Schrems: Decision Due Next Week
Privacy and Cybersecurity Law
SEPTEMBER 30, 2015
So much for the dust settling… The CJEU has confirmed that it will be delivering its final judgement on the […].
Privacy and Cybersecurity Law
SEPTEMBER 30, 2015
So much for the dust settling… The CJEU has confirmed that it will be delivering its final judgement on the […].
NopSec
SEPTEMBER 15, 2015
Another day, another hack. And not just any old hacking incident, but one involving yet another healthcare provider, only demonstrating how vulnerable the industry is. In the case of the recent Excellus breach, initial investigation reports are putting hackers in their network for over a year and a half. The breach was uncovered as part of a routine security assessment, but I have one question.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Digital Shadows
SEPTEMBER 9, 2015
The Internet of Things (IoT) is a development that is the direct result of objects, technology, people that have been. The post How the Internet of Things (IoT) is Expanding Your Digital Shadow first appeared on Digital Shadows.
Privacy and Cybersecurity Law
SEPTEMBER 25, 2015
As the dust begins to settle after the headline-grabbing Advocate General opinion in the Schrems v. Irish Data Protection Commissioner […].
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Privacy and Cybersecurity Law
SEPTEMBER 16, 2015
After four years of negotiations, the EU and US have reached an agreement that will protect EU citizens’ personal data […].
Digital Shadows
SEPTEMBER 9, 2015
It seems that the concept of ‘intelligence’ is a problem. The definition isn’t agreed, and the industry is peppered with. The post The Intelligence Cycle – What Is It Good For? first appeared on Digital Shadows.
Cyber Security Informer brings together the best content for cyber security professionals from the widest variety of industry thought leaders.
Digital Shadows
SEPTEMBER 8, 2015
Interest in London’s burgeoning tech industry is growing so rapidly that even David Cameron has taken notice; at Pitch10, an event at 10 Downing Street to be held on Thursday 31st July, ten of the most promising digital companies in Britain will pitch their businesses to an audience that includes Cameron himself. The post Digital Shadows Invited To 10 Downing Street first appeared on Digital Shadows.
Digital Shadows
SEPTEMBER 8, 2015
This post will be about some of the challenges you are likely to face trying to handle data in different languages and how to deal with them. Most of our code is in Java so the examples here will all be written in Java. The post Working In Multilingual Sources first appeared on Digital Shadows.
Digital Shadows
SEPTEMBER 8, 2015
For several years now there has been considerable hype and hubris around the term ‘intelligence’ within the cyber security industry. It feels as if the term has been diluted as its usage has extended to include vendors dealing in a range of issues from bad IPs and Indicators of Compromise, to tip-offs that hacktivist groups are targeting particular sectors and the activities of APT groups, and everything in-between.
Digital Shadows
SEPTEMBER 8, 2015
To organisations, threat intelligence is about understanding the threat landscape – the various actors and campaigns which conduct cyber attacks – so that when they are specifically targeted it can be detected, mitigation put in place, and the risk to their business reduced. Robust source evaluation minimises the chance of crying wolf, or warning of the wrong threat entirely.
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Digital Shadows
SEPTEMBER 8, 2015
Alastair Paterson, CEO of Digital Shadows, recently visited 10 Downing Street to participate in a roundtable on cyber security. The session brought together leaders from industry, academia and government and sought to address the challenges surrounding cyber security policy. The post Digital Shadows joins roundtable at 10 Downing Street first appeared on Digital Shadows.
Digital Shadows
SEPTEMBER 8, 2015
Here at Digital Shadows we’ve worked hard to assemble the most dedicated and talented development team possible and that has resulted in our team being concentrated here in London, but including members both further afield in the UK and internationally. This means that we’ve had to learn how to work with a distributed team and this post will cover our experiences and some of the utilities we’re making use of to work as efficiently as possible.
Digital Shadows
SEPTEMBER 8, 2015
This week my colleague and I attended the SANS Cyber Threat Intelligence conference in Washington DC. It was great to hear more from analysts and CTI users from across the community, as well as mingle with the plethora of vendors who were present. This blog explores some of the themes which arose from discussions on analytical tradecraft. The post Analytical Tradecraft at Digital Shadows first appeared on Digital Shadows.
