.
HomeSecurity

Security

Leveraging Trust Networks and Verifiable Data

We’re in the midst of an epochal shift in computing patterns from being single-player...

The Role of Practitioners in Legislation and Regulation and a 2023 Outlook

As a cyber, privacy, or compliance professional, following the happenings in Washington D.C. or...

Entity health checks: Ensure your company stays compliant wherever you operate

Running a multinational business is no easy task. Legal requirements and regulatory processes can...

Data Sovereignty in a Reglobalized World

At this year’s Davos Conference, the location of physical supply chains garnered significant discussion...

Modern Security Data Lake for securing a Cloud first SaaS first company

Any Corporation with a digital presence needs a Cybersecurity strategy in place so that...

A growing need for Attack Surface Management

Post-Covid hybrid work force and the proliferation of Cloud and SaaS based consumption models...

Privacy Assessments of DLP Tools

Data Loss Prevention (DLP) tools detect the unauthorised transfer of data outside of organisational...

Why the Business of GRC is Moving toward CRM

At a time of increasingly complex regulatory guidelines and data governance needs, the market for...

Third-Party Risk Management and Female Entrepreneurship in Emerging Economies

Security and compliance issues occur globally and are a concern for tech-savvy professionals who...

Hot Topics