Press Room

Smart Cities and GDPR: What’s next?

Smart Cities World September 2018: GDPR came into force in May this year. Now what? Colin Tankard from Digital Pathways takes a look. So, the General Data Protection Regulation (GDPR) has been introduced and city leaders are happy, knowing their IT people have instigated the right policy statements and that they have adhered to the […]

Knowing What you Have: The Road to Effective Data Discovery

Network Security Magazine August 2018: It’s hard to keep data secure when you’re not sure what information you have. While your databases might be neatly ordered and well understood, much of the information washing around in organisations is likely to be in the form unstructured data – emails.PDFs, word processor and spreadsheet files and many […]

Education & Training: The Downfall of File-less Attacks (AVT)

Info Security Magazine July 2018: While we are all aware of the file-less or zero-footprint attack, the growth in their use has been alarming. With regular anti-virus tools less likely to detect them, how can the ‘savvy’ CIO ward against them? The answer lies squarely in the need for the education and training of employees, […]

GDPR Breach: Ready, Get-Set, Go!

Global Security Magazine July 2018: So here we go, GPPR has been in force for just under two months, and already two well-known brands have been caught in its net. Luxury retailer, Fortnum & Mason, have detailed the loss of some 23,000 customer records, which include emails, telephone numbers and delivery addresses of customers who […]

Implementing responsible AI from the start

Smart Cities World July 2018: Digital Pathways’ Colin Tankard looks at how we reap the rewards of AI while avoiding the risks. Artificial intelligence (AI) and machine learning (ML) are two very hot buzzwords right now and often seem to be used interchangeably. They are not quite the same thing, but the perception that they […]

Tesla Feel The Heat Of An Insider Threat

Tesla, the luxury electric car maker, seem to have fallen foul of an insider threat episode, with Elon Musk, warning that a disgruntled staff member had altered the company’s IT system code, harvesting highly sensitive information and giving it to others. Traditionally, the term ‘Insider Threat’ does indeed invoke images of malicious employees lurking in the […]

Streamlining data discovery

Understanding what unstructured data exists in the enterprise is not easy. Massive volumes of documents, spreadsheets, presentations and emails are typically scattered about an organisation. With no real tools to manage it based on business value, it accumulates with no end in sight. The easy option is to buy more storage, but that doesn’t fix […]

Defend at all costs!

Legal sector must ‘step up a gear’ in Cyber technology. Hackers view the legal sector, which tends to store and process critical and invaluable information, as a potential weak point in the cyber security chain and are constantly pursuing different ways to access legal organisations, both large and small. It is high time that the […]