Supply Chain Risk: Time to Focus on Partners Ahead of GDPR Deadline
With the GDPR compliance deadline of May 25 almost upon us, recent events have highlighted the importance of locking down third-party risk. Attacks on...
Five Critical Steps of a Complete Security Risk and Compliance Lifecycle
Five Critical Steps of a Complete Security Risk and Compliance Lifecycle #outlook...
Energetic Bear/Crouching Yeti: attacks on servers
Energetic Bear/Crouching Yeti is a widely known APT group active since at least 2010. The group tends to attack different companies with a strong...
FW: Best Practices for DevOps Security
Tripwire, Inc.
FW: [Report] The Most Efficient Way to Reduce Security Risks
Tripwire, Inc.
Tens of thousands per Gram
Looking at Instagram one morning, I spotted several posts from some fairly well-known people (in certain circles) who had invested in an ICO held...
Leaking ads
When we use popular apps with good ratings from official app stores we assume they are safe. This is partially true – usually these...
Tripwire Cloud Capabilities
Tripwire Cloud Capabilities #outlook a{ padding:0; } body{ width:100% !important; } .ReadMsgBody{...





![FW: [Report] The Most Efficient Way to Reduce Security Risks](https://www.dataproof.co.za/wp-content/uploads/2018/04/fw-report-the-most-efficient-way-to-reduce-security-risks.jpg)


![[Part 3/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance](https://www.dataproof.co.za/wp-content/uploads/2018/04/part-3-4-practical-advice-to-network-and-security-operations-pros-regarding-gdpr-compliance-218x150.jpg)



