PII
Cyber Security For Data Sovereignty
August 11 by Elizabeth MixsonWith the emergence of global data privacy regulations such as GDPR, organizations that collect personal identifiable information (PII) must answer a new question: is data subject to the local laws of...
IOTW: Tokyo Olympics Suffers a Fujitsu-Related Breach
August 06 by Lisa MorganSome of the Tokyo Olympics victims had participated in a cyber security drill hosted by Japan's National Center of Incident Readiness and Strategy for Cybersecurity (NISC), which was yet another victi...
Ingress and Egress Controls Limit What Bad Actors Can Do
August 03 by Lisa MorganWhat's at stake are the company's crown jewels and reputation since stolen intangibles are valuable on the black market and their theft is an effective (but illegal) way to get revenge on the company....
IOTW: Contractor Allegedly Responsible for Aramco $50 million Ransom
July 30 by Lisa MorganSaudi Aramco's data is particularly concerning because in addition to the employee data, reports, products specs, invoices and other sensitive company information that was stolen, also for sale is a m...
IOTW: DOJ Indicts Network Security Firm COO
June 25 by Lisa MorganSingla has been charged with 17 counts of intentional damage to a protected computer and one count of obtaining information from a protected computer – specifically, patient data. The case is now bein...
Data Obfuscation: The Linchpin of Enterprise Data Security
June 23 by Elizabeth MixsonIn an effort to better protect sensitive data from exposure and deter cyber criminals, security organizations are increasingly leveraging data obfuscation to “hide data in plain sight.”
IOTW: Irish Healthcare Data for Sale on the Dark Web
May 28 by Lisa MorganThe fear now is that scammers unrelated to the Health Service Executive (HSE) attack will buy the data for their own nefarious use. Already, HSE is facing regulatory fines as the result of GDPR and ma...
IOTW: Scripps Health Malware Attack Could Cost Lives
May 21 by Lisa MorganScripps is not discussing the attack, nor is it providing any meantime to recovery (MTTR) estimate. The uncertainty and tight-lipped nature of the incident is not a surprise to anyone in the cyber sec...
Pending Data Protection and Security Laws At-A-Glance: APAC
May 12 by Elizabeth MixsonWe have focused on the latest laws protecting PII in the United States, Regulation through Global Data Protection and Security Laws, and APAC Data Protection and Security Laws. This is an overview of...
IOTW: University of California Schools Hit with Ransomware Attack
April 30 by Lisa MorganThe company released a patch for the 20-year-old product within 72 hours to the less than 50 customers that had been affected. In early February, Accellion stated it had notified all affected FTA cust...
Global Data Protection and Security Laws At-A-Glance: Regulation
April 28 by Elizabeth MixsonPersonal data protection and privacy law is rapidly evolving across the world. While some regions, such as the EU (GDPR), have adopted a more rigid and comprehensive approach, other countries are embr...
Data Protection and Security Laws At-A-Glance: APAC
April 21 by Elizabeth MixsonA quick guide to how Australia, China and South Korea approach data privacy regulations, links along with top-level insight on key principles of each law as well as similarities and differences to GDP...