Data masking for GDPR: A force for positive change


If the words General Data Protection Regulations (GDPR) are enough to get your pulse racing, you are not alone. The GDPR, due to come into force on 25 May this year, is going to have a significant, permanent and far-reaching impact on any business that holds data on EU citizens, including organisations based outside of […]

GDPR raising cybersecurity awareness among EU business leaders


As if the daily beating of data breach news wasn’t enough reason to bring the stark reality of cyber risks to the attention of corporate leaders, here comes the European Union’s General Data Protection Regulation (GDPR). Taking effect in May 2018, GDPR is managing to elevate cyber risks to the top of the corporate agenda […]

Small mistakes, big data breaches

Keyboard Data

We all make mistakes, especially simple mistakes, such as a typo here and there in email or grammatical oversights in a report. And who hasn’t called or texted a wrong number?  Just this morning I tried to submit a web form, and it was rejected because I didn’t format a field input properly. These types […]

A big — and worrisome — disconnect in enterprise IT security

Enterprise IT security CSC Blogs

When it comes to keeping enterprise systems and data secure, application security takes top billing. No matter how tight and snug an enterprise keeps security controls, an attacker need only exploit a vulnerability in an app to slither on in and grab a foothold. This is why application security and configuration management form such an important baseline to avoid attacks. Good application […]

Criminal attacks continue to ail healthcare organizations

healthcare data breach CSC Blogs

When it comes to healthcare data breaches, the healthcare industry still hasn’t found a cure. According to the Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data, conducted by the Ponemon Institute on behalf of information security firm ID Experts, the majority of healthcare companies surveyed have experienced multiple data breaches. The study […]