Data Protection

19
Apr

Adjusting to New Cybersecurity Regulations in 2022

Cybersecurity is a leading concern for businesses in 2022. Here’s a closer look at how cybersecurity regulations landscape is shifting, why, and what businesses can do in response.

8
Mar

How the Ukraine-Russia Conflict Could Impact Cybersecurity

The cyber warfare of the Ukraine-Russia conflict solidifies what many security experts have been saying for years. Cybersecurity is a matter of national safety, so all organizations must consider it.

27
Jan

Will digitalization turn to be a catch-22 for cybersecurity in 2022?

As organizations became increasingly interconnected globally, every business started adapting to the digital model for all their transactions, fearing that otherwise they would be left behind in the race. Unfortunately, this has turned out to be a catch-22 as threats to cybersecurity are continually increasing.

21
Jan

How secure is your UPSI as SEBI tightens its reins on Insider Trading?

SECUDE’s HALOCORE is a unique solution for the protection of sensitive and critical information such as UPSI and other financial data that are exported from SAP. It has a modular structure in order to guarantee effective protection within just a few days of implementation.

12
Jan

How to Address Cultural Change When Implementing a Cybersecurity Program

A company culture that prioritizes cybersecurity goes well beyond annual training sessions. It implements measures to encourage individual employees to utilize best practices for security on all their devices. Learn how to address cultural change when implementing a cybersecurity program.

16
Dec

The Top Cybersecurity Trends to Watch in 2022

Businesses will need new strategies to respond to the changing cybersecurity threat landscape. These cybersecurity trends are likely to show where the field is moving in 2022 and how businesses should prepare.

16
Dec

SECUDE Security Bulletin on LOG4J vulnerability

A security vulnerability in Apache Log4J a most commonly used logging package for java has been exploited by the hackers. The vulnerability can allow an attacker to execute arbitrary code by sending crafted log messages, has been identified as CVE-2021-44228 and given the name Log4Shell.

28
Sep

The Implications of Big Tech’s Meeting With Biden

It’s no secret that cybersecurity breaches are a major concern for businesses across all industries, and governments are starting to take notice. On August 25, 2021, the U.S government met with business leaders from some of the tech sector’s giants, including Microsoft, IBM, Apple, and Google.

24
Aug

7 Strategies to Keep Business Data Secure

Cyberattacks are on the rise. The growing number of internet-connected devices and the value of business data means cybercriminals have more to gain than ever from breaking into a company’s network. Here are the seven most important cybersecurity tactics for a business to use. Employing them will help keep company data secure.

16
Apr

Is there Life in the Home office after Corona?

Read how the recent corona pandemic has pushed us into a forced home office and how to deal with it through a structured & goal-oriented approach.