🛡 Cybersecurity & Privacy 🛡 - News
26K subscribers
89.2K links
🗞 The finest daily news on cybersecurity and privacy.

🔔 Daily releases.

💻 Is your online life secure?

📩 lalilolalo.dev@gmail.com
Download Telegram
<b>&#128371; TrustArc Engages with Singapore PDPC and Leading Privacy Think-Tank CIPL &#128371;</b>

<code>Media</code><code>TrustArc proudly participated at events co-sponsored by the Singapore Personal Data Protection Commission (PDPC) and the global privacy and security think-tank, Centre for Information Policy Leadership (CIPL), on November 15-16 in Singapore.  </code><code>On topics ranging from certifications and the Asia-Pacific Economic Cooperation (APEC), to regulatory sandboxes, to artificial intelligence, TrustArc was honored to be invited to engage in terrific conversations and workshops with global thought-leaders in the public and private sectors.</code><code>Darren Abernethy, TrustArc Senior Counsel, spoke on a panel entitled “The Role of Certifications as Accountability and Compliance Tools.”  This session focused on how certifications can serve accountability and compliance functions for organizations by facilitating achievement of a comprehensive privacy and data protection program; providing third party verification; offering oversight and dispute resolution; and, in some cases, supplying government backstop enforcement. There was also consensus that industry-recognized certifications are highly useful in the B2B vendor selection process for risk mitigation; act as a symbol of trust to the C-suite, consumers and partners; and are increasingly relevant in the mergers and acquisitions context.</code><code>Before the 200-plus audience members, special attention was given to the APEC Cross Border Privacy Rules (CBPR) and Privacy Recognition for Processors (PRP) Systems, as these certifications meet the above criteria and have taken on new significance for multi-national corporations and small and medium-sized enterprises (SME) alike, with the certification systems’ recent and ongoing adoption in additional APEC member economies (including four of the top six U.S. trading partners), the extension to data processors through the PRP System, and the certification of SMEs.  TRUSTe serves as the Accountability Agent for CBPR and PRP certifications in the U.S.</code><code>Media</code><code>Darren moderated a second panel entitled “The Role of Certifications in Data Transfers and Global Interoperability.” This session focused on interoperability–which in addition to the possibility of mutual recognition, can also encompass scalably leveraging work done towards one certification or compliance framework in service of another–and began with an overview of different global data transfer mechanisms. The latter included discussion of EU binding corporate rules (BCRs), adequacy decisions, the up-to-the-minute status of GDPR certifications, codes of conduct, and the APEC CBPR/PRP Systems.</code><code>Discussion points on the panel included the heightened prevalence and significance of the APEC Privacy Framework in free trade agreements; the use of the BCR-CBPR “Referential” to interoperably achieve each transfer mechanism; how governments and regulators can incentivize certification participation; and examples of how regional transfer frameworks are expanding. A common view was that the APEC Systems have a foundational advantage over many others in that they offer an already-established infrastructure for enforceable, accountability-based mechanisms for intra- and inter-company cross-border transfers.  </code><code>TrustArc also participated in a working session held in the Singapore offices of a leading technology company, wherein the diverse group of industry participants discussed the key features of the concept of a “regulatory sandbox.”  This notion may be understood as a supervised safe space for piloting and testing innovative products, services, business models or delivery mechanisms in the real market, using the personal data of real individuals. The participants evaluated some of the hypothetical pros, cons and challenges of such an approach.</code><code>Lastly, TrustArc took part in an all-day interactive working session…
&#128371; Benchmarking GDPR Privacy Operations – New IAPP / TrustArc research report reveals how companies are managing compliance &#128371;

