Tag "Data Protection"

Back to homepage
Mobile

The privacy risks of pre-installed software on Android devices

 Many pre-installed apps facilitate access to privileged data and resources, without the average user being aware of their presence or being able to uninstall them.On the one hand, the permission

Software

The art of securing ERP applications: Protecting your critical business processes

In this Help Net Security podcast recorded at RSA Conference 2019, Juan Pablo Perez-Etchegoyen, CTO at Onapsis talks about the challenges of securing and monitoring ERP applications for vulnerabilities and compliance gaps across

Software

Do people with malicious intent present the biggest threat to personal data?

Against the backdrop of a complex and growing cyber threat landscape, organizations are waking up to the fact that one of the biggest chinks in their armour against a data

Cloud

Moving from traditional on-premise solutions to cloud-based security

In this Help Net Security podcast recorded at RSA Conference 2019, Gary Marsden, Senior Director, Data Protection Services at Gemalto, talks about the feedback they’re getting from the market and how Gemalto

Industry Insights

The Must-Haves for Your Data Center Cybersecurity Checklist

The cyberthreat landscape is changing faster than ever for data center managers. Cybercriminals pulled in record hauls last year from ransomware, business email compromise, and other nefarious schemes, and they’re

Hardware/Network

7 Ways to Protect Yourself from Cyber Security Threats

A KPMG survey on 1000 small and medium-sized businesses in the UK revealed that 51% don’t believethey are vulnerable to cyber breaches. Ironically, 60% of the businesses surveyed had experienced cyber security

Cloud

Government data security is a no-brainer with the cloud

Already in 2019 there have been several large data breaches, each resulting in the exposure of significant volumes of sensitive information and identities. After review of the root causes, it’s

Hardware/Network

Authentication Bypass Vulnerability: What is it and how to stay protected?

Organizations failing to enforce strong access policy and authentication controls could allow an attacker to bypass authentication. Attackers could also bypass the authentication mechanism by stealing the valid session IDs

Identity Theft

The Challenge of Real-Time Cyber Protection

There’s a huge imbalance between attackers and defenders when it comes to protecting the corporate network. Defenders must protect against a myriad of threats while an attacker only needs to

Expert Articles

How Vulnerable is Your Data Really?

By Nick Galov – Web Hosting Expert, Content Manager at Techjury.net, By now, most of us are internet savvy enough to realize that we shouldn’t be downloading files off the