Since the role of Data Protection Officer (DPO) was designated under EU GDPR in 2018, the understanding of what the DPO role entails and how DPOs solve problems day-to-day …
Written for the non-technical home and small-office computer user, this guide teaches “digital commonsense”. The reader will learn how to counter the risks to their children, …
Security architects are responsible for maintaining the security of an organisation's computer systems as well as designing, developing and reviewing security architectures that …
Security operations departments are growing in importance and recognition; they are responsible for the secure day to day running of an organisation's network, endpoint, …
Incident response is the method by which organisations take steps to identify and recover from an information security incident, with as little impact as possible on business as …
Penetration testing is the attempt to professionally break in to an organisation's systems by exploiting any vulnerabilities, with the goal of determining whether an organisation's …
The role of an information security (or assurance) auditor is vital for identifying security gaps in an organisation's information systems. This practical book gives an excellent …
Large-scale data loss and data privacy compliance breaches continue to make headline news, highlighting the need for stringent data protection policies, especially when personal or …
Nearly every day we hear news that customer data has been compromised or new bugs have been discovered, leaving it open to the risk of falling into the wrong hands. Cyber security …
Data can be a cost for some organizations, but for those who succeed, it is a way to drive profitability, customer loyalty, and outperform others in their field. A well thought …