Data protection and privacy in South Korea

lexology | November 20, 2019

The legislative framework for the protection of PII in Korea consists of the Personal Information Protection Act (the PIPA) and various sector-specific laws. The PIPA is the overarching statute regarding the protection of PII and was enacted with reference to the OECD guidelines and similar foreign precedents. Regarding information communication technology (ICT) and online privacy, the Act on Promotion of Information and Communications Network Utilisation and Information Protection (the Network Act) applies. Additionally, Korea has the following sector-specific laws that regulate the protection of PII.

Spotlight

Überwindung der Herausforderungen und Komplexitäten beim Aufbau von Souveränität als Teil einer Multi-Cloud-Strategie. 90 % der Unternehmen in Europa und 88 % im Nahen Osten, in der Türkei und in Afrika (META) nutzen heute die Cloud-Technologie, die einen wichtigen Baustein für die digitale Transformation darstellt. In dem Maße,

Spotlight

Überwindung der Herausforderungen und Komplexitäten beim Aufbau von Souveränität als Teil einer Multi-Cloud-Strategie. 90 % der Unternehmen in Europa und 88 % im Nahen Osten, in der Türkei und in Afrika (META) nutzen heute die Cloud-Technologie, die einen wichtigen Baustein für die digitale Transformation darstellt. In dem Maße,

Related News

Platform Security, Software Security, Cloud Security

Aqua Security Unveils AI-Guided Remediation for Lightning-Fast Vulnerability Response

GlobeNewswire | August 04, 2023

Aqua Security, the pioneer in cloud native security, today announced enhancement of the Aqua Cloud Security Platform with the availability of AI-Guided Remediation capabilities. Now overburdened security teams can better operationalize risk findings to rapidly reduce risk and help developers quickly fix issues. According to the Cybersecurity and Infrastructure Security Agency, adversaries exploit a vulnerability within 15 days (on average) of discovery, putting an organization at risk for nefarious activity. This window of exposure combined with an overwhelming volume of alerts amplifies the need for all organizations to reduce mean time to remediation (MTTR). “Cyber threats evolve faster than ever, and security practitioners are increasingly challenged to identify and quickly resolve critical issues,” said Amir Jerbi, CTO and co-founder, Aqua Security. “With Aqua Security’s AI-Guided Remediation, we’re empowering security teams to expedite the resolution of vulnerabilities and misconfigurations. This not only enhances cloud security, but it also fosters collaboration between developers and security experts, ensuring a more resilient and secure ecosystem.” With step-by-step instructions on how to fix the issue, it dramatically reduces the MTTR for security teams and reduces risk exposure, removing the hassle of manually finding advisories, the associated patches and verification steps. AI-Guided Remediation eliminates the guesswork, searching and self-education time, and it allows the developers to focus on completing the fix rather than trying to figure out how to complete it. Leveraging AI-Guided Remediation, dev and security teams can automatically generate prescriptive remediation steps for any misconfigurations and vulnerabilities across multiple clouds and workload types. As part of a comprehensive security platform with dev security, Aqua provides consistent information to dev and security teams within Aqua’s cloud native application protection platform (CNAPP), the Aqua Cloud Security Platform. Break Down Friction, Unify Security A top organizational challenge of DevSecOps adoption is the lack of collaboration between dev and security teams (source: IDC)1. AI-Guided Remediation bridges that gap while also reducing friction. Despite having different goals and responsibilities, developers are facing increasing pressure to act as security experts. As further illustrated by IDC data, building a culture of shared ownership between dev and security is a driver for adopting a DevSecOps. AI-Guided Remediation provides prescriptive contextual guidance to help developers, who may not be security experts, arm themselves with the information they need to remediate quickly and collaborate more effortlessly. “As a developer, AI-Guided Remediation is like having a security expert in your pocket,” said Jerbi. AI-Guided Remediation leverages generative AI and is part of the SaaS addition of the Aqua Cloud Security Platform; it is available with an Open AI integration with ChatGPT. To learn more, visit Aquasec.com. About Aqua Security Aqua Security stops cloud native attacks across the application lifecycle and is the only company with a $1M Cloud Native Protection Warranty to guarantee it. As the pioneer in cloud native security, Aqua helps customers reduce risk while building the future of their businesses. The Aqua Platform is the industry's most integrated Cloud Native Application Protection Platform (CNAPP), protecting the application lifecycle from cloud to cloud and back. Founded in 2015, Aqua is headquartered in Boston, MA and Ramat Gan, IL with Fortune 1000 customers in over 40 countries. For more information, visit https://www.aquasec.com/.

