should include cybersecurity threat detection as a standard element. But not all such cybersecurity solutions are created equal.

Read More
news image

Symantec White Paper - The Cyber Resilience Blueprint: A New Perspective on Security

whitePaper | January 2, 2020

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization.

Read More
news image

2020 Cyber Security Predictions

whitePaper | January 28, 2020

This year there are some common themes that endure, so we’ll highlight these as “work in progress”. Transformations often take longer than 12 months to be identifi ed as necessary, to be executed and to become established. However, there are other themes emerging through a combination of drivers from audit, compliance security and governance that are now showing signs of infl uencing the way that cyber risks are managed in a much shorter timescale.

Read More
news image

Cyber Security After the Pandemic

whitePaper | April 29, 2021

The cyber security industry has faced two major sets of challenges over the last twelve months. The attacks and exploits affecting Solar Winds, Accellion, Microsoft and their customers have focused attention on supply chain risk, but the impact of the coronavirus pandemic has been felt more broadly across cyber security domains and disciplines.

Read More
news image

Cyber Security: Defending your digital business

whitePaper | November 13, 2019

Your business relies on its technology – but lurking around the corner are intruders who can disrupt or devalue your operations. This report shines a light on the sources of the problem, and how you can establish the control you need to get the best from IT. In every corner of the globe, businesses are building new capabilities thatrely on technology. Small businesses are automating previously‐manual processes and digitizing key tasks and information sources. At the same time, large enterprises are dedicating vast resources to analytics and to digital transformation – capitalizing on the reach and opportunities enabled by digitalized processes.

Read More

Spotlight

WinMagic

WinMagic Inc. provides application aware Intelligent Key Management for everything encryption, with robust, manageable and easy-to-use data security solutions. WinMagic’s SecureDoc secures data wherever it is stored, providing enterprise grade data encryption and key management policies across all operating systems while enabling a unified encryption strategy across any end point and virtualized or Cloud IaaS environment. SecureDoc is trusted by thousands of enterprises and government organizations worldwide to minimize business risks, meet privacy and regulatory compliance requirements, while protecting valuable information assets against unauthorized access.

Events