Read up on the latest cybersecurity regulations like GDPR, NYDFS, and a close look at the SWIFT authentication practices.

Establishing strong authentication for PSD2

September 14, 2019 will mark a milestone date for the online payment industry. That’s when the Strong Customer Authentication (SCA) regulation will come into effect. As part of the Revised Payment Service Directive (PSD2), SCA imposes stricter security rules on payment service providers to protect customers and merchants against the mounting threat of online fraud. Whether you’re running a business that [...]

Understanding Today’s Data Regulations (Part 2)

In our first post on data regulations, we laid out the facts on some of the most important organizations influencing the world of IT’s industry standards. To help understand the ins and outs of these groups matter, and how they affect digital authentication, we put together the who, what, and where of each regulation. In this second post in the series, [...]

Understanding Today’s Data Regulations Pt.1

Data regulation. Some are restrictions aim to protect users and some are a framework for better organizations security. The modern phenomenon is set as the legal system is catching up with the ever-expanding connected world we live at, if you agree with regulatory oversight or not the sweeping effects on the world of digital information is enormous.How companies handle private data, [...]

California Weak Password Ban

In new legislation, California decided to ban easy to guess, default passwords. The bill entitled SB-327, or Information Privacy: Connected Devices demands that electronics manufacturers in California equip their products with "reasonable" security features. What does this mean practically for users? All those generic passwords such as “Admin” and “Password” will be prohibited. Starting 2020 when the law comes into effect, [...]

Practice What you Preach – IT’s Achilles Heel

Thus goes the old adage. Of all the fields we would expect the ‘experts’ to follow their own rules, data security would probably be it. With a growing list of high profile hacks caused by poor security practices, infosec professionals are well aware what’s at risk from being careless in this area. Unfortunately, the data suggests that even the pros are [...]

By |September 17th, 2018|Categories: Articles|Tags: , |

How to Secure the Health Industry

Data breaches at healthcare organizations are some of the most critical security incidents. They put very damaging information at the disposal of cybercriminals and malicious actors. A slate of regulations in different jurisdictions classify health data as highly sensitive and penalize organizations that mishandle the information or fail to protect it against hackers. An example is the Health Insurance Portability and [...]

How GDPR Will Change the Face of Digital Authentication

The highly anticipated General Data Protection Regulations of the European Union (GDPR) will come into effect in a few short months. The laws of GDPR represent a total paradigm shift in IT regulation. While other national and international legislation has focused on laying down specific rules for interacting with digital data, GDPR goes one step further by changing the relationship between [...]

Equifax data breach is latest reminder of security lessons

Published in The Hill on September 8, 2017 by Raz Rafaeli The Equifax data breach this week has quickly become recognized as the quite possibly the worst breach in history. Although other hacks dwarf the Equifax incident in sheer size and volume, the Equifax breach is particularly severe due to the breathtaking amount of highly sensitive data it has left open to criminals. The [...]

The Equifax Breach: How it Went Down

Weeks after the cover was blown about the Equifax breach, the incident has become established as one of the biggest and most detrimental attacks on online consumers ever. The actual volume of data exposed aside, what makes the Equifax hack so bad is not only the highly sensitive nature of the information, but that recovery and mitigation of the damage is [...]

A Close Look at SWIFT’s Wire Transfer Authentication Practices

Published on International Banker by June 20, 2017, by Raz Rafaeli  In February 2016, hackers heisted $81 million from the Bangladesh Bank, cleverly stealing the money via the transfer system of the Society for Worldwide Interbank Financial Telecommunication, commonly referred to as SWIFT. Via a series of subterfuges and with the right timing (scheduling the thefts for a weekend, when staff [...]

Applying Military Protocol to Cybersecurity Best Practices

Posted on info security magazine, April 7, 2017 by Raz Rafaeli Relying on a single measure of security – whether it's to launch nuclear missiles or to protect IT infrastructure – is dangerous, which is why the military long ago instituted the ‘two person rule’, to prevent accidental or malicious launch of nuclear weapons The world came this close to nuclear annihilation [...]

Howdy,
Search exact
Search sentence
Buy Premium Version to add more powerful tools to this place. https://wpclever.net/downloads/wp-admin-smart-search