Analysis: Government Policies on Huawei's 5G Role

Data Breach Today

The latest edition of the ISMG Security Report discusses the ramifications of the U.K's s decision to allow limited use of Huawei's equipment in 5G networks. Plus: Updates on Wawa's stolen card offered for sale and nascent security threats from social networks and drones

Government Spending on Cybersecurity: An Analysis

Data Breach Today

Around the world, many CIOs at various levels of governments expect an increase in cybersecurity spending in 2019, according to new research from Gartner. Alia Mendonsa, co-author of the report, analyzes the results of a global survey

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Analysis: Using Twitter for Espionage

Data Breach Today

The latest edition of the ISMG Security Report offers an analysis of how Twitter allegedly was used to spy on critics of the Saudi Arabian government. Also featured: A preview of the new NIST Privacy Framework and an update on business email compromise attacks

Analysis: The Latest Ransomware Targets

Data Breach Today

The latest edition of the ISMG Security Report discusses the recent ransomware attacks on the city of New Orleans as well as other units of local government and schools. Also featured: discussion on security issues for IoT and legacy medical devices

Analysis: Strong vs. Weak Encryption

Data Breach Today

The latest edition of the ISMG Security Report analyzes the debate over whether the government should require technology firms to use weak encryption for messaging applications. Plus, D-Link's proposed settlement with the FTC and a CISO's update on medical device security

Automating Data Governance

erwin

Automating data governance is key to addressing the exponentially growing volume and variety of data. Earlier this year, erwin conducted a research project in partnership with Dataversity, the 2020 State of Data Governance and Automation. We also looked at data preparation, governance and intelligence to see where organizations might be getting stuck and spending lots of time. At erwin, our goal is to automate the entire data governance journey, whether top down or bottom up.

Data Governance 2.0: The CIO’s Guide to Collaborative Data Governance

erwin

In the data-driven era, CIO’s need a solid understanding of data governance 2.0 … Data governance (DG) is no longer about just compliance or relegated to the confines of IT. Today, data governance needs to be a ubiquitous part of your organization’s culture.

CISA publishes malware analysis reports on samples targeting Pulse Secure devices

Security Affairs

Cybersecurity and Infrastructure Security Agency (CISA) released five malware analysis reports (MARs) related to samples found on compromised Pulse Secure devices. CISA published five malware analysis reports (MARs) related to samples found on compromised Pulse Secure devices. The U.S.

Business Process Can Make or Break Data Governance

erwin

Data governance isn’t a one-off project with a defined endpoint. Data governance, today, comes back to the ability to understand critical enterprise data within a business context, track its physical existence and lineage, and maximize its value while ensuring quality and security. Historically, little attention has focused on what can literally make or break any data governance initiative — turning it from a launchpad for competitive advantage to a recipe for disaster.

The What & Why of Data Governance

erwin

Modern data governance is a strategic, ongoing and collaborative practice that enables organizations to discover and track their data, understand what it means within a business context, and maximize its security, quality and value. The What: Data Governance Defined.

Google Threat Analysis Group took down ten influence operations in Q2 2020

Security Affairs

Google published its second Threat Analysis Group (TAG) report which reveals the company has taken down ten coordinated operations in Q2 2020. The report is based on the investigations conducted by the Threat Analysis Group (TAG) and third-parties’ contributions (i.e.

Doing Cloud Migration and Data Governance Right the First Time

erwin

And as you make this transition, you need to understand what data you have, know where it is located, and govern it along the way. By using automated and repeatable capabilities, you can quickly and safely migrate data to the cloud and govern it along the way.

Iranian Threat Actors: Preliminary Analysis

Security Affairs

Nowadays Iran’s Cybersecurity capabilities are under the microscope, experts warn about a possible infiltration of the Iranian government. The group’s victims are mainly in the telecommunications, government (IT services), and oil sectors.”

After SolarWinds, worldwide governments can trust no one

OpenText Information Management

The effects of the SolarWinds attack will be felt for a long time, and will ripple far beyond the government alone. To recap, at the … The post After SolarWinds, worldwide governments can trust no one appeared first on OpenText Blogs.

