Incident Response In The Public Eye

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Mon, 31 Dec 2018 17:00:44 +0000

Cyberattacks happen constantly. Every day organizations are attackers online whether they realize it or not. Most of these attacks are passing affairs. The mere fact that systems are on to the internet makes them a target of opportunity. For the most part, these attacks are non-events. Security software, bugs in attack code, and updated applications…

The post Incident Response In The Public Eye appeared first on .

Read more

Accelerating PCI Data Security Standard projects with Deep Security as a Service

Credit to Author: Trend Micro| Date: Thu, 27 Sep 2018 18:00:17 +0000

Does your organization need to meet PCI DSS requirements? Are you struggling with multiple security tools? Or stretching your already overstretched team to prepare for an audit? Time to hit the accelerator with Trend Micro! If your applications deal with credit or payment card data, you need to go through a long and cumbersome certification…

The post Accelerating PCI Data Security Standard projects with Deep Security as a Service appeared first on .

Read more

The Role of Sales & Channel in GDPR Compliance

Credit to Author: Steve Neville| Date: Wed, 09 May 2018 14:47:42 +0000

As a part of our journey to General Data Protection Regulation (GDPR) compliance, we have looked across our business to ensure that all the different departments, employees and products are aligned with our compliance goals and have a solid understanding of the GDPR. Sales people and channel partners are integral parts of our business, and…

The post The Role of Sales & Channel in GDPR Compliance appeared first on .

Read more

What HIPAA and Other Compliance Teaches Us About the Reality of GDPR

Credit to Author: Greg Young| Date: Thu, 03 May 2018 14:00:46 +0000

with contributing author, William J. Malik, CISA | VP, Infrastructure Strategies The date for General Data Protection Regulation (GDPR) compliance is three months away, yet many organizations, especially those outside Europe, remain unprepared. It turns out that the experiences from other privacy compliance regulations are less helpful than assumed, but the best lessons learned may be…

The post What HIPAA and Other Compliance Teaches Us About the Reality of GDPR appeared first on .

Read more

State-of-the-art Security: The role of technology in the journey to GDPR compliance

Credit to Author: Steve Neville| Date: Wed, 02 May 2018 18:35:20 +0000

As we’ve discussed over the last 7 weeks in our video case study series, the General Data Protection Regulation (GDPR) impacts many different areas of our company, including our employees, customers, and partners. The GDPR also mandates the use of state-of-the-art security, which, as a leader in security solutions, means that our products are being…

The post State-of-the-art Security: The role of technology in the journey to GDPR compliance appeared first on .

Read more

Customer data & marketing operations: Keeping your data safe on the journey to GDPR compliance

Credit to Author: Steve Neville| Date: Wed, 25 Apr 2018 14:48:46 +0000

Emails. Web forms. Events. [Oh my!] These marketing tactics are all designed to gather, store, and evolve relationships with your prospects, customers, and partners. Often times, they are the first point of contact for your organization from the outside world—and they all feed into your marketing automation systems. With the General Data Protection Regulation (GDPR)…

The post Customer data & marketing operations: Keeping your data safe on the journey to GDPR compliance appeared first on .

Read more

Sharing the Journey to GDPR Compliance

Credit to Author: Steve Neville| Date: Wed, 11 Apr 2018 14:11:39 +0000

Customer data is everything at Trend Micro. As a global cybersecurity leader, protecting customer data is what we do for a living, which is why it’s important for us to put into practice what we talk to our customers about. As a demonstration of our commitment to protecting our millions of customers, we treat all…

The post Sharing the Journey to GDPR Compliance appeared first on .

Read more

The GDPR is Coming: We Shed Light on What’s Still Not Working

Credit to Author: Trend Micro| Date: Thu, 22 Mar 2018 12:00:20 +0000

On May 25, the biggest shake-up to Europe’s data protection laws in almost a generation will finally take effect, after years of planning. For any US organization handling data on EU citizens, including service providers, it means you could face hefty fines of up to €20m ($24.7m) or 4% of global annual turnover for non-compliance….

The post The GDPR is Coming: We Shed Light on What’s Still Not Working appeared first on .

Read more

Security Round-up: Five Things We’ve Learned in 2017

Credit to Author: Trend Micro| Date: Wed, 27 Dec 2017 14:00:04 +0000

The past 12 months have been packed with geopolitical incidents, global malware threats and ubiquitous big-name data breaches. From the CIA Vault7 and NSA Shadow Brokers leaks at the start of the year, to the WannaCry and NotPetya ‘ransomware’ campaigns, and Uber’s shocking revelations just last month, there’s been plenty for UK CISOs to ruminate…

Read more

Pursuing The Right to be Left Alone

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Thu, 16 Nov 2017 13:00:56 +0000

GDPR will impact any business handing EU citizen data.The three pillars of privacy, defined in “The Right to Privacy” (4 Harvard L.R. 193 (Dec 15, 1890)), are 1) the right to know what information is gathered about you, 2) the right to know how it will be used, and 3) the right to be left alone. The European Union has incorporated these principles…

Read more

Equifax Breach – an Example of Good Communications

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Fri, 08 Sep 2017 15:50:25 +0000

Equifax announced a massive breach that could impact at least 143 million US consumers. That’s 44% of the US population. This breach will have a significant impact on a lot of people. Companies in the financial sector take cybersecurity very seriously. Part of that work is accepting the reality of today’s threat landscape. Security teams…

Read more