Google announced in November last year that they planned to make changes to Chrome to improve stability of their browser, specifically by blocking third party applications from injecting code into Chrome’s processes1.  In July, with the release of Chrome 68, they will start to enforce this. While the logic behind this is understandable this does ...
Read Blog
As Raj Samani, Chief Scientist and Fellow at McAfee says, “It’s critical that businesses do everything they can to protect one of the world’s most valuable assets: data.” Whether your organization achieved compliance with General Data Protection Regulation (GDPR) by the enforcement date on May 25, or still has a way to go, data will ...
Read Blog
In preparation for May 25, data-driven companies (and really, that’s most of us) have started doing business differently, bracing for the enforcement date of the General Data Protection Regulation (GDPR). And all companies with customers and employees who are residents of the European Union should be handling personal data carefully after that: Violations can result ...
Read Blog
Like other Internet of Things (IoT) devices, medical equipment is a vulnerable attack surface. By 2018, it’s expected that sales of medical devices will exceed 14 million units—more than five times the sales of 2012.1 Network- and cloud-connected medical devices used in clinical settings—nurse stations, patient monitors, communications, networks, diagnostic devices, testing, scanning systems, blood ...
Read Blog
Dies ist der vierte Teil einer Reihe von Blog-Beiträgen, mit denen Sicherheitsverantwortliche und Führungskräfte in Unternehmen auf die Datenschutz-Grundverordnung (DSGVO) 2017 vorbereitet werden sollen. Eine der wichtigsten Anforderungen gemäß der neuen Datenschutz-Grundverordnung ist die Meldung von Kompromittierungen. Die Meldung einer Kompromittierung setzt natürlich die Fähigkeit voraus, eine Datenkompromittierung zu erkennen – und das ist nicht ...
Read Blog