September, 2015

article thumbnail

Schrems: Decision Due Next Week

Privacy and Cybersecurity Law

So much for the dust settling… The CJEU has confirmed that it will be delivering its final judgement on the […].

40
article thumbnail

Healthcare Data is the Next Vulnerable Target for Hackers

NopSec

Another day, another hack. And not just any old hacking incident, but one involving yet another healthcare provider, only demonstrating how vulnerable the industry is. In the case of the recent Excellus breach, initial investigation reports are putting hackers in their network for over a year and a half. The breach was uncovered as part of a routine security assessment, but I have one question.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How the Internet of Things (IoT) is Expanding Your Digital Shadow

Digital Shadows

The Internet of Things (IoT) is a development that is the direct result of objects, technology, people that have been. The post How the Internet of Things (IoT) is Expanding Your Digital Shadow first appeared on Digital Shadows.

IoT 40
article thumbnail

Schrems v. Irish Data Protection Commissioner: some further thoughts

Privacy and Cybersecurity Law

As the dust begins to settle after the headline-grabbing Advocate General opinion in the Schrems v. Irish Data Protection Commissioner […].

40
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

EU-US Data Flows: Bridging the Cultural Divide?

Privacy and Cybersecurity Law

After four years of negotiations, the EU and US have reached an agreement that will protect EU citizens’ personal data […].

40
article thumbnail

The Intelligence Cycle – What Is It Good For?

Digital Shadows

It seems that the concept of ‘intelligence’ is a problem. The definition isn’t agreed, and the industry is peppered with. The post The Intelligence Cycle – What Is It Good For? first appeared on Digital Shadows.

40

More Trending

article thumbnail

Digital Shadows Invited To 10 Downing Street

Digital Shadows

Interest in London’s burgeoning tech industry is growing so rapidly that even David Cameron has taken notice; at Pitch10, an event at 10 Downing Street to be held on Thursday 31st July, ten of the most promising digital companies in Britain will pitch their businesses to an audience that includes Cameron himself. The post Digital Shadows Invited To 10 Downing Street first appeared on Digital Shadows.

40
article thumbnail

Working In Multilingual Sources

Digital Shadows

This post will be about some of the challenges you are likely to face trying to handle data in different languages and how to deal with them. Most of our code is in Java so the examples here will all be written in Java. The post Working In Multilingual Sources first appeared on Digital Shadows.

40
article thumbnail

The Intelligence Trinity

Digital Shadows

For several years now there has been considerable hype and hubris around the term ‘intelligence’ within the cyber security industry. It feels as if the term has been diluted as its usage has extended to include vendors dealing in a range of issues from bad IPs and Indicators of Compromise, to tip-offs that hacktivist groups are targeting particular sectors and the activities of APT groups, and everything in-between.

40
article thumbnail

Source Evaluation

Digital Shadows

To organisations, threat intelligence is about understanding the threat landscape – the various actors and campaigns which conduct cyber attacks – so that when they are specifically targeted it can be detected, mitigation put in place, and the risk to their business reduced. Robust source evaluation minimises the chance of crying wolf, or warning of the wrong threat entirely.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Digital Shadows joins roundtable at 10 Downing Street

Digital Shadows

Alastair Paterson, CEO of Digital Shadows, recently visited 10 Downing Street to participate in a roundtable on cyber security. The session brought together leaders from industry, academia and government and sought to address the challenges surrounding cyber security policy. The post Digital Shadows joins roundtable at 10 Downing Street first appeared on Digital Shadows.

article thumbnail

Remote working at Digital Shadows

Digital Shadows

Here at Digital Shadows we’ve worked hard to assemble the most dedicated and talented development team possible and that has resulted in our team being concentrated here in London, but including members both further afield in the UK and internationally. This means that we’ve had to learn how to work with a distributed team and this post will cover our experiences and some of the utilities we’re making use of to work as efficiently as possible.

40
article thumbnail

Analytical Tradecraft at Digital Shadows

Digital Shadows

This week my colleague and I attended the SANS Cyber Threat Intelligence conference in Washington DC. It was great to hear more from analysts and CTI users from across the community, as well as mingle with the plethora of vendors who were present. This blog explores some of the themes which arose from discussions on analytical tradecraft. The post Analytical Tradecraft at Digital Shadows first appeared on Digital Shadows.

article thumbnail

Digital Shadows Works Alongside Bank of England To Develop New Testing Framework To Help Guard UK Financial Sector Against Cyber Attack

Digital Shadows

CBEST aims to improve the understanding of the types of cyber-attack that could undermine financial stability in the UK, and. The post Digital Shadows Works Alongside Bank of England To Develop New Testing Framework To Help Guard UK Financial Sector Against Cyber Attack first appeared on Digital Shadows.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The Dangers of Groupthink

Digital Shadows

Over the next few blog posts we’ll be looking at various types of cognitive bias and suggest ways of dealing with them. The post The Dangers of Groupthink first appeared on Digital Shadows.

