Blog
6 simple cybersecurity rules you can apply now
October 13, 2023
0 Comment
By Ed Bott
If you’re an IT pro or a serious PC hobbyist, computers are as logical as Mr. Spock. If you’re a human being without a technical background, the average Windows error message might as well be written in Klingon. For that latter audience, computer security often devolves into magical thinking. That’s
Managing Data Privacy and Cybersecurity Issues
October 13, 2023
0 Comment
By Erik G W Schafer
Introduction The privacy of personal data and cybersecurity are governed by national mandatory laws that vary greatly from country to country. They are not addressed specifically in national arbitration laws or the core provisions of arbitration rules. Their relevance for dealing with evidence is only indirect because restrictions on the
Commentary: Is cybersecurity a public or private good?
October 12, 2023
0 Comment
BY GAURAV KEERTHI
The threat of being hacked was once a distant possibility that only big corporations and governments took seriously. Today, even small businesses and ordinary citizens tread delicately in the digital domain, fearful of scams, malware, and other threats that lurk online. It is thus natural for individuals, companies, and states
By Shambhulingayya Aralelemath
An exponential increase in cyberattacks, the prevalence of cyber threats, and the expansion of attack surfaces require the adoption of comprehensive steps for safeguarding enterprises from breaches. Companies are continuously deploying more and more cybersecurity tools to improve their security posture. Despite this, enterprises continue to get attacked. The challenge
How to Enhance Ransomware Resilience: A Complete Playbook
October 11, 2023
0 Comment
By Dave Russell
Discover essential strategies for enhancing ransomware resilience in organizations. Dave Russell of Veeam explores the importance of response playbooks, trusted backups, and disaster recovery orchestration to mitigate cyber threats effectively. With ransomware cases still rising, more organizations are taking out cyber insurance to protect themselves if an incident occurs. The