ShadowSight-Insider-Threat-Management-Logomenu icon

Category: Privacy

CATEGORIES

Cross-Border Data Flows: Navigating Challenges and Regulatory Requirements for Australian Organisations

April 15, 2024 by Christopher McNaughton
In an era where data is as valuable as currency, the flow of…
Read More >

Compliance with the Australian Privacy Principles (APPS): Navigating the Legal Landscape

April 8, 2024 by Christopher McNaughton
In the digital age, the protection of personal information has never been more…
Read More >

An interview with data governance expert, Nicholas Gontscharow - Protecting your data: Innovative strategies in the modern world

March 4, 2024 by Christopher McNaughton
Interviewer: Christopher McNaughton Guest: Nicholas Gontscharow, Data Governance Expert Summary of Interview In…
Read More >

Understanding the Multifaceted Threats of Data Breaches: A CEO’s Perspective

February 5, 2024 by Christopher McNaughton
As a CEO, the threat of a data breach looms large, bringing forth…
Read More >

Future Probable Changes to The Australian Privacy Act: A Guide for CEOs

January 31, 2024 by Christopher McNaughton
Introduction As the digital landscape evolves, the regulatory framework surrounding data privacy in…
Read More >

Analysing the Twilio data breach of 2023: A case study in insider risk and social engineering

November 20, 2023 by Christopher McNaughton
The Breach In mid-2023, Twilio, a major player in cloud communications, suffered a…
Read More >

The Ubiquiti data theft: A case study in insider risk and the necessity of vigilant monitoring

November 15, 2023 by Christopher McNaughton
Introduction to the Ubiquiti Data Theft Incident In the dynamic world of network…
Read More >

Mitigating insider risks - A deeper dive into the Cash App data breach

November 8, 2023 by Christopher McNaughton
The breach at Cash App, where a former employee accessed customer data without…
Read More >

A case study in data breach: A lesson in insider risk management

October 12, 2023 by Christopher McNaughton
Once upon a time, in a bustling tech company, an application developer named…
Read More >

Safeguarding customer sensitive information: The imperative of data mapping

October 5, 2023 by Christopher McNaughton
In the digital age, where data has become the lifeblood of organizations, protecting…
Read More >