By John Reed Stark2015-10-14T10:15:00
Though data breaches are inevitable, companies still remain too focused on fortification rather than response, failing to adopt to the harsh realities of rapidly emerging international and multifarious cyber-security threats. Inside, columnist John Reed Stark recommends a three-step cyber-security transformation for companies to undertake to combat recent rapidly evolving cyber-dangers.
2015-12-08T09:00:00Z By John Reed Stark
Penetration testing is the exercise of testing a company’s cyber-security defenses, and finding the right “pen tester” to do that can be difficult. Learn how to find the right blend of capable, trustworthy, and innovative cyber-security professionals. More inside.
2025-10-30T19:39:00Z By Neil Hodge
Companies could face significant compliance challenges in trying to meet new EU legal requirements about how companies share data with third parties.
2025-10-27T19:06:00Z By Neil Hodge
New rules that have recently come into effect across the EU will allow for greater transfers of data between companies, though experts fear the changes could conflict with Europe’s strict privacy legislation, which protects personal information.
Site powered by Webvision Cloud