In 2023, the EU General Court overruled the European Data Protection Supervisor and ruled that pseudonymized data will not be classified as personal data under the of EU data protection law when transferred to a recipient who is unable to identify individuals. Businesses are now taking a closer look at their data anonymization processes, as well as the opportunities this new ruling may offer when transferring and accessing data across borders..
In our first post on using BAS in an operational technology (OT) environment, we provided an overview of a typical converged IT/OT network, the trends that were driving increased cyber risk for industrial asset owners, and a high-level discussion of how BAS can help provide better visibility and protection across the converged environment.
XDR (eXtended Detection and Response) is a leading integrated cybersecurity approach, which improves threat detection and response through integrating multiple data sources and cybersecurity tools and unifying multiple security products into a single operating system. XDR technology is growing increasingly popular. And it’s an opportunity for managed service providers (MSPs) to scale and grow their business.
Every five to ten years, major technology shifts change the way that vulnerability assessment and the related IT risk mitigation processes are approached or implemented. What has remained constant is the formula we use to measure risk and thus prioritize and triage vulnerabilities. Risk = (Likelihood of event) * (Impact of consequences) It’s an approach that intuitively makes sense, but there have been two challenges with how this formula has been applied.
A digital footprint refers to the collection of traceable data left behind by a person’s unique online activities. Everything from your social media posts to your browsing history to your voter registration leave a trail of data that can be used by businesses and people for a variety of purposes – good or bad.
Numerous risks are inherent in the technologies that all organizations use. These risks have especially become apparent with recent ransomware attacks, which have crippled major infrastructure such as the Colonial Pipeline in the Eastern United States1. This discussion will focus on how GRC, or governance, risk, and compliance can help organizations face and manage the risks that they face.