Data Protection
Discover expert analysis on data protection with news, features and insights from the team at IT Pro.
Explore Data Protection
-
NHS data leak raises ‘serious questions’ about Manchester University cyber attack
News NHS patient data used for research purposes is believed to have been compromised in the June attack
By Ross Kelly Published
News -
EU regulators are digging their heels in despite big tech’s Data Act pushback
Analysis EU regulators are no strangers to big tech regulatory push back, so why do companies still persist?
By Ross Kelly Published
Analysis -
The gratitude gap
Whitepaper 2023 State of Recognition
By ITPro Published
Whitepaper -
The top five risks of perimeter firewalls
Whitepaper ...and the one way to overcome them all
By ITPro Published
Whitepaper -
Redefining modern enterprise storage for mission-critical workloads
Whitepaper Evolving technology to meet the mission-critical needs of the most demanding IT environments
By ITPro Published
Whitepaper -
The business value of storage solutions from Dell Technologies
Whitepaper Streamline your IT infrastructure while meeting the demands of digital transformation
By ITPro Published
Whitepaper -
Meta to fight “unjustified” record $1.3 billion GDPR fine
News The company has been ordered to cease EU-US data transfers
By Ross Kelly Published
News -
ExtraHop now lets business leaders see how safely employees are using generative AI
News The Reveal(x) platform now provides insights into potential data leaks to help protect against misuse of AI tools such as ChatGPT
By Daniel Todd Published
News -
Google launches dark web monitoring tools for US Gmail users
News First launched for Google One customers, the dark web report service is rolling out to all US-based Gmail users
By Ross Kelly Published
News -
Capita's handling of cyber attack shows companies still fail at breach reporting
Analysis Capita initially told customers there was “no evidence” of data having been compromised in the March cyber attack
By Ross Kelly Published
Analysis -
Five things to consider before choosing an MFA solution
In-depth Because we all should move on from using “password” as a password
By Rene Millman Published
In-depth -
Security awareness training strategies for account takeover protection
Whitepaper Why you need an inside-the-perimeter strategy for internal threats
By ITPro Published
Whitepaper