So you’ve found, sorted and mapped data, but can you implement required processing controls? #GDPR
There is one question related to the General Data Protection Regulation that will arguably cause more ulcers than any other: How much is enough? In some portions of the GDPR ‘good’ is […]
Automated Data Discovery – What’s the real #GDPR value-add? And have you got what it takes to realise it?
Lessons learned along the way and plans to help you avoid FUD provoked GDPR investment
Does your #SupplyChain #Cybersecurity #RiskManagement reflect your security dependence on 3rd parties?
Norse Corp is in trouble – Just a company-specific blow, or raising bigger questions about threat intelligence value? Today Brian Krebs quoted sources who say Norse Corp is in serious trouble, to the point where […]
Blockchains are tackling the ‘I’ in the holy InfoSec CIA trinity more simply and robustly than anything that’s gone before, but can we grasp this well enough to avoid expensive purchasing and security mistakes?
Maria Korolov, writing for CIO Online, summarised key findings from (ISC)2’s recent report on Women In Security. A report informed by the their 2015 Global Information Security Workforce Study. The standout figure? […]