Don’t Just Rely On Data Privacy Laws to Protect Information

Security Magazine | February 24, 2020

Data privacy laws are evolving to allow individuals the opportunity to understand the types of data that companies are collecting about them and to provide ways to access or delete the data. The goals of data privacy law are to give some control of the data back to the individual, and to provide a transparent view on the collecting and safeguarding of that data. Prior to the GDPR and CCPA, it was difficult to understand what was being collected and how it was being used. Was the website selling your information to other companies? Who knows, but chances are they were. We’ve all heard the line: “If it’s free, then you’re the product.” Also, paying for a service is no guarantee that your information is not being sold. Data privacy laws attempt to address these problems by requiring companies to obtain affirmative consent from individuals, explain what is being collected and define the purpose for its use.

Spotlight

The cyberthreats that menace the global economy are multiplying at an alarming rate. From denial-of-service attacks to take a website offline to corporate account takeover and malware, financial institutions should take notice of the information security threats that could deeply affect their infrastructure in this rapidly evolving world.

Spotlight

The cyberthreats that menace the global economy are multiplying at an alarming rate. From denial-of-service attacks to take a website offline to corporate account takeover and malware, financial institutions should take notice of the information security threats that could deeply affect their infrastructure in this rapidly evolving world.

Related News

DATA SECURITY

Terralogic Adopts Stellar Cyber’s Open XDR Security Platform to Deliver Comprehensive View of Customer Security

Stellar Cyber | December 07, 2021

Stellar Cyber, the leading security operations platform for MSSPs and innovator of Open XDR, announced today that a top 250 MSSP and technology integrator Terralogic has adopted the Stellar Cyber Open XDR platform to bring new levels of visibility and security to its customers across India. “We are always seeking new tools that help us deliver world-class security services for our customers,” said Sandeep Vijayaraghavan, VP of Cybersecurity at Terralogic. “The Stellar Cyber Open XDR platform is the first we’ve seen that unifies and correlates data from our various security tools to present a single, comprehensive view of our customers’ security.” Unlike stand-alone tools that simply capture device logs or protect network endpoints, Stellar Cyber’s Open XDR platform aggregates data inputs from all existing security tools, analyzes it for anomalies, and presents contextual, prioritized security incidents in an intuitive dashboard. For the first time, Stellar Cyber’s platform gives MSSP security professionals a single console to view customers’ entire security profiles and to take quick action when threats are detected. “We aim to be the leading MSSP in the Indian subcontinent, and for years we have offered a range of cybersecurity services to our customers,” said Renil Komitla, CEO of Terralogic. “Stellar Cyber’s platform gives us a new ability to rise above the competition.” “When an MSSP has dozens or hundreds of customers, it’s impossible to keep up with cyberattacks in a timely manner using siloed security tools,” said Brian Stoner, VP of the MSSP business unit at Stellar Cyber. “Our automated and intuitive platform helps MSSPs like Terralogic see the big picture and get a true grasp of what’s going on in a network and how to remediate issues.” About Terralogic Terralogic is the ideal cyber-expert for the next generation business. We provide intelligent cybersecurity solutions that help customers define the right framework, and our solutions include VAPT, Compromise Assessment, Cloud Security, Threat Hunting, Security Solution Deployment & Incident Management. Since 2008, Terralogic has been rendering futuristic technology services for the forward-looking connected world. Our target centric DNA ensures ahead of the time engineering expertise following client roadmap and business needs. Our services encompass, UI/UX, Digital Transformation, Engineering, SAAS, IT Infrastructure services, MSSP, Cloud and Support Services, not to mention our innovations in the field of Emerging technologies viz IoT, AR/VR, and Data Science. We deep dive into enterprise goals to get to the heart of the criteria, maintaining a macro-view while researching trends and evolving models. Terralogic provides advisory consulting and IT services for Automotive, Communications, Construction, E-commerce, Gaming, Healthcare, Manufacturing, Media & Entertainment, Retail, Travel & Transportation industries. About Stellar Cyber Stellar Cyber’s Open XDR platform delivers Everything Detection and Response by ingesting data from all tools, automatically correlating alerts into incidents across the entire attack surface, delivering fewer and higher-fidelity incidents, and responding to threats automatically through AI and machine learning. Our XDR Kill Chain™, fully compatible with the MITRE ATT&CK framework, is designed to characterize every aspect of modern attacks while remaining intuitive to understand. This reduces enterprise risk through early and precise identification and remediation of all attack activities while slashing costs, retaining investments in existing tools and accelerating analyst productivity. Typically, our platform delivers an 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley.

Read More

SOFTWARE SECURITY

Through All-Threat™ Campaign, Ardalyst Announced Zero Trust Architecture Solution

Ardalyst | March 02, 2022

In May 2021, the Biden administration issued an Executive Order (EO) to tighten cybersecurity across the federal government, following a series of high-profile cyber attacks. The Office of Management and Budget (OMB) issued the document "Moving the United States Government Toward Zero Trust Security Principles" in February 2022. It lays out strategic goals for moving the federal government to a Zero Trust Architecture and requires agencies to produce a strategy to implement it, as well as designate a Zero Trust lead for each agency. Ardalyst is pleased to announce a concentrated effort to deliver an All-ThreatTM Strategy approach to Zero Trust Architectures as a means of supporting government agencies and federal contractors in attaining cyber resiliency, depending on collaboration with partners at Mandiant and Microsoft. This endeavour will create a Zero Trust security system, which recognises that security systems can be hacked. The EO specifies that Zero Trust principles will be embedded in any software purchased by the federal government or used by its contractors. To do so, the EO requires a review of the Federal Acquisition Regulation (FAR). Due to changes to the FAR and, by extension, the DFARS, defence contractors will need to include Zero Trust Architecture into their communication and collaboration platforms in order to continue doing business with the DoD. By the end of Fiscal Year (FY) 2024, agencies must accomplish particular zero trust security goals. Identity, Devices, Network, Applications, and Data are the five pillars to which it applies. The Ardalyst All-ThreatTM Zero-Trust Architecture is an intelligence-led strategy to defending your company against all tiers of cyber threats in a presumed hostile environment. The All-Threat solution is a comprehensive approach that combines Microsoft's Zero Trust Architecture, Endpoint Security, and Mandiant's Threat Intelligence to build a layered security environment that is resilient against several tiers of hostile attacks. Ardalyst is headquartered in Annapolis, Maryland. Ardalyst leverages decades of experience and expertise in cyber operations and resiliency engineering to deliver a comprehensive cybersecurity programme that is cost-effective, aligned to your mission, and guaranteed to meet your compliance requirements by partnering with our customers to truly understand their unique environment and cybersecurity posture. Uncertainty is replaced with comprehension.

Read More

Work-From-Home Cyber Security Risks: Three Ways to Protect Your Network

prnewswire | August 26, 2020

Responding to the rapid increase in work-from-home cyber security incidents at small and midsized businesses (SMBs), DIGIGUARD is now focusing its Cyber Threat Protection Services on remote workforce IT security. "Managing and monitoring work-from-home (WFH) employees includes cybersecurity risk management. Controlling network access helps protect valuable business and customer data from cybercriminals," said DIGIGUARD's Harvey Yan. At a minimum, Yan urges SMBs do three things: Secure and update network perimeter defenses along with endpoints that access the network such as computers, laptops and mobile phones.

Read More