The data about ourselves is willingly submitted to organizations every time we make a purchase, open an account, or simply move around, online and in-person. Where does it go? Who owns it? What ...
The concepts behind Diversity, Equity, and Inclusion have been practiced by some organizations in the past, but in this new era where the border lines between work and life are becoming increasi...
Is there such a thing as a quantum computing cryptopocalypse? Will we see the end of current security practices within the next few years, and what does this mean for the data that organizations...
Cloud continues to evolve, but so too do the human organizations that depend on it. Companies expand into new territories, they buy other companies, or get bought, and the vendors with whom they...
When you are a hammer, everything looks like a nail. Cybercriminals continue to succeed in discovering flaws and weaknesses in every connected technology. From zero days to SQL injection, what m...
Companies and cloud providers around the world are tackling the thorny issue of digital sovereignty, seeking to protect their customer’s data as it travels across physical borders, while simulta...
Over the past few years, the definition of the chief information security officer (CISO) has changed as business environments have evolved. With digital transformation, cloud and hybrid working ...
Today, data breaches are so endemic that it could be argued that consumers are becoming numb to the effects – they change their passwords, get a few reassuring emails from the company and more o...
For this episode, Kevin Williams, VP Americas Sales at Thales Cloud Protection & Licensing and Michael Bahar, Partner & Co-Lead of Global Cybersecurity and Data Privacy at Eversheds Suth...
More digital has meant mean more cloud. The pandemic and the shift to hybrid working has prompted an acceleration in the adoption of cloud technologies by IT leaders worldwide, which looks set t...