Security Round-up: Five Things We’ve Learned in 2017

Credit to Author: Trend Micro| Date: Wed, 27 Dec 2017 14:00:04 +0000

The past 12 months have been packed with geopolitical incidents, global malware threats and ubiquitous big-name data breaches. From the CIA Vault7 and NSA Shadow Brokers leaks at the start of the year, to the WannaCry and NotPetya ‘ransomware’ campaigns, and Uber’s shocking revelations just last month, there’s been plenty for UK CISOs to ruminate…

Read more

Pursuing The Right to be Left Alone

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Thu, 16 Nov 2017 13:00:56 +0000

GDPR will impact any business handing EU citizen data.The three pillars of privacy, defined in “The Right to Privacy” (4 Harvard L.R. 193 (Dec 15, 1890)), are 1) the right to know what information is gathered about you, 2) the right to know how it will be used, and 3) the right to be left alone. The European Union has incorporated these principles…

Read more

Equifax Breach – an Example of Good Communications

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Fri, 08 Sep 2017 15:50:25 +0000

Equifax announced a massive breach that could impact at least 143 million US consumers. That’s 44% of the US population. This breach will have a significant impact on a lot of people. Companies in the financial sector take cybersecurity very seriously. Part of that work is accepting the reality of today’s threat landscape. Security teams…

Read more

Edith Wharton, Identity Theft, and the GDPR

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Tue, 05 Sep 2017 12:00:23 +0000

During one of my talks for Garter, I asked the audience, “How many of you have ever had anything stolen?” Many hands went up. Then I asked, “How did you know it was stolen?” The answers generally offered, “I looked for it, and it wasn’t there.” Data theft, and in particular identity theft, is different….

Read more