Resilience starts with accepting that security incidents will happen, and planning to recover as quickly as the situation allows. Photograph: iStock

Resilience is having its moment at the place where business risk and information security meet. By the strict dictionary definition, being resilient d(...)

New EU rules on data protection impose mandatory data breach reporting unless the breach is unlikely to result in a risk to those whose data is being processed.

Dire warnings about huge fines for businesses have been the up-in-lights feature of reporting about the European Union General Data Protection Regulat(...)

Michele Neylon, director of Blacknight: “Because of the lack of rules, some companies just did what they wanted.”  Photograph: Brenda Fitzsimons

People with websites for their company, blog, forum or organisation may soon face restrictions on their ability to keep their personal names, addre(...)

Wireless world: using wireless networks – which exist all around us – is not only more efficient but also can be privacy-friendly

The Open Wireless Movement – led by the Electronic Frontier Foundation (EFF) and supported by Mozilla among others – is to launch software which will(...)

Pirate Bay has teamed up with Lund University in Sweden to study the “habits and norms” of its community.

Controversial file-sharing website, Pirate Bay has teamed up with Lund University in Sweden to study the “habits and norms” of its community in wha(...)

For most of us, our interaction with spam is limited to occasionally overrun email accounts or strange messages being sent from our email and s(...)