The DPO Academy Blog
 

Based on the incidents we saw in 2016, I recommend that organizations enter 2017 with caution. From the growth of Business Email Compromise (BEC) attacks to cybercriminals using more effective ways to exploit Internet of Things (IoT) devices, these security issues should serve as a reminder for businesses and individuals to be more vigilant. One of...

In the race to compete in today's digital world, organizations are using social, mobile, big data and analytics, and the Internet of Things (IoT) to gather as much information on their customers as possible, while simultaneously trying to do everything possible to protect their organizations from cyber attacks that come from the outside and within....

The term incident response means a lot of things to a lot of people. Historically, words like "unpleasant" or "chaotic" come to mind when thinking about the last time many organizations responded to the suspicion of a compromise by external attackers. Today, for most organizations incident response is a part of their security program but is still...

Accurately measuring enterprise value (EV) has never been more important or challenging. Even more so because firms are confronted by growing volumes of data, and the stakes implied in misinterpreting the value of that data have risen to new heights.

The EU's General Data Protection Regulation will take effect in May 2018. Under its own terms, the Regulation governs the privacy practices of any company handling EU citizens' data, whether or not that company is located in the EU. Because the EU's 28 member states together represent the world's largest economy and the top trading partner for 80...