Government Focus on Cybersecurity Elevates Data Breach Legislation

Recent high-profile security breaches at nationwide retail, healthcare, entertainment, public sector and financial service organizations has brought heightened attention from lawmakers in Congress and the Obama Administration. This growing focus on cybersecurity and data breaches, coupled with a growing sense of bipartisanship on the issue, have led some to speculate that Congress could finally pass a national data breach and data security standard to replace the current patchwork of state laws. However, obstacles remain that may make consensus just beyond the grasp of policymakers. At the same time, policymakers in the European Union and Brazil are considering new approaches to data breach notification that could impact businesses that engage in global commerce.

Spotlight

Sattrix Information Security

Sattrix Information Security is professionally driven & value based, quality-oriented organization. We are pivoted around providing our customers and partners the best of Cybersecurity services. We have collaborated and worked with diverse range of industries such as BFSI, Retail, TELCO, Government, Oil and Gas and ITIS worldwide. Sattrix Information Security helps small, mid and large enterprises in digital transformation which thrive in a continuously changing period. We offer advance Managed Services, Cloud Security consulting, and InfoSec Consulting services to create new avenues for our valuable customers. We don’t only make absolute sense to your business but do so in a way that is customized by none other than you. And because we rely purely on our expertise to deliver a solution, no constraint is really a deal breaker- be it remote, onsite or hybrid solution deployment or the complexity associated with it; we are ready to walk with you in the Cybersecurity journey.

OTHER WHITEPAPERS
news image

Open RAN MoU progress update on maturity, security and energy efficiency

whitePaper | September 29, 2022

As the momentum behind Open RAN continues to grow, it is natural that relevant experts and decision makers want to understand its progress and how the Open RAN industry has risen to the challenges, in particular relating to maturity, security and energy efficiency. Over the course of 2022, Open RAN MoU Operators encouraged an open dialogue about Open RAN and have taken steps to understand concerns and address valid questions. This paper represents a progress report that helps to showcase the gains and set the agenda for 2023. In summary:

Read More
news image

Cybersecurity for Industry

whitePaper | November 24, 2022

This white paper provides an overview of “Cybersecurity for Industry.” It describes the threats and hazards to which industrial automation systems and production plants are exposed and introduces concepts for minimizing these risks and instituting a level of protection that’s acceptable on economic as well as security grounds.

Read More
news image

Zero Trust Maturity Model

whitePaper | April 28, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More
news image

The Definitive WFH Security Checklist: 10 Easy Steps to Safer Remote Access

whitePaper | September 15, 2022

Providing secure, fast remote access is a top priority as the modern workforce has become predominantly remote. Working from home (WFH) or outside the office was once a choice or a stopgap measure, but today, it’s critical for business agility.

Read More
news image

Dashlane’s Security Principles & Architecture

whitePaper | May 16, 2023

Dashlane Business supports login with single sign-on (SSO), using any SAML 2.0 enabled IdP. In a single-sign-on setup, the user doesn’t have to input UserMP . Instead, a random key is generated at account creation. This key (the data encryption key) is delivered to the Dashlane app after the user successfully logs in to the IdP, and it is used as a symmetric encryption key to encrypt and decrypt the user data.

Read More
news image

Consumer IoT Device Cybersecurity Standards, Policies, and Certification Schemes

whitePaper | February 16, 2023

There are three key elements in the world of Internet of Things cyber security. Standards are created in order to harmonize a common set of requirements. Regulations are created in order to incentivize manufacturers to adopt cybersecurity hygiene practices so as to protect societies and increase their cyber-resilience. Labels are created in order to provide visibility to consumers.

Read More

Spotlight

Sattrix Information Security

Sattrix Information Security is professionally driven & value based, quality-oriented organization. We are pivoted around providing our customers and partners the best of Cybersecurity services. We have collaborated and worked with diverse range of industries such as BFSI, Retail, TELCO, Government, Oil and Gas and ITIS worldwide. Sattrix Information Security helps small, mid and large enterprises in digital transformation which thrive in a continuously changing period. We offer advance Managed Services, Cloud Security consulting, and InfoSec Consulting services to create new avenues for our valuable customers. We don’t only make absolute sense to your business but do so in a way that is customized by none other than you. And because we rely purely on our expertise to deliver a solution, no constraint is really a deal breaker- be it remote, onsite or hybrid solution deployment or the complexity associated with it; we are ready to walk with you in the Cybersecurity journey.

Events