A deeper dive into GDPR: Data Control Posted on 23 August 2017 by Alex Hanway in Enterprise Security How do we provide a level of data control that is compliant with GDPR? Enter Encryption and key management. Ultimately, with encryption, only key holders… How much control do CIOs have over confidential information shared… Posted on 28 June 2012 by Gemalto in Enterprise Security Following on from our recent post on who is responsible for the security function, here is the second in our series of posts revealing the… From Twitter Loading... More from Twitter Subscribe to updates Select a category of interest: All Categories Enterprise SecurityFinancial ServicesGovernmentIoTMobileSoftware Monetization Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 29/04/19 @ 14:04 Lars Mikkelsen Yes let me have one29/04/19 @ 09:04 Tim Cawsey Hi there, you need to get in touch with the operator who supplied you with the eSIM. Thanks22/04/19 @ 14:04 Jason Is there any mention of the manufacturer of the Apple Card?