<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>Thoughts on the Industry</title>
    <link href="https://www.data-rover.com/blog/5"/>
    <id>https://www.data-rover.com/blog/5</id>
    <updated>2024-11-29T15:45:29Z</updated>
    <entry>
        <title>Free thoughts on IT security</title>
        <link href="https://www.data-rover.com/blog/thoughts-on-the-industry-5/free-thoughts-on-it-security-57"/>
        <id>https://www.data-rover.com/blog/thoughts-on-the-industry-5/free-thoughts-on-it-security-57</id>
        <author><name>Data Rover, Ltd</name></author>
        <summary>📍The Unattainable Ideal: Absolute Security Information security, despite being an ever-evolving field, is marked by one undeniable truth: absolute security in IT does not exist. Every system, no matte...</summary>
        <updated>2024-11-29T15:45:29Z</updated>
    </entry><entry>
        <title>The Delicate Balance: Securing Information Without Hindering Productivity</title>
        <link href="https://www.data-rover.com/blog/thoughts-on-the-industry-5/the-delicate-balance-securing-information-without-hindering-productivity-56"/>
        <id>https://www.data-rover.com/blog/thoughts-on-the-industry-5/the-delicate-balance-securing-information-without-hindering-productivity-56</id>
        <author><name>Data Rover, Ltd</name></author>
        <summary>Effective security must enhance, not hinder, usability. For any modern organisation, information is an invaluable asset. It is know-how, projects, patents, critical strategic data, and even the regula...</summary>
        <updated>2024-11-22T12:17:09Z</updated>
    </entry><entry>
        <title>Understanding the importance of Effective Permissions</title>
        <link href="https://www.data-rover.com/blog/thoughts-on-the-industry-5/understanding-the-importance-of-effective-permissions-55"/>
        <id>https://www.data-rover.com/blog/thoughts-on-the-industry-5/understanding-the-importance-of-effective-permissions-55</id>
        <author><name>Data Rover, Ltd</name></author>
        <summary>Imagine a world in which no security were enforced, no restrictions of any type, no secrets, no competition, no greed, no envy, no keys for the house or car. Everything left totally open and free to b...</summary>
        <updated>2024-11-15T16:16:40Z</updated>
    </entry><entry>
        <title>Phishing Attacks: Why they still work and How to stop them</title>
        <link href="https://www.data-rover.com/blog/thoughts-on-the-industry-5/phishing-attacks-why-they-still-work-and-how-to-stop-them-44"/>
        <id>https://www.data-rover.com/blog/thoughts-on-the-industry-5/phishing-attacks-why-they-still-work-and-how-to-stop-them-44</id>
        <author><name>Data Rover, Ltd</name></author>
        <summary>Phishing remains one of the most effective forms of cyberattack, despite advances in cyber security. These attacks often exploit human psychology, manipulating individuals into revealing sensitive inf...</summary>
        <updated>2024-10-25T11:21:32Z</updated>
    </entry><entry>
        <title>On-Premise vs Cloud Storage: the Data Storage Dilemma</title>
        <link href="https://www.data-rover.com/blog/thoughts-on-the-industry-5/on-premise-vs-cloud-storage-the-data-storage-dilemma-43"/>
        <id>https://www.data-rover.com/blog/thoughts-on-the-industry-5/on-premise-vs-cloud-storage-the-data-storage-dilemma-43</id>
        <author><name>Data Rover, Ltd</name></author>
        <summary>Deciding where to store data — on-premise or in the cloud — has become a critical decision for any modern company. Many organisations now adopt hybrid cloud strategies, taking advantage of both on-sit...</summary>
        <updated>2024-10-18T13:41:44Z</updated>
    </entry><entry>
        <title>24 year old hacks Italian Ministry of Justice</title>
        <link href="https://www.data-rover.com/blog/thoughts-on-the-industry-5/24-year-old-hacks-italian-ministry-of-justice-42"/>
        <id>https://www.data-rover.com/blog/thoughts-on-the-industry-5/24-year-old-hacks-italian-ministry-of-justice-42</id>
        <author><name>Data Rover, Ltd</name></author>
        <summary>A 24-year-old hacker broke into the computer systems of the Italian Ministry of Justice and attacked the computer systems of the Finance Guard. This is what was discovered in an investigation coordina...</summary>
