5G Revolution: Telcos Becoming the New App Store for Industrial Apps

5G Revolution: Telcos Becoming the New App Store for Industrial Apps

The 5G Revolution 5G technology is knocking on our doors and is said to be around the corner. Mobile service providers have upped their game recently and are holding talks, events and discussions to formulate a plan for the launch of this futuristic network. Not
Aruna Cisco

66% Say They’d Switch Vendors in Order to Get an Intelligent Online Meeting Solution

People are getting frustrated with online and video meetings. In fact, according to a recent survey, 85% say they are challenged with these types of poor experiences and 74% say they’re not too happy about it. Audio problems, difficulty connecting, mismatched devices, not knowing if

Manage Data Breaches

2017 saw over 2 dozen major security breaches in 2017.  While the public may have grown numb to the number and constant stream of data breaches reported, outrage has been building around the delays in accompanying disclosures of those breaches and questionable actions that have occurred in between when a data breach has occurred and when it’s been reported.  Those questionable actions have included company executives selling stock and paying hackers a ransom.  Sometimes data breaches have also been reported by independent bloggers before the businesses officially reported them as was the case with both Target and Nieman Marcus.  And, despite the delayed reporting of many data breaches, businesses have still needed to update the public on a bigger than initially reported scope of breach.

Manage Data Breaches

A breach investigation can typically take weeks or even months before most businesses feel they know enough to disclose. In the past, businesses have typically concerned themselves with fixing the security vulnerability or issue from which the breach arose and then worrying about reporting.  Previously, regulation in Europe and in the United States with its patchwork of state laws gave companies leeway on times to report, with only a handful of states requiring notice within 45 days, and even then, with some exceptions.

Shifts in Regulatory Landscape around Data Breaches

A measure was recently introduced in the United States Congress that could impose new criminal penalties on anyone convicted of “intentionally and willfully” concealing a data breach, including fines and up to five years imprisonment, or both. The much-hyped General Data Protection Regulation (GDPR) that was enforced on May 25 specifies that the supervisory authority must be notified of a breach within 72 hours of its discovery and failure to do so could carry hefty consequences of up to up to 4% of annual global turnover or €20 Million.

Empowering Security Teams to Become Collaborative Across the Organization

As the regulatory landscape becomes more complex, security teams will have to step up as will company executives. It will require businesses to have much more than a plan in place and to be able to assemble what has occurred with immediacy if they are to disclose quickly and without incurring other areas of liability.  Businesses need to have an automated way to obtain a “single source of truth” that draws feeds from security tools, social media and other company collaboration tools for a complete view of breach-related activity.

The picture that is emerging for security teams is that data breaches need to be elevated to a business level immediately and in a way that limits potential complications surrounding the breach.  Without tooling for collaborative and secured communications businesses will face enormous legal and regulatory challenges not to mention reputation and business continuity issues as they struggle to fulfill disclosure obligations.

By Evelyn de Souza

Evelyn de Souza

Evelyn de Souza focuses on developing industry blueprints that accelerate secure cloud adoption for business as well as everyday living. She currently serves as the Chair of the newly formed Cloud Security Alliance (CSA) data governance and privacy working group. Evelyn was named to CloudNOW's Top 10 Women in Cloud Computing for 2014 and SVBJ’s 100 Women of Influence for 2015. Evelyn is the co-creator of Cloud Data Protection Cert, the industry's first blueprint for making data protection "business-consumable” and is currently working on a data protection heatmap that attempts to streamline the data privacy landscape.

TOP ARCHIVES

3 Steps to Better Security in the API Economy

3 Steps to Better Security in the API Economy

API Security Whenever you’re working online with the Internet, security is also a top concern. Any mistakes or lapse of ...
5 Important VR Industry Trends Starting To Take Shape

5 Important VR Industry Trends Starting To Take Shape

5 Important VR Industry Trends In recent years, virtual reality (VR) finally made a move to the mainstream after largely ...
Business Intelligence Implementation

10 Tips For Successful Business Intelligence Implementation

Business Intelligence Implementation The cost of Business Intelligence (BI) software goes far beyond the purchase price. Time spent researching, implementing, ...
Driving Transformation? It is possible to predict the future.

Driving Transformation? It is possible to predict the future.

Driving Transformation Previously, I wrote about the criticality of defining the Vision for your transformation - what is your real objective, how ...
How to Improve the Backup Success Rate of Data Centers?

How to Improve the Backup Success Rate of Data Centers?

Improve Backup Success Rate According to industry analysts, a significant number of backup jobs (from 5 to 25%) are failing ...
Load Testing Tools

Load Testing Tools

LOAD TESTING TOOLS SMARTBEAR LoadComplete is software that simulates users and creates realistic load tests. No coding is required. Users can generate traffic via the cloud, virtual machines, and also use on premise computers for load testing. Location-based profiles are ...
10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

Prevent Data Leaks In The Cloud More companies are turning to the cloud for storage. In fact, over 60 percent of organizations store sensitive information in the cloud, according to a recent Intel security survey. As a result, the risk ...