Author: Darren Harmer

Categories : Data Security            Leave a comment           

Earlier this year, European Commission VP Andrus Ansip and commissioner Vera Jourová made a statement regarding the EU’s long-awaited data protection reform, confirming a commitment to pass the new laws by the end of this year. Unfortunately for the organisations that will need to adhere to these rules, there is still little available in terms of definite details. Up until now, some of the key details to be aware of are that companies will likely be expected to respond more quickly, being ready to […]

Categories : Data Security, Insider Threat            Leave a comment           

Last week, we announced the Cloud and Big Data edition of our 2015 Insider Threat report. Extending earlier findings in the global report with details of what a compromise of cloud platforms and big data environments could be like, it made for some interesting reading. ClickToTweet: UK Cloud Use – 54% keep sensitive data in the cloud http://tinyurl.com/k9hk4y7 Countless studies have shown us that cloud computing has the potential to make businesses more responsive than ever – imparting the economic […]

Categories : Access Control, APT, Database Encryption            Leave a comment           

Following a recent investigation by Sky News, it’s been revealed that PaymyPCN.net, a private firm which allows drivers to pay fines via its website and has a direct link to the Driver and Vehicle Licensing Agency (DVLA) database, had been affected by a backdoor which gave access to restricted information. Although we’ve seen many headlines that highlight the danger posed by APTs and the like, it seems many organizations are still unprepared for attacks or unidentified weaknesses at a more […]

Categories : Data Breach, Data Protection, Data Security, Insider Threat, Privileged User            Leave a comment           

While news about the malicious hacking trade and the actions of elusive cyber-criminals continue to grab headlines, the third of our annual Insider Threat reports confirm that the risk posed by those legitimately ‘inside the fence’ continues to top business data security concerns. Of course, there can be no denying that the breadth and depth of private and public sector breaches in the past few years that have resulted from trusted insiders turning rogue or being compromised by perpetrators of […]