<code>Media</code><code>In partnership with the IAPP, TrustArc recently completed a Survey on Privacy Program Metrics, which looked to establish some baseline metrics by which privacy programs around the world can benchmark themselves. The survey contained 27 questions, including demographic questions, and a total of 496 people took the survey.</code><code>Media</code><code>Some sample questions we set out to answer with the survey were: How many business processes are organizations mapping? How many reports are they creating in order to comply with Article 30 of the EU’s General Data Protection Regulation? How many privacy or data protection impact assessments are necessary? How many incidents rise to the level of breach reporting? Are people being overwhelmed by subject access requests?</code><code>The largest group of respondents works in the U.S. (39 percent), followed by the European Union, excluding the U.K. (32 percent), the U.K. (12 percent), and Canada (8 percent). Respondents were evenly distributed throughout the range of company sizes, with organizations that employ 25,001 people or more representing 25 percent of survey respondents, followed next by organizations that employ 1-250 people (23 percent).</code><code>In this 4 part blog post series we will share highlights on the following key takeaways from the report:</code><code>Data inventory is becoming a standard privacy management practice</code><code>DPIAs are the most common type of privacy assessments</code><code>Individual rights / data subject access rights (DSAR) requests impacting most organizations</code><code>Data breach notification requirements impacting larger companies</code><code>Media</code><code>Key Takeaway #1: Data inventories are becoming a standard privacy management practice crucial to privacy compliance</code><code>One of the most important steps to design and build a data privacy program is to create an inventory of all of the business processes within a company. If a company does not know the type of data they collect and how it’s shared, processed and stored; or the data inflows and outflows, it is difficult t o know if they meet the requirements of the privacy frameworks that impact their business. It is also difficult to know where data resides in order to be able to efficiently respond to data subject access requests.</code><code>As privacy regulations become broader in scope, requiring companies to demonstrate how they reduce and manage risk, the importance of building and maintaining a data inventory is increasing. The EU General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) are two examples of regulations which rely heavily on a comprehensive data inventory to support risk management, compliance reporting and responding to individual rights and data subject access rights requests.</code><code>Media</code><code>Our survey results showed that 83% of respondents have created a data inventory of their business processing activities, which is a significant increase from the 43% of respondents who reported engaging in routine inventory and mapping exercises two years ago. We also found that 20% of respondents are using specialized data inventory and mapping software, which is up from 10% two years ago.</code><code>TrustArc Data Flow Manager</code><code>Media</code><code>Data Flow Manager, part of the TrustArc Privacy Platform, is a dedicated privacy data mapping system which can help build and manage a data inventory, data flow maps, and compliance reporting such as GDPR Article 30.
</code><code>Data Flow Manager is based on the business process approach which TrustArc recommends based on extensive experience developing and building GDPR and CCPA compliance programs for companies of all sizes around the world.
</code><code>Data Flow Manager provides a three-step…
🕴 Symantec Intros USB Scanning Tool for ICS Operators 🕴

ICSP Neural is designed to address USB-borne malware threats security.

📖 Read

via "Dark Reading: ".
🔐 Only 29% of EU organizations are GDPR compliant 🔐

Despite the May 2018 deadline, most companies have not implemented all necessary GDPR changes, according to an IT Governance report.

📖 Read

via "Security on TechRepublic".
Chrome 71 stomps on abusive advertising

Google shipped version 71 of its Chrome browser yesterday, alongside fixes for 43 security issues. The latest Chrome version also introduces several new security measures.

📖 Read

via "Naked Security".
Google’s private browsing doesn’t keep your searches anonymous

DuckDuckGo says you can go right ahead and log out of Google, then enter private browsing mode, but you'll still see tailored search results.

📖 Read

via "Naked Security".
Patch now (if you can!): Latest Android update fixes clutch of RCE flaws

Android’s December security bulletin arrived this week with another decent crop of vulnerabilities to add to the patching list for devices running version 7.0 Nougat to version 9.0 Pie, including Pixel users.

📖 Read

via "Naked Security".
Facebook staff’s private emails published in press

The cache of seized Facebook documents show how Facebook whitelists certain companies so they can keep lapping up user data.

📖 Read

via "Naked Security".
Facebook Defends Data Policies On Heels of Incriminating Internal Docs

The company allegedly tried to hide away new policy changes that would collect Android app users' call and message logs.

📖 Read

via "Threatpost | The first stop for security news".
🔐 Android Security Bulletin December 2018: What you need to know 🔐

Another month where Android finds itself with a mixture of Critical and High vulnerabilities. Jack Wallen offers highlights.

📖 Read

via "Security on TechRepublic".
Marriott, Kubernetes and PewDiePie [PODCAST]

Here's the latest Naked Security Podcast - enjoy!

📖 Read

via "Naked Security".
🕴 Evidence in Starwood/Marriott Breach May Point to China 🕴

Attackers used methods, tools previously used by known Chinese hackers.

📖 Read

via "Dark Reading: ".
🕴 7 Common Breach Disclosure Mistakes 🕴

How you report a data breach can have a big impact on its fallout.

📖 Read

via "Dark Reading: ".
🕴 Apple Issues 13 Security Fixes 🕴

Software updates for Mac and iOS bring patches to Safari, iCloud, iTunes on Windows, and tvOS.

