Skip to content
Glock Enterprises
  • Welcome
  • Blog
  • Resources
  • Support

Blog: Simplifying subject access requests – new detailed SARs guidance

21st October 2020 peterglock

The right of access is a fundamental data right under data protection law. And it has never been more necessary.

Original article here

Glock Takes Stock permalink

Post navigation

← How COVID-19 has changed cyber underwriting
Google Patches Actively-Exploited Zero-Day Bug in Chrome Browser →

Recent Posts

  • Supermicro, Pulse Secure release fixes for ‘TrickBoot’ attacks
  • Accellion zero-day claims a new victim in cybersecurity company Qualys
  • Microsoft reveals 3 new malware strains used by SolarWinds hackers
  • Hacked SendGrid accounts used in phishing attacks to steal logins
  • Three Top Russian Cybercrime Forums Hacked

Get in touch

Email: [email protected]


View Glock Enterprises Ltd profile on Ariba Discovery

Data Protection Register

Registered with the ICO: ZA494319

About

Glock Enterprises Ltd. Registered in England & Wales No. 11183883

VAT No: GB 361 2795 89

Glock Enterprises (Europe) OÜ
Registered in Estonia
No. 16149069

All content (c) Glock Enterprises Ltd 2021

Pages

  • Blog
  • Privacy Policy
  • Resources
    • Free Trial – Private Threat Intelligence
    • White Paper: Building a Business Case for Cybersecurity Asset Management
    • White Paper: Cyber Deception – Migrating to an alternative platform
    • White Paper: Hunting for Threats in Operational Technology
    • White Paper: Internet Connected Storage
    • Whitepaper: 5 Steps to Building a Threat Modelling Program for AWS
    • Whitepaper: Coping with a flood of Data Subject Access Requests
  • Services
  • Support
  • Welcome

The Latest from Facebook

Glock Enterprises Ltd

1 hour ago

Glock Enterprises Ltd
buff.ly/3bf3MBlHacked SendGrid accounts used in phishing attacks to steal loginsSecurity news from bleeping computer. Be careful of Zoom invites..:A phishing campaign targeting users of Outlook Web Access and Office 365 services collected thousands of credentials relying on trusted domains such as SendGrid.The threat actor behind this activity, which received the name "Compact," has been operating since at least the beginning of 2020 and likely collected more than 400,000 credentials in multiple campaigns.Zooming in on credentialsUsing Zoom invites as a lure and an extensive list of email addresses, the operators of the phishing campaign delivered messages from hacked accounts on the SendGrid cloud-based email delivery platform.[...]Original Article ... See MoreSee Less

Photo

View on Facebook
· Share

Share on Facebook Share on Twitter Share on Linked In Share by Email

Proudly powered by WordPress | Theme: Moesia by aThemes