General Data Protection Regulation (GDPR) Blog
Read the latest news, developments and opinion pieces on GDPR from industry experts New Net Technologies.
The latest report from the National Cyber Security Centre (NCSC) and National Crime Agency (NCA) highlights the growing number of cyber-attacks against UK businesses over the last 18 months.
Organizations across the globe experienced major breaches in 2017 as a result of known vulnerabilities, and Trend Micro predicts this trend is only going to rise in 2018 as corporate attack surfaces expand and expose more security holes.
A new study has found that companies suffer the most damage as a result of a cyber incident relating to their partners.
Pizza Hut customers took to Twitter to express their anger after learning the company failed to notify affected customers for nearly two weeks after discovering a data breach that exposed customer’s credit card details.
According to Gemalto, close to two billion records were stolen or lost during the first half of 2017, more than that of all of 2016.
New figures released by law firm RPC claim the number of UK based retailers experiencing data breaches has nearly doubled within the last year.
The UK government has announced they will invest £21 million to beef up cybersecurity within the UK’s National Health Service (NHS).
Researchers at Netskope have found that the majority of cloud services being used by global firms today currently do not meet the stringent standards for the EU General Data Protection Regulation (GDPR) compliance standard.
Payment service providers (PSPs) have been issued new guidelines to adhere to in the event of a security incident in a new consultation paper delivered by the European Banking Authority (EBA) working with the European Central Bank.
After months of negotiation and debate, the EU Parliament and Council has agreed on the content of the General Data Protection Regulation, aiming to harmonize data protection laws across all of Europe.
Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!
Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.
Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.