The Ultimate Guide to Data Privacy
2025 edition
Analyst reports

Gartner on Data Protection
Syrenis appoints new leadership to drive growth strateg...
This month

Gartner on Data Analytics
Gartner outlines data & analytics trends for 2025
This month

Gartner on Risk & Compliance
Australian cybersecurity spending to reach AUD $6.2bn b...
This month

IDC on Digital Transformation
Zscaler launches asset exposure tool to tackle cyber ri...
Last month

Canalys on SaaS
AvePoint enhances platform to boost MSPs' data security
Last month
Expert columns

By Mark Devlin of Impact PR
Navigating the ethics of AI in business writing
Last week

By Sam Daish of Blackpearl Group
The changing face of software development in the age of...
This month

By Ben Thompson of Employment Hero
Fact: The future belongs to AI-first companies
This month

By Brett Bolam of Biza.io
How the evolution of the CDR unlocks new opportunities ...
This month

By Rajasekar Sukumar of Persistent
How AI Is Transforming Risk Management Amid Data Privac...
Last month
Interviews

Discussing Risk & Compliance
Exclusive: How ISMS.online is helping businesses tackle...
This month

Discussing Revenue management
How malicious bots disrupt the holiday travel season
Sat, 28th Dec 2024

Discussing Collaboration
Exclusive: HP’s Neil Westhof on AI revolutionising prin...
Wed, 4th Dec 2024

Discussing Collaboration
Exclusive: How Aus3C is strengthening data security thr...
Thu, 28th Nov 2024

Discussing Digital Transformation
Exclusive: Zoho's AI Director discusses right-sizing AI...
Fri, 15th Nov 2024
More expert columns

By Mahesh Aswani of Versent
The Complex Path to Digital Sovereignty
Last month

By Vinicius Cardoso of Cloudera
The zero-sum game: Balancing data privacy and analytics
Last month

By Nick Koletsis of PMT Security
Why physical security for data centres differs from oth...
Last month

By Steve Moros of Proofpoint
DeepSeek's rise: Navigating the AI data and security ch...
Last month

By Chase Doelling of JumpCloud
Cutting through complexity: How a unified approach can ...
Last month

By Johan Fantenberg of Ping Identity
How A Passwordless Future Can Become A Reality
Thu, 30th Jan 2025
Top players
Recent news

About Government
UK healthcare sector exposed to mounting ransomware ris...
Last week

About Privacy
HP launches ZBook Ultra G1a with advanced AI features
Last week

About Ransomware
Cybersecurity threats in healthcare sector risk patient...
Last week

About Productivity
UK firms adopt tracking tech to combat 'quiet quitting'
Last week

About Cloud Services
Fastly updates bot management to reduce CAPTCHA relianc...
Last week
More news

About Privacy
AI & data breaches drive rise in sextortion scams
Last week

About Cloud Services
Data backup vital says ISMS.online officer as day nears
Last week

About Data Protection
Concerns over genetic data security as 23andMe bankrupt...
Last week

About Government
Thales survey reveals declining trust in digital servic...
This month

About Data breach
Prominent spyware firm SpyX breached, exposing Apple us...
This month
Even more news

About Privacy
AI adoption in healthcare rises to 35% in 2024, says AM...
This month

About Cybercrime
Bitdefender uncovers massive Google Play Store ad fraud
This month

About Social Media
Australia to test age verification tech for social medi...
This month

About Digital Marketing
Sinch wins Adobe partner award for third consecutive ye...
This month

About Customer service
AI expected to revolutionise Singapore financial servic...
This month
Job moves

Move at Splunk
Pax8 appoints Marianne Wolf as Chief Compliance Officer
Last month

Move at Verkada
Verkada appoints new VP for JAPAC Channel Sales strateg...
Wed, 15th Jan 2025

Move at DuploCloud
DuploCloud appoints Amundson & DeHart to leadership tea...
Wed, 18th Dec 2024

Move at Google
StackAdapt appoints Alessio as APAC marketing director
Thu, 5th Dec 2024

Move at PwC
Revenite appoints Jonathon Wetton as chief technology o...
Tue, 3rd Dec 2024
Other guides
You can read other related guides from Artificial Intelligence, Cybersecurity, Advanced Persistent Threat Protection, CleanTech, and Physical Security.
Powered by