ESET researchers have discovered several third-party add-ons for the popular open-source media player Kodi. The first 100 days of GDPR reviewed. Also a look at how Microsoft addressed 61 security flaws in Windows in their Patch Tuesday release
Search results for: "gdpr"
What has the journey of the World Wide Web been like so far, as seen and experienced by ESET’s security folk? ESET Senior Research Fellow David Harley provides his take in the first installment of our series of interviews marking the Web’s 27th birthday
Social media giant fined in the UK for failing to protect users’ personal information and for a lack of transparency
Some aspects of online tracking go beyond just website analytics
WeLiveSecurity sat down with Tony Anscombe, Global Security Evangelist and Industry Ambassador for ESET, to talk about RSA 2018, his talk at the conference, and what to expect.
Implementing the five actions described in this article can help reduce your organization's cyber risk and bolster its security defenses
This document, which is described by its authors as a “real white paper on cyber-defense”, is divided into three parts, followed by approximately 20 priority recommendations summarizing the central elements of the document.
A record-high proportion of organizations worldwide (67%) said that they had been breached at some point, up from 56% in the report’s previous edition.
These developments show that security technology is now keeping up, or outpacing other technological and regulatory developments. Thus, while users’ wants often continue to trump their appreciation of risk, the industry has responded and in many cases gotten ahead of popular demand.
A breakdown of the ‘spending pie’ shows that the ‘security services’ segment is projected to make up nearly 60% of the total IT security budgets, followed by the ‘infrastructure protection’ segment on a little over 18%.
The association expects the increased costs incurred in security breaches to come both from traditional areas, such as network cleanup and customer notification, and newer areas such as litigation.
Unfortunately, as with every opportunity, there are people who want to benefit from your success without putting in the hard work. Cybercriminals will view the increase in traffic and spending as opportunities to make extra money.
Unless companies processing citizens’ personal data fully understand the reasoning behind the decisions made based on their machine-learning models, they will find themselves between a rock and a hard place.
European Cyber Security Month and similar events, give cybersecurity companies the opportunity to reach out to the masses and get them involved.
General Data Protection Regulation (GDPR) together with the growing number of data breaches are the most pressing reasons why small and medium businesses are implementing data protection technologies – including encryption.
The UK Government’s Department of Digital, Culture, Media and Sport (DCMS) has announced that firms could face fines of up to £17m or 4% of global turnover if they fail to protect themselves from cyberattacks.
Encryption can be the answer to many data security issues faced by small and medium businesses. Apart from protecting sensitive information from unauthorized use,this technology can also represent another step towards compliance with legislation.
When it comes to protecting corporate information, some doubt whether or not the cloud is the best option. We look at all the security services available.
We are halfway through the year and it is a good opportunity to analyze the extent to which the ideas we gathered in the Trends 2017: Security Held Ransom report have come true.
Businesses leave themselves open to potential data breaches through their ex-employees, according to a new study by OneLogin.