22nd Aug 2016

Press Room – Information Security and Data Privacy – w4#0816

Regulators’ Powers: German DPAs are Open to Amicable Solutions Before Proceeding to Fines or Court Orders Updated In negotiations with a DPA about an alleged data protection breach, organisations should seek...

21st Aug 2016

A Priest, a Rabbi and a CISO Walk Into a Bar… …

No , not that one … too easy * (see the end)   This one is nice too : “A CIO walks into a bar, Tells jokes on safety, privacy...

17th Aug 2016
Flags in front of the EU Commission building in Brussels

The Directive on security of Network and Information Systems (NIS Directive) is here

“Over the past few years, the European Commission has adopted a series of measures to raise Europe’s preparedness to ward off cyber incidents. The NIS Directive is the first piece...

17th Aug 2016

Press Room – Information Security and Data Privacy – w3#0816

New vulnerabilities affect over 900 million Android devices, enable complete control of devices QuadRooter is a set of four vulnerabilities affecting Android devices that are built on the Qualcomm chipset,...

17th Aug 2016
android-unlock

Android security best practices

After the announce of: New vulnerabilities affect over 900 million Android devices, enable complete control of devices Check Point recommends the following best practices to help keep Android devices safe...

12th Aug 2016

Press Room – Information Security and Data Privacy – w2#0816

Automated Processing: GDPR’s Right to Explanation of Algorithmic Decisions Pose Challenges for Industry Use of automated profiling is inherently discriminatory (decisions are made on the basis of data subjects falling...

02nd Aug 2016

Press Room – Information Security and Data Privacy – w1#0816

Europe is preparing to make a monumental decision on the future of the internet “In October, the European Parliament voted on network neutrality rules for the European Union. Now regulators...

25th May 2016
Data_Privacy_and_Data_Security

The difference between data Privacy and data Security

Although data privacy and data security are often used as synonyms, they share more of a symbiotic type of relationship. Just as a home security system protects the privacy and integrity...

Pages:1234567...30»