Read More

Platform Security, Software Security, Cloud Security

Legit Security Announces Integration with CrowdStrike to Bring Application Security Posture Management to Customers

PR Newswire | August 02, 2023

Legit Security, a cyber security company with an enterprise Application Security Posture Management platform that secures application delivery and protects an organization's software supply chain from attack, today announced a partnership with CrowdStrike, a global leader in cloud-delivered protection of endpoints, cloud workloads, identity and data protection. With this partnership, Legit Security integrates with the CrowdStrike Falcon® platform to provide extended application security, auto-discovery, and vulnerability management. Leveraging the two solutions, customers can automatically trace cloud application vulnerabilities back to their code origin and more rapidly prioritize and remediate security issues leveraging deep application context. With the need for frequent software releases, DevOps and modern CI/CD pipelines have left security teams struggling to secure their cloud applications in the face of increasing threats. Within these constantly changing development environments, legacy security approaches fall short with high levels of noise and alerts, making it difficult to quickly prioritize cloud application vulnerabilities and identify the root cause. Compounding the challenge, organizations lack real-time application security posture management across their CI/CD pipelines and pre-production development environments as software supply chain attacks continue to grow dramatically. With Legit Security's integration with the Crowdstrike Falcon® platform, security teams can quickly see where vulnerabilities discovered in production applications originated, and where vulnerabilities discovered in code get deployed. Legit Security ingests security data across cloud workloads from the CrowdStrike Falcon platform to identify and trace the source of vulnerabilities and accelerate triage and prioritization of issues based on context and severity. "Cloud application security is a top priority, however enterprises need to balance security with an ability to improve productivity and do more with less," said Roni Fuchs, CEO and co-founder, Legit Security. "Instantly tracing cloud application security vulnerabilities back to their source with full context regarding the application, its software supply chain, and code origination can dramatically improve remediation time and productivity for both security and development teams. Now listed in the CrowdStrike Store, Legit Security's offering allows customers to easily find information on our integration to ultimately gain dramatic improvements in risk scoring, security issue classification and prioritization, and get the most out of their valuable security resources." About Legit Security Legit Security provides application security posture management platform that secures application delivery from code to cloud and protects an organization's software supply chain from attack. The platform's unified application security control plane and automated SDLC discovery and analysis capabilities provide visibility and security control over rapidly changing environments and allow security issues to be prioritized based on context and business criticality to improve security team efficiency and effectiveness.

Read More

Enterprise Security, Platform Security, Software Security

ReasonLabs Releases Key Updates to Wi-Fi Security Product RAV VPN

PR Newswire | August 16, 2023

ReasonLabs, the cybersecurity pioneer equipping home users with the same level of cyber protection used by Fortune 500 companies, today announced major updates to its renowned RAV VPN. This latest release for desktop and Android incorporates significant security and infrastructure improvements, reinforcing RAV VPN's position as a complete, reliable, and user-friendly tool in the fight for online privacy and identity protection. The new releases ensure RAV VPN, both the desktop and mobile applications, provides Wi-Fi security wherever a user might be. With an updated RAV VPN, users can seamlessly browse the web with confidence, knowing that their data is encrypted and they are protected from threats such as Man-in-the-Middle attacks. RAV VPN is simple to install and extremely easy to use, making online privacy for all easily attainable. "As our digital landscape rapidly evolves, safeguarding our online presence becomes more essential than ever before," said Kobi Kalif, CEO and co-founder of ReasonLabs. "With an unwavering commitment to your digital privacy, we are proud to unveil our latest innovation to RAV VPN. We are redefining what security in the digital age means by delivering to home users the same cyber security protection that Fortune 100 companies use." Without sufficient Wi-Fi protection, a user's network can be susceptible to hacking, malware, and other privacy and security hazards. Bad actors can exploit these vulnerabilities to steal highly discreet information like financial details, social security numbers, email addresses, passwords, and more private data. To mitigate this, Wi-Fi protection from RAV VPN secures users' wireless networks to create an encrypted tunnel between their PC or Android device and the internet. RAV VPN is a part of ReasonLabs' industry-leading suite of consumer-focused cybersecurity products, which includes its flagship product, RAV Endpoint Protection, as well as an Endpoint Detection and Response, DNS, Parental Control App, and more. Led by cybersecurity, artificial intelligence, and machine learning experts, ReasonLabs delivers the highest levels of cybersecurity protection and privacy to home users worldwide. About ReasonLabs ReasonLabs is a leading cybersecurity company equipping tens of millions of home users with the same level of cyber protection utilized by Fortune 500 companies. Its AI-powered, next-generation antivirus engine scans billions of files around the world to predict and prevent cyberattacks in real time, 24/7. Its flagship product, RAV Endpoint Protection, together with its other products combine to form a multilayered solution that safeguards home users against next-generation threats. Co-founded in 2016 by seasoned cybersecurity expert Andrew Newman—an architect of Microsoft's native cybersecurity program, Microsoft Defender—ReasonLabs is based in New York and Tel Aviv. Learn more at https://www.ReasonLabs.com.

Read More