ICO Invites Applicants to GDPR Sandbox

Infosecurity Magazine | April 01, 2019

ICO Invites Applicants to GDPR Sandbox
The Information Commissioner’s Office (ICO) has launched in beta a new service designed to help organizations test innovative new services without fear of running foul of the GDPR. The ICO’s Sandbox service is now open for applications from organizations with projects that have a "demonstrable public benefit." Around 10 organizations will be chosen for this beta phase, with start-ups, SMEs and large organizations, across private, public and voluntary sectors able to apply. The ICO defines “public benefit” both in terms of the number of people impacted by a service and the extent to which they could benefit. Given the cutting edge nature of the new products being developed here and the compliance challenges they may present, the Sandbox will also help the ICO predict where changes may need to be made in terms of the guidance it offers businesses on data protection. "Thousands of organizations are working on projects using personal data to transform the way we live and work. We want to support this innovation whilst helping ensure that the products and services under development are compliant and deliver benefits to the public,” said Simon McDougall, executive director for technology and innovation at the ICO.

Spotlight

This infographic gives a quick visual representation of some of the key findings of recent Webroot research on web security in the U.S. and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And the impacts of failing to protect against mobile-browsing threats can be severe. The infographic also gives a checklist of things you can do to reduce the risks.

Related News

Unisys Secures Biometric Identity Management on Cloud with New Versions of Stealth(identity)™ Software

Unisys | July 21, 2020

Unisys Corporation (NYSE: UIS) today announced the availability of Unisys Stealth(identity)™ Software-as-a-Service (SaaS) 2.0 and Stealth(identity) 2.7, the latest versions of the company's biometric identity management software. Stealth(identity) is highly scalable and brings flexible biometric authentication and strong security to enterprises of any size, while the SaaS offering means protection capabilities are available either on premises or in the cloud.Stealth(identity) strengthens defense against identity fraud by establishing trusted and irrefutable identities of individuals across multiple physical and digital channels. It also provides comprehensive control of biometric management processes and the flexibility to adapt to and leverage advancements in technology to consistently stay ahead of cyber criminals.Identity theft has proven to be particularly problematic during the COVID-19 pandemic. According to the U.S. Federal Trade Commission, more than 124,000 complaints regarding fraud schemes related to COVID-19 have already been filed from consumers, with nearly half (48%) saying they lost money in a scam. And according to the 2020 Unisys Security Index™, the longest-running snapshot of consumer security concerns conducted globally, identity theft ranks as the top area of concern for consumers both globally and in the U.S.

Read More

Check Point software collaborates with New York University to close cybersecurity workforce gap

globenewswire | August 05, 2020

Check Point Software Technologies Ltd, a leading provider of cyber security solutions globally, extends its cyber security academia cooperation with New York University (NYU) to nurture the next generation of computer engineers. For the first time, NYU is partnering with a cyber-security software company that addresses multi vector protections: cloud, network, endpoint, and mobile. Leveraging Check Point’s unmatched experience and expertise in the cyber landscape, NYU Tandon School of Engineering students will receive full visibility and understanding of the Check Point Infinity Architecture via Check Point's eLearning system. The Infinity eLearning program gives students access to the following innovative Cyber Security learning paths.

Read More

Cisco Makes Webex More Secure, Triples Video Call Capacity

Cisco | June 18, 2020

Cisco has revealed its video conferencing platform Webex will receive a host of new security facilities designed to better reflect the new business reality. Cisco Live! 2020, the firm announced it would build upon existing security facilities by extending its data loss prevention (DLP) retention. Like competitors Zoom and Microsoft Teams, Cisco was well-positioned to capitalize on the sudden dependence on cloud-based collaboration services. Cisco has revealed its video conferencing platform Webex will receive a host of new security facilities designed to better reflect the new business reality, amid an unprecedented surge in demand. At Cisco Live! 2020, the firm announced it would build upon existing security facilities by extending its data loss prevention (DLP) retention, Legal Hold and eDiscovery to Webex Meetings. The service will also see AES 256 Bit encryption with GCM mode added to its end-to-end encryption options - a move designed to deliver superior protection for meeting data and resistance to tampering. The company also revealed it has scaled Webex’s global capacity dramatically in recent weeks, and is now running the service at three times the previous capacity. The platform supported half a billion meeting participants in April alone, accounting for 25 billion meeting minutes. Read more: CISCO TO SECURE ITS BLOCKCHAIN-AS-A-SERVICE (BAAS) PLATFORM FOR ENTERPRISE SECURITY Think this is the opportunity, this is the time to build out a more robust technology infrastructure to prepare for what’s next, because we don’t know what will come next ~ Robbins said, Cyber Security What we know is possible now versus what we believed 6 months will fundamentally change how we think about work in the future. Period.It’s time to think about how our wider network architecture really needs to change, based on these incredibly different traffic flows we see today, versus the way they were when we architected this infrastructure 15-20 years ago. Like competitors Zoom and Microsoft Teams, Cisco was well-positioned to capitalize on the sudden dependence on cloud-based collaboration services. Having scaled rapidly to match the explosion in demand, the firm is now looking to cement its position with a heightened emphasis on security - an issue that has defined recent debates around video collaboration. When it comes to business meetings, learning in classrooms, doctors appointments, government hearings - those need safeguarding,” said Javed Khan, VP and GM of Cisco’s Collaboration Group. Security has to be core to who you are as a company. It is not something that can be bolted on top as an afterthought. It’s time to think about how our wider network architecture really needs to change, based on these incredibly different traffic flows we see today, versus the way they were when we architected this infrastructure. According to the firm, dynamism defines the new enterprise environment, and security measures should reflect this new reality. Cybercriminals have launched a new series of phishing attacks which attempt to steal the account credentials of Cisco Webex users by utilizing fake certificate error warnings. Just as other video conferencing software has seen a huge uptick in usage by remote workers during the pandemic, so to has Cisco's video and team collaboration solution. So far the campaign, which uses graphics and formatting taken from legitimate Cisco emails to impersonate the company, has already sent out phishing emails to up to 5,000 Webex users according to the email security firm Abnormal Security. The attackers try to lure in users by inducing a sense of urgency in their phishing emails that are designed to closely resemble the automated SSL certificate error alerts that the company sends out to its customers. The phishing emails used in the campaign warn unsuspecting users that they need to verify their accounts as they are blocked by the administrator as a result of Webex Meeting SSL certificate errors. Users are then asked to click on an embedded “Log in” hyperlink in the message and sign in in order to unlock their accounts. Abnormal Security provided more details on the link contained in the campaign's phishing emails in an advisory, saying. Read more: GOOGLE TOP CHOICE FOR CYBERCRIMINALS FOR BRAND-IMPERSONATION SPEAR-PHISHING CAMPAIGNS

Read More

Spotlight

This infographic gives a quick visual representation of some of the key findings of recent Webroot research on web security in the U.S. and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And the impacts of failing to protect against mobile-browsing threats can be severe. The infographic also gives a checklist of things you can do to reduce the risks.