article thumbnail

BEST PRACTICES: Rising complexities of provisioning identities has pushed ‘IGA’ to the fore

The Last Watchdog

Its customer base is comprised of eight of the top 15 banks, four of the top six healthcare insurance and managed care providers, nine of the top 15 property and casualty insurance providers, five of the top 13 pharmaceutical companies, and 11 of the largest 15 federal agencies. Users re-defined. Most often, a user is a human being.

article thumbnail

China’s First Data Protection Measures Lifting Its Veils

HL Chronicle of Data Protection

The draft Data Security Measures appear to mainly target the data processing activities of “network operators,” which under these draft measures has the same definition as is used in the Cyber Security Law , namely, including the owner or administrator of a network or a network service provider.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Iranian Peach Sandstorm group behind recent password spray attacks

Security Affairs

The cyber espionage activity attacks are aimed at organizations in the satellite, defense, and pharmaceutical sectors. Peach Sandstorm is an Iranian nation-state threat actor who has recently pursued organizations in the satellite, defense, and pharmaceutical sectors around the globe.”

Passwords 112
article thumbnail

Article 29 Working Party Releases Opinion on EU-U.S. Privacy Shield

Hunton Privacy

Other concerns and requests for clarification relate to the processing of HR and pharmaceutical data and how the Privacy Shield Principles are to be applied to data processors (Agents). National Security Guarantees of the Privacy Shield. with definitions agreed upon by the EU and the U.S., authorities.

Privacy 49
article thumbnail

The Week in Cyber Security and Data Privacy: 4 – 10 March 2024

IT Governance

Only 3 definitely haven’t had data breached. Other news ISO/IEC 27006:2024 published ISO (the International Organization for Standardization) and the IEC (International electrotechnical Commission) have published a new standard in the ISO 27000 information security series. Organisation(s) Sector Location Data breached?

article thumbnail

GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

The Last Watchdog

Regardless of how familiar you are with Information Security, you’ve probably come across the term ‘malware’ countless times. From accessing your business-critical resources and sensitive information to halting business operations and services, a malware infection can quickly become an organization’s worst nightmare come true.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences.