News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Companies
»
HANDD Business Solutions
HANDD Business Solutions
Company
Content brought to you by HANDD Business Solutions
Six Foundations of Data Privacy Regulation
White Paper
17 November 2022
Data Discovery - The Foundation of Any Compliance or Regulatory Obligation
White Paper
4 November 2022
Stay GDPR Compliant with Data Discovery
White Paper
14 October 2022
The Definitive Guide To Data Classification
White Paper
22 September 2022
What Is Data Classification And What Can It Do For My Business?
White Paper
18 August 2022
Data Classification - Why Organizations Need a Specialist Security Provider
White Paper
13 July 2022
The 5 Steps To Effective Data Protection
White Paper
23 June 2022
Why Automating Encryption and Decryption Makes Good Cybersecurity Sense
White Paper
4 November 2021
How To Think Like a Hacker and Secure Your Data
White Paper
10 August 2021
Data on the Move = Business on the Move
White Paper
22 April 2021
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Law Firm Investigates Coupang Security Failures Ahead of Class Action Deadline
News
26 January 2026
1
Researchers Uncover “Haxor” SEO Poisoning Marketplace
News
26 January 2026
2
Okta Flags Customized, Reactive Vishing Attacks Which Bypass MFA
News
26 January 2026
3
Wiper Attack on Polish Power Grid Linked to Russia’s Sandworm
News
26 January 2026
4
Critical Appsmith Flaw Enables Account Takeovers
News
22 January 2026
5
Zero-Day Exploits Surge, Nearly 30% of Flaws Attacked Before Disclosure
News
22 January 2026
6
AI Supercharges Attacks in Cybercrime's New 'Fifth Wave'
News
20 January 2026
1
EU Unveils Cybersecurity Overhaul with Proposed Update to Cybersecurity Act
News
21 January 2026
2
LinkedIn Phishing Campaign Exploits Open-Source Pen Testing Tool to Compromise Business Execs
News
20 January 2026
3
Zero-Day Exploits Surge, Nearly 30% of Flaws Attacked Before Disclosure
News
22 January 2026
4
Cyber Threat Actors Ramp Up Attacks on Industrial Environments
News
15 January 2026
5
Cyber Risk In 2026: How Geopolitics, Supply Chains and Shadow AI Will Test Resilience
Opinion
2 January 2026
6
Securing M365 Data and Identity Systems Against Modern Adversaries
Webinar
15:00 —
16:00, 22 January 2026
1
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
2
Revisiting CIA: Developing Your Security Strategy in the SaaS Shared Reality
Webinar
15:00 —
16:00, 11 December 2025
3
Five Non-Negotiable Strategies to Get Identity Security Right in 2026
Webinar
18:00 —
18:30, 22 January 2026
4
The Invisible Frontline: Proactive Approaches to Browser Defense
Webinar
15:00 —
15:30, 2 October 2025
5
Audit & Compliance in the Era of AI and Emerging Technology
Webinar
11:00 —
11:30, 13 November 2025
6
Regulating AI: Where Should the Line Be Drawn?
Opinion
12 November 2025
1
What Is Vibe Coding? Collins’ Word of the Year Spotlights AI’s Role and Risks in Software
News Feature
11 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
Bridging the Divide: Actionable Strategies to Secure Your SaaS Environments
Blog
7 November 2025
4
NCSC Set to Retire Web Check and Mail Check Tools
News
10 November 2025
5
Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations
Podcast
4 November 2025
6