EU investigates SAP maintenance and support practices
The European Commission has launched a formal investigation into SAP. The investigation will examine the comp...
The European Commission has launched a formal investigation into SAP. The investigation will examine the comp...
There is a lot going on around privacy and compliance, especially in Europe. This in itself is a good thing, because data should be adequately protected, especially if it concerns personal data. In practice, however, it turns out to be quite disappointing how well organizations do this. We read and write a lot about data breaches. Over the years there seem to be more rather than fewer of them. Is that because organizations don’t want to do better or can’t do better? Whatever the reason, a good policy on privacy and compliance is indispensable in the current era. Especially with all kinds of new legislation that has been introduced and is coming, the need to put this high on the agenda is only increasing.
The amounts demanded as ransom are also exploding, up to as much as $40 million. IBM reports that as of Se...
The remedial measures Google adopted have failed to achieve their stated purpose, according to the latest stu...
Twitter emailed developers to warn them about a bug that may have exposed their private keys and account toke...
A court document released this week seemed to suggest that Facebook might be forced to close its European ope...
The technology giant complains that it simply cannot function unless it is allowed to send European user data...
Intel now has licenses from U.S. authorities to continue providing some of its products to Huawei Technologie...
Researchers at Purdue University revealed details about a new vulnerability in the Bluetooth wireless standa...
Edwin, Mattijs, and Victor are three old chaps from the Netherlands who were able to access Donald Trump's Tw...
Email scammers have impersonated over 7000 CEOs since the COVID-19 pandemic hit. The COVID-19 emergency ha...
A new vulnerability has been found in the Bluetooth wireless standard. Hackers can exploit it to connect to d...