Inside the Briefcase






Briefcase Highlights


Tag Archive

Addressing GDPR Compliance

October 27, 2023 No Comments

This article provides several key requirements of the GDPR and maps them to Oracle Data Security features. While the GDPR mandates many different data protection and governance principles and requirements (such as cross border data transfers), this paper covers only those key GDPR data protection security principles that may be addressed by Oracle Data Security features.

Examples of Insider Threats: What you need to know

April 12, 2023 No Comments

Insider threats are a major worry for businesses of all sizes. Those with access to an organization’s network, data, or assets often execute these attacks. While many companies highlight external threats, internal risks can be equally destructive and, in some cases, more difficult to identify and avoid. Insider threats can come in different shapes, and their objectives can vary. This blog will discuss some of the most common types of insider threats and what businesses may do to mitigate the danger.

How Blockchain Technology is Transforming Business Practices and Applications

December 20, 2022 No Comments

Although Blockchain might not appear to impact our daily lives, it has undoubtedly impacted how many businesses handle their operations and applications. By enabling secure and efficient transactions, blockchain technology has revolutionized the way businesses transfer money and data. This article will explore how Blockchain technology is transforming business practices and applications.

The Drawbacks of a Frequent Password Reset

December 15, 2022 No Comments

Today, we are increasingly more aware of cybersecurity, whether it’s about our social media accounts, e-mails, or even banking apps. Passwords are still our only and, therefore, the best option to protect our online accounts and privacy. ExpressVPN’s study investigates how often people change their passwords. The results show that they spend several hours a year on that task.

Byos Releases Free Assessment Tool to Provide Companies with Tailored Network Security Recommendations

September 20, 2022 No Comments

Byos announced today the release of the Byos Network Security Maturity Assessment: a free tool that details actions and technologies to improve an organization’s security posture. Developed by a team of network security industry veterans and consultants, the tool scores a company’s current network security maturity via a 15-minute survey and provides a tailored set of recommendations that can be used to develop priorities, action plans, long-term budgets, and more.

Tags: , , , News

7 Ideas to Improve Network Security In Healthcare

January 24, 2014 No Comments

Watch this webinar to learn best practices from healthcare customers and seven ideas that will help improve your network security investments.

ADVERTISEMENT

Gartner

WomeninTech