Category

Data Protection & Privacy

Information, articles and expert guides for professionals in the fields of data protection and information privacy. Covers topics around the collection, storage, processing or transfer of personal data. Also, implications of privacy law as well as the latest regulations.

The 2016 cyber security roadmap

Cybersecurity

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Data Protection & Privacy

What Star Wars can teach you about protecting your imperial intelligence

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Data Protection & Privacy

Four ways businesses outside of Russia need to adapt to the new data protection ruling

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Data Protection & Privacy

IoT mythbusting 101: even the most trivial device could present a data security risk

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

Top 10 most devastating cyber hacks of 2015

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Data Protection & Privacy

Wetherspoons hackers steal the data of 656,000 British pub-goers

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

Host-based vs network-based firewalls: which is the right option for cloud security?

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Cybersecurity

Most complex ever ‘silent assassin’ POS malware has stolen millions from US retailers

Cybersecurity

Host-based vs network-based firewalls: which is the right option for cloud security?

Cybersecurity

Most complex ever ‘silent assassin’ POS malware has stolen millions from US retailers

Cybersecurity

5 cyber hacks that will affect your life in 2016

Data Protection & Privacy

The transformation of data protection on both sides of the Atlantic

Data Protection & Privacy

Three steps to engineering customer loyalty by building digital trust

Cybersecurity

Dangerous liaisons: how the Ashley Madison hack ended the age of innocence in cybersecurity

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Business & Strategy

How the financial services C-suite are going beyond ‘keeping the lights on’ in 2025

Michael Perica, CFO at Rimini Street discusses the impact of a more colaborative relationship between CFOs and CIOs

https://staging.information-age.com/app/themes/bonhill-theme-ia/assets/default-article-image.jpg

Partner Content

Is your business ready for the IDP revolution?

Make your organisation more efficient with Intelligent Document Processing (IDP). David Malan, sales director of DocuWare, explains more

Partner Content

Tips for making sure your AI-powered FP&A efforts are successful

AI has the potential to make business finance modelling projects more efficient and impactful, but only with the right approach

Partner Content

Would you let an AI robot handle 90% of your meetings?

Zoom's founder believes AI clones could attend meetings on our behalf. Aoibhinn McBride of Jobbio explores AI in the workplace