cyberwirex

CyberWire Podcast Part 2 – Ground Truth or Consequences: the challenges and opportunities of regulation in cyberspace

Posted on 4/12/18

In the second episode of their new, four-part series, called “Ground Truth or Consequences: the challenges and opportunities of regulation in cyberspace,” Cyberwire take a look at the impact GDPR has had since its implementation in May 2018. Joining them are Emily Mossburg from Deloitte, Caleb Barlow from IBM, and Steve Durbin from ISF and Jason…

Read More
cyberwirex

Cyberwire Podcast Part 1 – Ground Truth or Consequences: the challenges and opportunities of regulation in cyberspace

Posted on 13/11/18

In this premier episode of Cyberwire’s new, four-part podcast series, called “Ground Truth or Consequences: the challenges and opportunities of regulation in cyberspace,” they take a closer look at cyber security regulation in the U.S. Joining them in this episode are Dr. Christopher Pierson from BlackCloak, Randy Sabett from Cooley LLP and Jason Hart, CTO…

Read More

Payments Journal – New York CyberSecurity State of Mind

Posted on 2/11/18

The conversation around data protection is heating up as governments start to think more strategically and globally about information security and breaches. It’s increasingly clear that we need standardized cybersecurity regulations and more intense enforcement to track criminals across borders. In the wake of tough new regulatory frameworks adopted by the European Union and California,…

Read More

techradar – The true cost of a data breach

Posted on 31/10/18

Falling victim to a data breach hurts your business’ bottom line as well as its reputation From the implementation of the General Data Protection Regulation (GDPR) back in May, which fundamentally changed the rulebook for storing data of EU citizens at least to the Butlin’s hack, 2018 has been a very significant year for cybersecurity….

Read More

Computer Business Review – The True Cost of a Data Breach

Posted on 3/10/18

“Encrypting data at rest and in motion, securely managing the encryption keys and storing them securely, while also managing and controlling user access, are vital steps for businesses to take to protect themselves” From the implementation of the General Data Protection Regulation (GDPR) back in May, which fundamentally changed the rulebook for storing data of…

Read More

Information Age: How can you best protect your organisation’s data?

Posted on 5/09/18

The number of successful data breaches continues to surge, as hackers get smarter and security solutions struggle. What is the most effective method of data protection for the enterprise? This is a question that must plague those in charge of an organisation’s data and security. There are so many solutions out there, and there is certainly no ‘silver…

Read More

Information Age – Gemalto CTO: Beating ‘cybercriminals at their own game’

Posted on 5/09/18

In today’s business environment, data is king. Protecting this most valuable asset is key to effective security. Data breaches can ruin careers, and permanently damage the reputation of organisations. Defending against these cyber attacks is a challenge, and a problem that keeps business leaders up at night. Think like a hacker Jason Hart – CTO of data protection, Gemalto –…

Read More

Lack of confidence in data security can cost you more than you think

Posted on 21/08/18

This article originally appeared in Engineering News, South Africa here. By Jason Hart, Chief Technology Officer (CTO) of Data Protection at Gemalto The European Union’s General Data Protection Regulation (GDPR) came into effect almost two months ago. Leading the way to a new era of data protection, the long-awaited GDPR has emphasized the importance of…

Read More