Digital Shadows
SEPTEMBER 8, 2015
CBEST aims to improve the understanding of the types of cyber-attack that could undermine financial stability in the UK, and. The post Digital Shadows Works Alongside Bank of England To Develop New Testing Framework To Help Guard UK Financial Sector Against Cyber Attack first appeared on Digital Shadows.
Advertisement
After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!
Digital Shadows
SEPTEMBER 7, 2015
Over the next few blog posts we’ll be looking at various types of cognitive bias and suggest ways of dealing with them. The post The Dangers of Groupthink first appeared on Digital Shadows.
Digital Shadows
SEPTEMBER 7, 2015
This post moves on to the second cause of groupthink and tries to understand how organizational structural faults may result in manifestations of groupthink. The post The Dangers of Groupthink: Part 2 first appeared on Digital Shadows.
Digital Shadows
SEPTEMBER 7, 2015
Last week, news quickly spread about a security breach that impacted the casual dating website Adult Friend Finder. Will Gragido. Head of Threat Intelligence for Digital Shadows in the USA, shares his findings. The post The Adult Friend Finder Breach: A Recap first appeared on Digital Shadows.
Digital Shadows
SEPTEMBER 7, 2015
A look at the recent MOFA breach. The post Saudi Arabia MOFA Breach first appeared on Digital Shadows.
Advertisement
How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.
Digital Shadows
SEPTEMBER 7, 2015
A look at emerging markets and services, specifically at ransomeware-as-a-service. The post Emerging Markets & Services: Ransomware-as-a-Service first appeared on Digital Shadows.
Digital Shadows
SEPTEMBER 7, 2015
Introduction Today social media channels the world over are a buzz with news of Kaspersky Labs disclosure of the discovery. The post Kaspersky Labs Discloses Duqu 2.0 Attack first appeared on Digital Shadows.
Digital Shadows
SEPTEMBER 7, 2015
The need for organizations to focus on their risk exposure is growing daily, and their ability to establish a clear. The post Digital Shadows Integrates With Maltego Through Partnership With Malformity Labs first appeared on Digital Shadows.
Digital Shadows
SEPTEMBER 7, 2015
Introduction Recently we wrote about the initial breach of the Ministry of Foreign Affairs of the Kingdom of Saudi Arabia. The post What’s In a Name? The Mystery Surrounding the Identity of the Actors Responsible for the Saudi Arabia Breaches first appeared on Digital Shadows.
Advertiser: Revenera
In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.
Digital Shadows
SEPTEMBER 7, 2015
Extortion is nothing new for organised crime. For centuries, gangs have been operating protection rackets and kidnappings to successfully extract ransom money from their victims. And as with many things in modern life, these old techniques have been successfully brought over to the cyber realm. The post Online Extortion - Old Ways, New Tricks first appeared on Digital Shadows.
Digital Shadows
SEPTEMBER 4, 2015
Yesterday we announced that Stuart McClure, founder and CEO of Cylance, Inc, is joining our Board of Directors. The entire company is excited about his joining us, and James Chappell and I are especially looking forward to working with him as we further grow the company. While we are excited, Stuart’s joining our board is not the only great team news we have at Digital Shadows.
Digital Shadows
SEPTEMBER 4, 2015
One of the foundational values of Digital Shadows is the appreciation and value we put on our collaboration with customers and our coordination with our strategic business partners. It is because of this value that we’re delighted to announce today that we’ve entered into a new partnership with ThreatConnect, the leading provider of security software and services including the ThreatConnect® Threat Intelligence Platform (TIP).
Digital Shadows
SEPTEMBER 4, 2015
In 2015 we are seeing new trends emerge with respect to Exploit Kits in the wild. These trends are particularly interesting in that they suggest that the frequency of 0-day exploits made available in these kits is growing while the time to integrate said 0-days from the time of discovery to inclusion in the kits is shrinking rapidly. The post Exploiting Is My Business.and Business Is Good first appeared on Digital Shadows.
Advertisement
The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.
Privacy and Cybersecurity Law
SEPTEMBER 2, 2015
Russia’s new Data Localisation Law went live yesterday on 1 September. Many companies with operations in Russia are scratching their […].
Privacy and Cybersecurity Law
SEPTEMBER 9, 2015
Last week, the Global Privacy Enforcement Network (GPEN) released the results from their third annual Privacy Sweep. Twenty-nine privacy enforcement […].
Let's personalize your content