Cyber Security

Featured Image for The CISO and the Business

The CISO and the Business

By JC GAILLARD

Keep appointing pure technologists in CISO roles and you’ll never win. The Wannacry ransomware attack that…

thedigitaltransformationpeople.com

Featured Image for A Quick Overview of PETYA Ransomware

A Quick Overview of PETYA Ransomware

By Vimal Mani

Petya Ransomware is different than regular ransomwares we have seen in. It infects low-level structure…

thedigitaltransformationpeople.com

Featured Image for The great GDPR hoax

The great GDPR hoax

By Jane Frankland

One of my favourite stories as a child was Chicken Licken. I'm sure you'll know…

thedigitaltransformationpeople.com

Featured Image for GDPR – A Change in the Making

GDPR – A Change in the Making

By Ronald van Loon

Organizations all over the EU must be aware by now that the Data Protection Act…

thedigitaltransformationpeople.com

Featured Image for A real-life take on GDPR

A real-life take on GDPR

By JC GAILLARD

Over the past 6 months, social media and the Internet have been inundated with GDPR-related…

thedigitaltransformationpeople.com