The Ultimate Guide to Data Privacy
2025 edition
Analyst reports

Gartner on Data Protection
Australia's AI adoption spurs call for proactive securi...
2 days ago

Gartner on Data Protection
Syrenis appoints new leadership to drive growth strateg...
Last month

Gartner on Data Analytics
Gartner outlines data & analytics trends for 2025
Last month

Gartner on Risk & Compliance
Australian cybersecurity spending to reach AUD $6.2bn b...
Last month

IDC on Digital Transformation
Zscaler launches asset exposure tool to tackle cyber ri...
Thu, 27th Feb 2025
Expert columns

By Mark Devlin of Impact PR
Navigating the ethics of AI in business writing
Last week

By Sam Daish of Blackpearl Group
The changing face of software development in the age of...
Last month

By Ben Thompson of Employment Hero
Fact: The future belongs to AI-first companies
Last month

By Brett Bolam of Biza.io
How the evolution of the CDR unlocks new opportunities ...
Last month

By Rajasekar Sukumar of Persistent
How AI Is Transforming Risk Management Amid Data Privac...
Tue, 25th Feb 2025
Interviews

Discussing Risk & Compliance
Exclusive: How ISMS.online is helping businesses tackle...
Last month

Discussing Revenue management
How malicious bots disrupt the holiday travel season
Sat, 28th Dec 2024

Discussing Collaboration
Exclusive: HP’s Neil Westhof on AI revolutionising prin...
Wed, 4th Dec 2024

Discussing Collaboration
Exclusive: How Aus3C is strengthening data security thr...
Thu, 28th Nov 2024

Discussing Digital Transformation
Exclusive: Zoho's AI Director discusses right-sizing AI...
Fri, 15th Nov 2024
More expert columns

By Mahesh Aswani of Versent
The Complex Path to Digital Sovereignty
Mon, 24th Feb 2025

By Vinicius Cardoso of Cloudera
The zero-sum game: Balancing data privacy and analytics
Tue, 18th Feb 2025

By Nick Koletsis of PMT Security
Why physical security for data centres differs from oth...
Wed, 12th Feb 2025

By Steve Moros of Proofpoint
DeepSeek's rise: Navigating the AI data and security ch...
Tue, 11th Feb 2025

By Chase Doelling of JumpCloud
Cutting through complexity: How a unified approach can ...
Tue, 11th Feb 2025

By Johan Fantenberg of Ping Identity
How A Passwordless Future Can Become A Reality
Thu, 30th Jan 2025
Recent news

About Data Protection
Study reveals over half of employees risk data in AI to...
Today

About IT service management
ManageEngine's AD360 expands with 100 new integrations
Yesterday

About Cloud Services
Boost your cybersecurity with a purpose-built backup ap...
Yesterday

About EduTech
Google Cloud: Navigating the new AI landscape for start...
2 days ago

About Data Protection
Australia pauses AI regulation plans amid safety concer...
Last week
More news

About Government
UK healthcare sector exposed to mounting ransomware ris...
Last week

About Privacy
HP launches ZBook Ultra G1a with advanced AI features
Last week

About Ransomware
Cybersecurity threats in healthcare sector risk patient...
Last week

About Productivity
UK firms adopt tracking tech to combat 'quiet quitting'
Last week

About Cloud Services
Fastly updates bot management to reduce CAPTCHA relianc...
Last week
Even more news

About Privacy
AI & data breaches drive rise in sextortion scams
Last week

About Cloud Services
Data backup vital says ISMS.online officer as day nears
Last week

About Data Protection
Concerns over genetic data security as 23andMe bankrupt...
Last week

About Government
Thales survey reveals declining trust in digital servic...
Last month

About Data breach
Prominent spyware firm SpyX breached, exposing Apple us...
Last month
Job moves

Move at Commvault
Bill O'Connell appointed Chief Security Officer at Comm...
Yesterday

Move at Splunk
Pax8 appoints Marianne Wolf as Chief Compliance Officer
Wed, 12th Feb 2025

Move at Verkada
Verkada appoints new VP for JAPAC Channel Sales strateg...
Wed, 15th Jan 2025

Move at DuploCloud
DuploCloud appoints Amundson & DeHart to leadership tea...
Wed, 18th Dec 2024

Move at Google
StackAdapt appoints Alessio as APAC marketing director
Thu, 5th Dec 2024
Other guides
You can read other related guides from Artificial Intelligence, Cybersecurity, Advanced Persistent Threat Protection, CleanTech, and Physical Security.
Powered by