KEEP IN TOUCH
Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!
Google Now Pays For Bugs Used To Bypass Its Anti-Fraud Systems Google today announced that the company’s Vulnerability Reward Program has expanded to also include bug reports on methods threat actors can use to bypass the company’s abuse, fraud, and spam systems. “A few examples of potentially valid reports for this program could include bypassing our account recovery
Iranian Hackers Are Selling Access To Corporate Networks An Iranian-backed hacker group has been observed while seeking to sell access to compromised corporate networks to other threat actors on underground forums and attempting to exploit F5 BIG-IP devices vulnerable to CVE-2020-5902 exploits. The Iranian hackers have been active since at least 2017 and are being
10 Principles On How To Build A Good Governance Model What Is a Good Governance Model and Why Does it Matter? The concept of good governance model is difficult to define in a sentence or two because it’s an intangible thing. It’s not something that we can see or touch. It’s a system that has
The Importance Of DPIA And Its 3 Types Of Processing What is a DPIA? A DPIA is a process designed to help you systematically analyse, identify and minimise the data protection risks of a project or plan. It is a key part of your accountability obligations under the GDPR, and when done properly helps you