Read up on the latest cybersecurity regulations like GDPR, NYDFS, and a close look at the SWIFT authentication practices.

Understanding Today’s Data Regulations (Part 2)

In our first post on data regulations, we laid out the facts on some of the most important organizations influencing the world of IT’s industry standards. To help understand the ins and outs of these groups matter, and how they affect digital authentication, we put together the who, what, and where of each regulation. In this second post in the series, [...]

Understanding Today’s Data Regulations Pt.1

Data regulation. Some are restrictions aim to protect users and some are a framework for better organizations security. The modern phenomenon is set as the legal system is catching up with the ever-expanding connected world we live at, if you agree with regulatory oversight or not the sweeping effects on the world of digital information is enormous.How companies handle private data, [...]

California Weak Password Ban

In new legislation, California decided to ban easy to guess, default passwords. The bill entitled SB-327, or Information Privacy: Connected Devices demands that electronics manufacturers in California equip their products with "reasonable" security features. What does this mean practically for users? All those generic passwords such as “Admin” and “Password” will be prohibited. Starting 2020 when the law comes into effect, [...]

Practice What you Preach – IT’s Achilles Heel

Thus goes the old adage. Of all the fields we would expect the ‘experts’ to follow their own rules, data security would probably be it. With a growing list of high profile hacks caused by poor security practices, infosec professionals are well aware what’s at risk from being careless in this area. Unfortunately, the data suggests that even the pros are [...]

By |September 17th, 2018|Categories: Articles|Tags: , |

How to Secure the Health Industry

Data breaches at healthcare organizations are some of the most critical security incidents. They put very damaging information at the disposal of cybercriminals and malicious actors. A slate of regulations in different jurisdictions classify health data as highly sensitive and penalize organizations that mishandle the information or fail to protect it against hackers. An example is the Health Insurance Portability and [...]

How GDPR Will Change the Face of Digital Authentication

The highly anticipated General Data Protection Regulations of the European Union (GDPR) will come into effect in a few short months. The laws of GDPR represent a total paradigm shift in IT regulation. While other national and international legislation has focused on laying down specific rules for interacting with digital data, GDPR goes one step further by changing the relationship between [...]

Equifax data breach is latest reminder of security lessons

Published in The Hill on September 8, 2017 by Raz Rafaeli The Equifax data breach this week has quickly become recognized as the quite possibly the worst breach in history. Although other hacks dwarf the Equifax incident in sheer size and volume, the Equifax breach is particularly severe due to the breathtaking amount of highly sensitive data it has left open to criminals. The [...]

The Equifax Breach: How it Went Down

Weeks after the cover was blown about the Equifax breach, the incident has become established as one of the biggest and most detrimental attacks on online consumers ever. The actual volume of data exposed aside, what makes the Equifax hack so bad is not only the highly sensitive nature of the information, but that recovery and mitigation of the damage is [...]

A Close Look at SWIFT’s Wire Transfer Authentication Practices

Published on International Banker by June 20, 2017, by Raz Rafaeli  In February 2016, hackers heisted $81 million from the Bangladesh Bank, cleverly stealing the money via the transfer system of the Society for Worldwide Interbank Financial Telecommunication, commonly referred to as SWIFT. Via a series of subterfuges and with the right timing (scheduling the thefts for a weekend, when staff [...]

Applying Military Protocol to Cybersecurity Best Practices

Posted on info security magazine, April 7, 2017 by Raz Rafaeli Relying on a single measure of security – whether it's to launch nuclear missiles or to protect IT infrastructure – is dangerous, which is why the military long ago instituted the ‘two person rule’, to prevent accidental or malicious launch of nuclear weapons The world came this close to nuclear annihilation [...]

NY state cybersecurity regs go into effect today, industry responds

Posted on CS Magazin, March 01, 2017 by Greg Masters, Managing Editor "While we have historically seen slow adoption of two-factor authentication – mostly due to poor UX design – this regulation comes at a time when next-generation authentication platforms have the right combination of frictionless user experience and none of the security resiliency problems we saw in the past."  Raz Rafaeli, CEO of Secret Double Octopus Responding to growing threats from [...]

Howdy,
Search exact
Search sentence
Buy Premium Version to add more powerful tools to this place. https://wpclever.net/downloads/wp-admin-smart-search