How Data Governance Protects Sensitive Data

erwin

Data Security Starts with Data Governance. Lack of a solid data governance foundation increases the risk of data-security incidents. Without data governance, organizations lack the ability to connect the dots across data governance, security and privacy – and to act accordingly.

Research firm Omdia releases insightful analysis of the content services sector

OpenText Information Management

The analysts at Omdia (formerly Ovum) have released their latest research and analysis of the content services industry: Omdia Universe: Selecting a Content Services Platform Solution, 2021.

What’s the Current State of Data Governance and Automation?

erwin

I’m excited to share the results of our new study with Dataversity that examines how data governance attitudes and practices continue to evolve. Defining Data Governance: What Is Data Governance? . 1 reason to implement data governance.

Ransomware Increasingly Hits State and Local Governments

Data Breach Today

Yet These Victims Are Less Likely to Pay Any Ransom, Recorded Future Finds Over the past two years, the number of ransomware attacks against state and local government agencies has increased. A new analysis by threat intelligence firm Recorded Future asks: Why the discrepancy But at the same time, these victims are paying less to attackers.

Sandboxing: Advanced Malware Analysis in 2021

eSecurity Planet

To fill this gap and aid in the analysis, detection, and testing of malware, sandboxing is widely used to give organizations the setting, isolation, and security tools needed to preserve the integrity of the host network. Most include common security tools like: Threat analysis.

Large phishing campaign targets EMEA and APAC governments

Security Affairs

Security researchers uncovered a large phishing campaign targeting multiple government departments in APAC and EMEA countries. . Researchers from cybersecurity firm Cyjax uncovered a large phishing campaign targeting multiple government departments in APAC and EMEA countries. .

Are Data Governance Bottlenecks Holding You Back?

erwin

Better decision-making has now topped compliance as the primary driver of data governance. Data Governance Bottlenecks. Clearly, there’s a massive need for a data governance framework to keep these obstacles from stymying enterprise innovation.

Metadata Management, Data Governance and Automation

erwin

erwin released its State of Data Governance Report in February 2018, just a few months before the General Data Protection Regulation (GDPR) took effect. This research showed that the majority of responding organizations weren’t actually prepared for GDPR, nor did they have the understanding, executive support and budget for data governance – although they recognized the importance of it. Download Free GDPR Guide | Step By Step Guide to Data Governance for GDPR?.

How to Create an Effective Information Governance Strategy

Gimmal

Information Governance in 2021. With newly dispersed workforces comes new challenges for information governance programs. information governance migration Records Management file analysis

Pegasus Project – how governments use Pegasus spyware against journalists

Security Affairs

Pegasus is a surveillance malware developed by the Israeli surveillance NSO Group that could infect both iPhones and Android devices, it is sold exclusively to the governments and law enforcement agencies.

Nation-State Attacks Drop in Latest Google Analysis

Threatpost

Government Hacks Vulnerabilities Web Security 2019 analysis apt google Nation-state attacks Phishing the report zero daysPhishing and zero-days continue to be a core part of the APT arsenal.

Digital Transformation in Municipal Government: The Hidden Force Powering Smart Cities

erwin

When you think of real-time, data-driven experiences and modern applications to accomplish tasks faster and easier, your local town or city government probably doesn’t come to mind. But municipal government is starting to embrace digital transformation and therefore data governance. Municipal government has never been an area in which to look for tech innovation. Digital Transformation in Municipal Government: Being “Smart” About It.

The Value of Data Governance and How to Quantify It

erwin

erwin recently hosted the second in its six-part webinar series on the practice of data governance and how to proactively deal with its complexities. The business drivers and motivation should be the starting point for any data governance initiative. Govern PII “at rest”.

Government Shutdown Hampers Cybersecurity

Adam Levin

Government has impacted federal cybersecurity according to several reports. 80% of the National Protection and Programs Directorate , which oversees the Office of Cyber and Infrastructure Analysis and the Office of Cybersecurity and Communications. Faced with little respect, low and uncertain pay, arbitrary disruption, and an inability to accomplish the mission they love, people leave government, and in the future, never work for it in the first place.”.

Documenting and Managing Governance, Risk and Compliance with Business Process

erwin

Managing an organization’s governance, risk and compliance (GRC) via its enterprise and business architectures means managing them against business processes (BP). Governance, risk and compliance are treated as isolated bubbles. The C-Level Demands GRC Real-Time Impact Analysis.

