GDPR

Security is now a board level issue: how to secure the data supply chain

It has never been more crucial for businesses to implement and demonstrate their commitment to cybersecurity; with data increasingly being used to make significant business decisions. While historically, the major concerns for senior management around IT security have focused on intellectual property theft and reputational risk, ongoing changes in technology and politics have changed today’s business…


It has never been more crucial for businesses to implement and demonstrate their commitment to cybersecurity; with data increasingly being used to make significant business decisions. 

While historically, the major concerns for senior management around IT security have focused on intellectual property theft and reputational risk, ongoing changes in technology and politics have changed today’s business landscape and priorities significantly. With GDPR now in full force, organisations must demonstrate to stakeholders that they are making a credible effort to ensure that security is built into the heart of business operations. 

IT security budgets are falling

  • Half of organizations lack the security talent needed to remain secure
  • Empowering CISOs to strengthen password security
  • Vulnerabilities in the data supply chain

    Organisations must first understand what potential vulnerabilities look like within a data supply chain, so they can be recognised and mitigated. As cyberattacks increase in sophistication, they are likely to be so subtle that they don’t visibly impact a system; providing misleading information to force erroneous decisions. Ironically, whilst this type of attack will be very difficult to detect, early identification is vital in order to prevent significant damage.

    The first

    Read More

    Be the first to write a comment.

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    GDPR

    Germany asks Google, Apple to remove DeepSeek AI from app stores

    The Berlin Commissioner for Data Protection has formally requested Google and Apple to remove the DeepSeek AI application from the application stores due to GDPR violations. …

    The Berlin Commissioner for Data Protection has formally requested Google and Apple to remove the DeepSeek AI application from the application stores due to GDPR violations. …
    Read More

    Continue Reading
    GDPR

    Mistral just updated its open source Small model from 3.1 to 3.2: here’s why

    The fact that it is made by a French startup and compliant with EU rules and regulations such as GDPR and the EU AI Act also helps its appeal…

    The fact that it is made by a French startup and compliant with EU rules and regulations such as GDPR and the EU AI Act also helps its appeal…
    Read More

    Continue Reading
    GDPR

    UK passes updated data bill, without AI copyright provisions

    If it gets Royal approval, the DUA Act will become law and herald a significant change to the U.K.’s data protection framework since GDPR. The post UK passes updated data bill, without AI copyright provisions appeared first on CoinGeek…

    If it gets Royal approval, the DUA Act will become law and herald a significant change to the U.K.’s data protection framework since GDPR.
    The post UK passes updated data bill, without AI copyright provisions appeared first on CoinGeek…
    Read More

    Continue Reading
    GDPR

    8 steps to ensure data privacy compliance across borders

    As organizations expand internationally, IT leaders must navigate a maze of regulations, from the General Data Protection Regulation (GDPR), to the California Consumer Privacy Act (CCPA), as well as other region-specific privacy laws. So to stay compliant, they should have strong plans that cover data mapping…

    As organizations expand internationally, IT leaders must navigate a maze of regulations, from the General Data Protection Regulation (GDPR), to the California Consumer Privacy Act (CCPA), as well as other region-specific privacy laws. So to stay compliant, they should have strong plans that cover data mapping…
    Read More

    Continue Reading