📖 Read

via "Dark Reading: ".
🕴 Apple Issues 13 Security Fixes 🕴

Software updates for Mac and iOS bring patches to Safari, iCloud, iTunes on Windows, and tvOS.

📖 Read

via "Dark Reading: ".
Infected WordPress Sites Are Attacking Other WordPress Sites

Researchers identified a widespread campaign of brute force attacks against WordPress websites.

📖 Read

via "Threatpost | The first stop for security news".
🕴 55% of Companies Don't Offer Mandatory Security Awareness Training 🕴

Even those that provide employee training do so sparingly, a new study finds.

📖 Read

via "Dark Reading: ".
&#128371; Workday and Envestnet | Yodlee Demonstrating Best Privacy Practices for Processors through APEC PRP Certification &#128371;

<code>Media</code><code>Global companies are increasingly more concerned with ensuring the privacy and security of the information they hold. Not only is complying with international privacy regulations and frameworks important to avoid fines, but it is also critical for building trust with customers, mitigating risks, and protecting the company’s reputation. One way that companies can demonstrate compliance is by adhering to a recognized international privacy framework, such as the Asia-Pacific Economic Cooperation (APEC) framework as demonstrated by the  APEC Privacy Recognition for Processors (PRP) certification.</code><code>Like the APEC Cross Border Privacy Rules (CBPR) system (which applies to data controllers), the APEC PRP system is a voluntary, enforceable program designed to ensure the continued free flow of personal information while maintaining meaningful protection for the privacy and security of personal information for data processors. The U.S. became the first formal participant in the PRP system with  the Federal Trade Commission (FTC) serving as the first enforcement authority in 2018 with more expected to follow.</code><code>A significant portion of the world’s economy is based in the region represented by the Asia-Pacific Economic Cooperation (APEC). Companies acting as data processors in the Asia Pacific region can comply with the  PRP program requirements in order to process personal data efficiently, securely, and safely while respecting data privacy. In addition, the PRP system enables businesses that operate as data processors to demonstrate their commitment to global privacy standards.</code><code>Two examples of companies who have achieved this certification are Workday and Envestnet | Yodlee.</code><code>Workday and Envestnet | Yodlee have worked with TrustArc to demonstrate compliance with the APEC PRP certification standards.</code><code>Barbara Cosgrove, Chief Privacy Officer at Workday said: “Maintaining the privacy and security of customers’ data in compliance with privacy laws is of critical importance to our business. By partnering with TrustArc to achieve the APEC CBPR and APEC PRP certifications, we’ve been able to further demonstrate our commitment to privacy and qualifications to process data in compliance with the APEC privacy framework.”</code><code>“Envestnet | Yodlee wanted a way to demonstrate the rigor of our privacy programs to our clients, prospects and the market. Security-focused certifications, like the APEC PRP, provide objective reliable evidence that Envestnet | Yodlee adheres to applicable privacy standards,” said Brian Costello, Chief Information Security Officer at Envestnet | Yodlee. “TrustArc is a trusted advisor for our entire global privacy program – we leverage their expertise for general certification as well as the APEC certifications.”</code><code>TrustArc Solution</code><code>To prepare companies for an APEC PRP (and/or CBPR) Certification, TrustArc works in partnership with clients following a three-phase process leveraging a combination of in-house privacy experts and proven assessment methodology powered by the TrustArc Privacy Platform that accelerates and assists in documenting compliance.</code><code>Phase I – A review of the company’s privacy practices against the APEC requirements and creation of a detailed privacy findings report.  </code><code>Phase II – A collaborative review of the findings, implementation of remediation recommendations, and documentation of action item resolution.</code><code>Phase III – Certification activation of the TRUSTe APEC PRP (and/or PRP) Privacy Seal and Dispute Resolution Services.  </code><code>For more information about TrustArc privacy tools and solutions, click here.</code><code>The post Workday and Envestnet | Yodlee Demonstrating Best Privacy Practices for Processors through APEC PRP…
🕴 Boosting SOC IQ Levels with Knowledge Transfer 🕴

Despite shortages of skills and staff, these six best practices can improve analysts' performance in a security operations center.

📖 Read

via "Dark Reading: ".
🕴 Bringing Compliance into the SecDevOps Process 🕴

Application security should be guided by its responsibility to maintain the confidentiality, integrity, and availability of systems and data. But often, compliance clouds the picture.

📖 Read

via "Dark Reading: ".