        <updated>2024-10-04T12:49:28Z</updated>
    </entry><entry>
        <title>ENISA Cyber Threat Landscape Report 2024: Key Findings</title>
        <link href="https://www.data-rover.com/blog/thoughts-on-the-industry-5/enisa-cyber-threat-landscape-report-2024-key-findings-39"/>
        <id>https://www.data-rover.com/blog/thoughts-on-the-industry-5/enisa-cyber-threat-landscape-report-2024-key-findings-39</id>
        <author><name>Data Rover, Ltd</name></author>
        <summary>The European Union Agency for Cybersecurity (ENISA) has recently released the 2024 Threat Landscape Report, a comprehensive analysis of cybersecurity trends from July 2023 to June 2024. The report hig...</summary>
        <updated>2024-09-27T13:45:32Z</updated>
    </entry><entry>
        <title>How to Protect Against Ransomware: Key Strategies</title>
        <link href="https://www.data-rover.com/blog/thoughts-on-the-industry-5/how-to-protect-against-ransomware-key-strategies-38"/>
        <id>https://www.data-rover.com/blog/thoughts-on-the-industry-5/how-to-protect-against-ransomware-key-strategies-38</id>
        <author><name>Data Rover, Ltd</name></author>
        <summary>Ransomware attacks are among the most damaging cyber threats today. These attacks involve hackers encrypting data and demanding payment for its release, leading to severe financial, reputational, and ...</summary>
        <updated>2024-09-20T13:37:00Z</updated>
    </entry><entry>
        <title>What is “Security Data” and Who needs it?</title>
        <link href="https://www.data-rover.com/blog/thoughts-on-the-industry-5/what-is-security-data-and-who-needs-it-35"/>
        <id>https://www.data-rover.com/blog/thoughts-on-the-industry-5/what-is-security-data-and-who-needs-it-35</id>
        <author><name>Data Rover, Ltd</name></author>
        <summary>Security data refers to any type of information that helps organisations detect, analyse, and respond to cyber security threats and vulnerabilities. It includes a wide range of digital evidence and in...</summary>
        <updated>2024-09-13T10:33:59Z</updated>
    </entry><entry>
        <title>Identity Access Management Risks in Software Applications</title>
        <link href="https://www.data-rover.com/blog/thoughts-on-the-industry-5/identity-access-management-risks-in-software-applications-34"/>
        <id>https://www.data-rover.com/blog/thoughts-on-the-industry-5/identity-access-management-risks-in-software-applications-34</id>
        <author><name>Data Rover, Ltd</name></author>
        <summary>Software applications today are the gatekeepers of company&#39;s sensitive and strategic information. Whether it&#39;s cloud-based SaaS (Software-as-a-Service) or on-premise solutions, strong identity managem...</summary>
        <updated>2024-09-06T14:43:37Z</updated>
    </entry><entry>
        <title>How to Stay Safe on Public Wi-Fi</title>
        <link href="https://www.data-rover.com/blog/thoughts-on-the-industry-5/how-to-stay-safe-on-public-wi-fi-31"/>
        <id>https://www.data-rover.com/blog/thoughts-on-the-industry-5/how-to-stay-safe-on-public-wi-fi-31</id>
        <author><name>Data Rover, Ltd</name></author>
        <summary>Beware of Evil Twin Attacks!​ Public Wi-Fi networks are convenient and ubiquitous, making it easy to check messages, browse online, or catch up on work while out and about. Whether you’re at a coffee ...</summary>
        <updated>2024-08-08T09:31:47Z</updated>
    </entry><entry>
        <title>Access Control Lists: Your First Line of Defence</title>
        <link href="https://www.data-rover.com/blog/thoughts-on-the-industry-5/access-control-lists-your-first-line-of-defence-28"/>
        <id>https://www.data-rover.com/blog/thoughts-on-the-industry-5/access-control-lists-your-first-line-of-defence-28</id>
        <author><name>Data Rover, Ltd</name></author>
        <summary>Confidentiality is one of the fundamental principles of information security, along with integrity and availability. It involves protecting information from being disclosed to unauthorised individuals...</summary>
        <updated>2024-07-12T10:12:23Z</updated>
    </entry>
</feed>