Reading Time: 3 minutes More Protected Health Information (PHI) is leaked by healthcare providers, not hackers, academic research by Michigan State University and Johns Hopkins University released Monday says. Researchers say that when it comes to data breaches, more than half of the… Read More

Reading Time: 3 minutes What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? The first step any organisation needs to take to protect itself against an application layer attack is… Read More

Reading Time: 2 minutes Netwrix conducted a study of the major IT risks that are significant for most organizations and assessed respondents’ readiness to withstand cyber threats. The report is based on the feedback of 1,558 organizations of various sizes from many different… Read More

Reading Time: 3 minutes Tesla filed a lawsuit against a former employee this week after it learned he made changes to company source code and exported gigabytes of proprietary data to unknown third parties. Tesla CEO and business magnate Elon Musk learned a… Read More

Reading Time: 4 minutes The EU General Data Protection Regulation (GDPR) is finally upon us. That means if your organisation handles data on any European citizens, you will need to pay attention. The good news is that the rising profile of cyber-threats over… Read More