Posts by author
Panda Security
How to use a USB without the risk of data leaks
IBM has banned its staff from using all removable storage devices, such as USB sticks. However, you don’t need to go as far as this in order to keep your company’s data safe.
Cyber Resilience: What It Is and Why It’s Important
A cyber-resilient company is one that can prevent, detect, contain, and recover from a cyberattack, minimizing exposure time and the impact of countless serious threats against data, applications and IT infrastructure. This is how the latest Panda Security report defines it
Panda Data Control, the security module adapted to GDPR
-Panda Security presents Panda Data Control, the data security module adapted to the new General Data Protection Regulation which has been in force since May…
Xavier Mertens: “Cryptojacking is one of the most brilliant attacks I’ve seen”
Xavier Mertens, an independent cybersecurity consultant and renowned IT security blogger, insists on the importance of traditional security to combat these highly effective new threat.
Equifax was not an isolated incident: the danger of Web apps
The increasing proliferation of Web applications has not gone unnoticed by cybercriminals. In recent months, these applications have gained popularity as a vector for attacks in numerous security incidents.
Careful! HTTPS is not synonymous with security
HTTPS pages use SSL (Secure Sockets Layer) or TLS (Transport Layer Security) protocols to encrypt connections. But does HTTPS really make a website safe?
What will happen with WHOIS when GDPR is implemented?
The current public WHOIS system, that enables you to find the names and contact details of the owners of a domain, is incompatible with GDPR’s data protection principles.