Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2024

GDPR Compliance: The Critical Role of Data Protection Officers

The General Data Protection Regulation (GDPR) is a comprehensive data protection law covering the European Union (EU) and is widely regarded as one of the world’s strictest privacy regulations. The GDPR unifies data regulation within the EU and provides individuals control over their personal data. The GDPR includes information about Data Protection Officers (DPOs).

Aligning Your TPRM Program with India's E-Commerce Rules

India’s e-commerce industry has surged over the last seven years, increasing its estimated revenue from USD 15.53 Billion in 2017 to USD 63.17 Billion in 2023. This dramatic expansion has shepherded new opportunities for organizations in the e-commerce sector but has also exposed these organizations to increased cybersecurity risks and compliance regulations.

Keeper 101 - How to Set Biometric Login in Keeper on iOS

Biometric login, especially when paired with Keeper, is a time saving, convenient feature that allows you to login to Keeper with biometrics such as “Face ID”. To enable biometric login, navigate to the Settings screen in the Keeper app and toggle “Biometric Login”, “on”. Next time you want to log in to Keeper, simply tap the Face ID icon to initiate face recognition. Please note, Face ID must be configured in your device's settings before using it to login to Keeper.

Keeper 101 - How to Set Up and Use KeeperFill on iOS

KeeperFill is Keeper’s powerful, autofilling feature that works across all devices and instantly logs you in to websites and apps, saving you both time and effort. Keeper is fully integrated into the login experience of every website and app through the Passwords button that appears above your device's keyboard. To utilize this feature you need to first perform a few setup steps.

Keeper 101 - How to Share a Keeper Record on iOS

Keeper’s iOS mobile app makes it easy to securely share records with friends and family. To share a record with another Keeper user, select the record from your vault and tap Share, then Share with User. Enter the user's email address or select it from the dropdown, then use the toggle buttons to choose what permissions the user will receive such as: “Can Edit”, “Can Share” and "Make Owner". If you do not enable any permissions, the user will have “view only” access.

If Social Engineering Accounts for up to 90% of Attacks, Why Is It Ignored?

Social engineering and phishing are involved in 70% to 90% of all successful cybersecurity attacks. No other initial root hacking cause comes close. This is not a recent development. Social engineering has been the number one type of attack since the beginning of networked computers. Despite this long-time fact, most organizations do not spend 3% of their IT/IT Security budget to fight it.

Sophos: Over 75% of Cyber Incidents Target Small Businesses

New analysis of incident data shows threat actors are evolving their attack techniques to take advantage of budget and resource-strapped small businesses. We’ve seen industry data showing that cybercriminals have been slowly creeping downward from solely going after enterprises to targeting the SMB.

What is Attribute-Based Access Control or ABAC?

One of the biggest issues facing government and industry is how to securely share sensitive and classified information. While information sharing and collaboration have tremendous benefits for productivity and service outcomes, they do come with risks. A dynamic, data-centric approach is key to securing sensitive information and achieving compliance.

Advantages of Private LLMs - A Data Protection Perspective

In the busy domain of artificial intelligence (AI), the emergence of Private Language Model Models (LLMs) marks a pivotal development in addressing the escalating concerns surrounding data protection. As organizations harness the power of AI to glean insights and streamline operations, the need for safeguarding sensitive information has become more pronounced than ever.

From Delivery To Execution: An Evasive Azorult Campaign Smuggled Through Google Sites

Netskope Threat Labs has observed an evasive Azorult campaign in the wild that employs multiple defense evasion techniques from delivery through execution to fly under the defender’s radar as it steals sensitive data. Azorult is an information stealer first discovered in 2016 that steals sensitive information including user credentials, browser information, and crypto wallet data.

Prevent security drift with Nightfall SaaS Security Posture Management (SSPM)

In order to prevent worst-case data leak and data loss scenarios, security teams need to have both proactive and reactive measures in place. Let’s explore this further with an example. Imagine your sensitive data as valuables within a house. There are multiple ways to secure that house, including the following. To put this example into practice, security teams would need to: The first and last of these bullet points fall under the umbrella of SaaS Security Posture Management, or SSPM.

Bringing Secure, Streamlined, and Scalable Access Management to the Next Level with the Circles Team

Urvashi H.V., Technical Community Champion, JumpCloud talks to Thomas Dias, Senior Technology & Operations Professional, Gautham Shet - Cyber Security Integration Lead, and Ketan Karnick - Head of Enterprise Security from the Circles.co IT team about how they use JumpCloud to solve their security challenges. The team tells us about how JumpCloud has helped them tighten security, as well as speed up repeated processes via integrations and automation.