File transfers are a significant factor in accidental insider risk. Jeffrey Edwards of Progress Software explains how secure file transfers can help ensure privacy and play a role in regulatory compliance.
Compliance with the European Union's General Data Protection Regulation is no guarantee of compliance with other privacy regulations, says Fatima Khan of Okta, who discusses the challenges.
She wrote the book on Cloud 3.0, and now attorney Lisa Lifshitz shares insights on key considerations for choosing cloud providers, as well as how to ensure compliance with emerging regulations.
Ransomware crime reports are up 300 percent in Toronto, but it's not just the frequency of crimes that is a concern - it's the complexity, says Kenrick Bagnall, detective constable with the Toronto Police Service.
Connected devices - the sheer number of them and the scale of the cybersecurity risks they pose - are a top concern in 2020 and beyond, says Robert Falzon of Check Point Software Technologies, who weighs in on the threats and technologies he's watching.
Ransomware, business email compromises and the malicious insider threat: These are the three top concerns of Canadian attorney Imran Ahmad as he looks ahead to the cybersecurity legal landscape in 2020.
Dr. Matthew Kane spent years in the Canadian Armed Forces as an intelligence officer, honing his skills in deception detection. Now, as CEO of Solaris Intelligence, he's helping organizations spot and stop fraud and malicious insiders.
Former regulator Robin Gould-Soil has a unique perspective, with experience in both the public and private sectors. She weighs in on the convergence of privacy legislation and cybersecurity.
5G is coming, and with it comes the promise of connectivity on an unprecedented scale. And then there are the security concerns about infrastructure, connected devices and a new multifaceted attack surface. Olivera Zatezalo of Huawei Technologies Canada discusses these concerns.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.