2 Steps to Improve GDPR Security of Processing
Mark McGlenn
2 Steps to Improve GDPR Security of Processing

In the final countdown to GDPR enforcement on May 25th of this year, many UK and US firms are overestimating their state of readiness. 94 percent of FTSE 350 and 98 percent of Fortune 500 companies whose international business makes GDPR applicable believe they are on track to comply with GDPR, according to a recent survey, yet less than half of the same respondents have a GDPR taskforce and...

READ MORE
4 Steps to Vulnerability Management and Incident Response for Endpoints
Richard Henderson
4 Steps to Vulnerability Management and Incident Response for Endpoints

A mature endpoint security strategy can significantly reduce the risk of an incident leading to a larger breach. As your first line of defense, investing in endpoint security helps prevent or at least slow the spread of threats, maintain some level of operations, and protect users. An effective endpoint security strategy can be as layered as you want it to be however you’ll have a strong foundation if you...

READ MORE
GDPR Keeping You Up? There’s Another Monster Hiding Under the Bed…
Richard Henderson
GDPR Keeping You Up? There’s Another Monster Hiding Under the Bed…

This post originally appeared in CSO Magazine.  Everyone in the security world is talking about the EU’s General Data Protection Regulation (GDPR), and rightly so. GDPR is almost in full force, supplanting the older (and some will argue, out of date) EU Data Protection Directive (DPD). I don’t think regular readers of security news need to be reminded of the severity of penalties that the EU can levy against...

READ MORE