Ë

What You Need To Know About Data Loss, Data Leaks, and Data Breaches

Read More

To follow up on an earlier communication, PCI SSC is now targeting a Q1 2022 publication date for PCI DSS v4.0. This timeline supports the inclusion of an additional request for comments (RFC) for the community to provide feedback on the PCI DSS v4.0 draft validation documents.

Read More

Security has always been a cat-and-mouse game. Hackers find a way to breach security. Security teams fix the holes and implement new controls. Then bad actors find a way to circumvent those new measures. Rinse and repeat.

Read More

As the world moves further into the digital era, data security has been an ever-growing concern.

Read More

As Canadians worry about cyberattacks, new poll research finds less than half of businesses are very confident in their ability to spot and fend off a major cyber breach

Read More

This article will compare the SaaS and on-premises software distribution approaches, discuss the main security concerns bothering SaaS users and explore possible ways of evading and handling these issues.

Read More

On September 21, the National Assembly of Quebec adopted the Act to modernize legislative provisions as regards the protection of personal information. The adoption of this Act puts an end to a lengthy legislative process which started on June 12, 2020 when Bill 64,

Read More

Publishing data of all kinds offer big benefits for government, academic, and business users. Regulators demand that we make that data anonymous to deliver its benefits while protecting personal privacy. But what happens when people read between the lines?

Read More

Did you know that there are changes coming in how the Bank Identification Number (BIN, also known as Issuer Identification Number, or IIN) is encoded and used on payment cards?

Read More

Microsoft on Thursday warned thousands of its cloud computing customers, including some of the world’s largest companies, that intruders could have the ability to read, change or even delete their main databases, according to a copy of the email and a cyber security researcher.

Read More