The Building Blocks of Information Governance

Information Governance Perspectives

Information Governance (IG) is quite the buzzword these days, yet too many organizations still find themselves struggling with implementing a practical roadmap for success. Information Governance Information Management Information Technology Legal Records Management Data Governance eDiscovery File Analysis GRC Legal Holds Policy Management Records Retention

Feds Publish Analysis of New Malware Tools Tied to APT ‘Hidden Cobra’

Threatpost

DHS posts analysis, documentation for new cyber-attack tools on US-CERT on three-year anniversary of WannaCry. Government Hacks Copperhedge Federal Bureau of Investigation Hidden Cobra Pebbledash Taintedscribe U.S.

ISO 27001: Gap analysis vs. risk assessment

IT Governance

What is a gap analysis? An ISO 27001 gap analysis gives organisations an overview of what they need to do to meet the Standard’s requirements. A gap analysis shows organisations which of ISO 27001’s controls they have implemented, and in some cases provides additional information about their progress in meeting the Standard’s requirements. Download now >> The post ISO 27001: Gap analysis vs. risk assessment appeared first on IT Governance Blog.

Risk 50

Reimagining Information Governance with Blockchain

Weissman's World

A Discussion Paper Authors: Alan Pelz-Sharpe (Deep Analysis) & Steve Weissman (Holly Group) Statement of Purpose This discussion paper provides an overview of how future information governance (IG) platforms may be envisaged and built utilizing blockchain – perhaps the key point being that all the technologies necessary to do so are already available. The post Reimagining Information Governance with Blockchain appeared first on Holly Group.

The Building Blocks of Information Governance

Information Governance Perspectives

Information Governance (IG) is quite the buzzword these days, yet too many organizations still find themselves struggling with implementing a practical roadmap for success. Information Governance Information Management Information Technology Legal Records Management Data Governance eDiscovery File Analysis GRC Legal Holds Policy Management Records Retention

Creating a data governance framework

Collibra

Creating a data governance framework is crucial to becoming a data-driven enterprise because data governance brings meaning to an organization’s data. However, many organizations struggle to build a data governance program because the practice can seem amorphous.

Five Benefits of an Automation Framework for Data Governance

erwin

Organizations are responsible for governing more data than ever before, making a strong automation framework a necessity. They need their data mappings to fall under governance and audit controls, with instant access to dynamic impact analysis and lineage. In data governance terms, an automation framework refers to a metadata-driven universal code generator that works hand in hand with enterprise data mapping for: Pre-ETL enterprise data mapping. Governing metadata.

What is adaptive data governance?

Collibra

Data governance is a linchpin for data programs; it is the practice of managing and organizing data and processes to enable collaboration and compliant access to data. But what is this term, “adaptive data governance,” that has gained more traction in recent years?

Data Governance Makes Data Security Less Scary

erwin

The Regulatory Rationale for Integrating Data Management & Data Governance. Now, as Cybersecurity Awareness Month comes to a close – and ghosts and goblins roam the streets – we thought it a good time to resurrect some guidance on how data governance can make data security less scary. It’s easier to protect sensitive data when you know what it is, where it’s stored and how it needs to be governed. Happy Halloween! Do you know where your data is? What data you have?

“Collection #1” Data Breach Analysis – Part 2

Security Affairs

The cyber security expert Marco Ramilli continues its analysis of the data leak known as Collection #1, he shared some interesting views on data The cyber security expert Marco Ramilli continues its analysis of the data leak known as Collection #1, he shared some interesting views on data. In this post, I’d like to give my second personal overview without getting into details such as: private domains, government domains, domains belonging to municipalities and so on.

Data Governance Stock Check: Using Data Governance to Take Stock of Your Data Assets

erwin

This sort of data governance “stock check” is important but can be arduous without the right approach and technology. That’s where data governance comes in …. Therefore, organizations need the ability to manage any data from anywhere, what we call our “any-squared” (Any 2 ) approach to data governance. Following are two examples that illustrate the data governance stock check, including the Any 2 approach in action, based on real consulting engagements.