40
article thumbnail

The Dangers of Groupthink: Part 2

Digital Shadows

This post moves on to the second cause of groupthink and tries to understand how organizational structural faults may result in manifestations of groupthink. The post The Dangers of Groupthink: Part 2 first appeared on Digital Shadows.

40
article thumbnail

The Adult Friend Finder Breach: A Recap

Digital Shadows

Last week, news quickly spread about a security breach that impacted the casual dating website Adult Friend Finder. Will Gragido. Head of Threat Intelligence for Digital Shadows in the USA, shares his findings. The post The Adult Friend Finder Breach: A Recap first appeared on Digital Shadows.

40
article thumbnail

Saudi Arabia MOFA Breach

Digital Shadows

A look at the recent MOFA breach. The post Saudi Arabia MOFA Breach first appeared on Digital Shadows.

40
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Emerging Markets & Services: Ransomware-as-a-Service

Digital Shadows

A look at emerging markets and services, specifically at ransomeware-as-a-service. The post Emerging Markets & Services: Ransomware-as-a-Service first appeared on Digital Shadows.

article thumbnail

Kaspersky Labs Discloses Duqu 2.0 Attack

Digital Shadows

Introduction Today social media channels the world over are a buzz with news of Kaspersky Labs disclosure of the discovery. The post Kaspersky Labs Discloses Duqu 2.0 Attack first appeared on Digital Shadows.

Media 40
article thumbnail

Digital Shadows Integrates With Maltego Through Partnership With Malformity Labs

Digital Shadows

The need for organizations to focus on their risk exposure is growing daily, and their ability to establish a clear. The post Digital Shadows Integrates With Maltego Through Partnership With Malformity Labs first appeared on Digital Shadows.

Risk 40
article thumbnail

What’s In a Name? The Mystery Surrounding the Identity of the Actors Responsible for the Saudi Arabia Breaches

Digital Shadows

Introduction Recently we wrote about the initial breach of the Ministry of Foreign Affairs of the Kingdom of Saudi Arabia. The post What’s In a Name? The Mystery Surrounding the Identity of the Actors Responsible for the Saudi Arabia Breaches first appeared on Digital Shadows.

40
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Online Extortion – Old Ways, New Tricks

Digital Shadows

Extortion is nothing new for organised crime. For centuries, gangs have been operating protection rackets and kidnappings to successfully extract ransom money from their victims. And as with many things in modern life, these old techniques have been successfully brought over to the cyber realm. The post Online Extortion - Old Ways, New Tricks first appeared on Digital Shadows.

article thumbnail

Exciting Times, Exciting Team at Digital Shadows

Digital Shadows

Yesterday we announced that Stuart McClure, founder and CEO of Cylance, Inc, is joining our Board of Directors. The entire company is excited about his joining us, and James Chappell and I are especially looking forward to working with him as we further grow the company. While we are excited, Stuart’s joining our board is not the only great team news we have at Digital Shadows.

40
article thumbnail

Digital Shadows and ThreatConnect Partner to Help Customers Improve Security Defenses

Digital Shadows

One of the foundational values of Digital Shadows is the appreciation and value we put on our collaboration with customers and our coordination with our strategic business partners. It is because of this value that we’re delighted to announce today that we’ve entered into a new partnership with ThreatConnect, the leading provider of security software and services including the ThreatConnect® Threat Intelligence Platform (TIP).

article thumbnail

Exploiting Is My Business…and Business Is Good

Digital Shadows

In 2015 we are seeing new trends emerge with respect to Exploit Kits in the wild. These trends are particularly interesting in that they suggest that the frequency of 0-day exploits made available in these kits is growing while the time to integrate said 0-days from the time of discovery to inclusion in the kits is shrinking rapidly. The post Exploiting Is My Business.and Business Is Good first appeared on Digital Shadows.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Russia’s new data law

Privacy and Cybersecurity Law

Russia’s new Data Localisation Law went live yesterday on 1 September. Many companies with operations in Russia are scratching their […].

40
article thumbnail

Global Privacy Sweep Finds Privacy Issues in Children’s Apps

Privacy and Cybersecurity Law

Last week, the Global Privacy Enforcement Network (GPEN) released the results from their third annual Privacy Sweep. Twenty-nine privacy enforcement […].