
A Quick Overview of PETYA Ransomware
Petya Ransomware is different than regular ransomwares we have seen in. It infects low-level structure…
thedigitaltransformationpeople.com
Petya Ransomware is different than regular ransomwares we have seen in. It infects low-level structure…
thedigitaltransformationpeople.com
One of my favourite stories as a child was Chicken Licken. I'm sure you'll know…
thedigitaltransformationpeople.com
Organizations all over the EU must be aware by now that the Data Protection Act…
thedigitaltransformationpeople.com
It is no big secret that the “Three Lines of Defence” model underpinning many GRC…
thedigitaltransformationpeople.com
Today’s consumers are more powerful than ever before, and get every bit of information that…
thedigitaltransformationpeople.com
Roll up, roll up, shouts the cybersecurity tout at the conference. "Are you ready to…
thedigitaltransformationpeople.com
Over the past 6 months, social media and the Internet have been inundated with GDPR-related…
thedigitaltransformationpeople.com
Opaque Terms of Use around Data are making things worse. Recent years have been marked by…
thedigitaltransformationpeople.com
We've all done it at some point, opened an attachment within a suspicious looking email…
thedigitaltransformationpeople.com
Today’s cyber risks come in all shapes and sizes, from disclosure of protected information due…
thedigitaltransformationpeople.com
For insurance company Chief Risk Officers, evolving and increasing cybersecurity risks are hard to ignore…
thedigitaltransformationpeople.com