Information security is a diverse field requiring a diverse workforce. See how your current strengths map to core activities in a good security management program!
Blog
Managing requests from persons whose data you process is a key aspect of GDPR compliance. Learn more about how to optimize managing and responding to user requests in this practical workflow post.
Do you value privacy? Most individuals and companies would reply with a clear "Yes!" to that simple question but their actions are often not very well aligned with that expressed attitude. What are the legal privacy rights we have as individuals? Before we consider whether ee actually do value privacy, let's review what rights the … Continue reading Privacy isn’t about secrecy, it is about human rights
Cybehave's June security note is on #ransomware - how to prepare to avoid paying criminals to get your data back
Bringing new features to RiskTool, PrivacyBox and PhishingBot - and one more thing - our IssueTool is now available to customers too: issue tracking the way it should work!