Wednesday, October 4, 2023

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Hot Topics
  • Automated Incident Response with Rapid7 and Smart SOAR
  • Gartner® Hype Cycle™ for Endpoint Security, 2023
  • A Guide to IAM Compliance: Set Your Organization Up for Success
  • Two Campaigns Drop Malicious Packages into NPM
  • Comic Agilé - Mikkel Noe-Nygaard, Luxshan Ratnarav - #261 - Midwives
Data Security Governance, Risk & Compliance Security Bloggers Network 

Home » Cybersecurity » Data Security » A Simple Data Breach Guide (Interpreting GDPR)

SBN

A Simple Data Breach Guide (Interpreting GDPR)

by Tripwire Guest Authors on May 15, 2019

Perhaps it’s too melodramatic to claim that the debate over how to define a data breach “rages on” because we haven’t seen bodies flying out of windows yet, but it is a serious question with genuine financial ramifications now that the General Data Protection Regulation (GDPR) and its accompanying fines for mishandling data have arrived to save (and sometimes confuse) the day.

AWS Builder Community Hub

The media and splashy headlines don’t help. To the average media outlet, if it involves data and sounds like news, it’s a breach. So before you form a suitably vile opinion of the heritage of the Regulation’s creators, let’s calm down and take a dispassionate look at the GDPR thought process as it went about placing firm rules on a nebulous topic.

Is it a breach, or isn’t it?

If life were so simple as to abide by cut and dried definitions, this article wouldn’t be necessary. But it’s not simple, and it is necessary. While most cybersecurity organizations would likely agree that a data breach involves some act of removing data from or viewing it on a system without permission, there is no all-knowing Data Breach Police Force to impose a definition.

The closest we can come is the aforementioned GDPR because this organization has vested in itself the power to levy substantial fines on those who run afoul of the data protection dictates. Since the powers-that-be behind this new regulation currently swing a hefty stick, let’s analyze how they define a personal data breach.

First, the big picture view:

“A breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored, or otherwise processed.”

GDPR goes on to clarify that a data breach is a type of security incident but that not (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/data-breach-interpreting-gdpr/

May 15, 2019May 16, 2019 Tripwire Guest Authors databreach, GDPR, IT Security and Data Protection
  • ← Windows RDP Remote Code Execution Vulnerability (BlueKeep) – How to Detect and Patch
  • The Latest Techniques Hackers are Using to Compromise Office 365 →

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Wed 11

ASPM: Leveling the AppSec Playing Field

October 11 @ 1:00 pm - 2:00 pm
Mon 16

Shadow Access: Where IAM Meets Cloud Security

October 16 @ 3:00 pm - 4:00 pm
Tue 17

Securing Cloud-Native Applications Across the Software Development Life Cycle

October 17 @ 11:00 am - 12:00 pm
Wed 18

Live Workshop on ‘SCA 2.0’: Using Runtime Analysis to Find High-Risk SCA Vulnerabilities

October 18 @ 12:00 pm - 1:30 pm
Thu 19

Managing Security Posture and Entitlements in the Cloud

October 19 @ 1:00 pm - 2:00 pm
Tue 24

When Seconds Matter: Real-Time Cloud Security With AWS and Sysdig

October 24 @ 11:00 am - 12:00 pm
Tue 24

Reporting From the Pipeline: The State of Software Security in DevOps

October 24 @ 1:00 pm - 2:00 pm
Thu 26

How to Shift Left the Right Way

October 26 @ 3:00 pm - 4:00 pm
Mon 30

Zero-Trust

October 30 @ 1:00 pm - 2:00 pm
Tue 31

AppSec 101: Complete Application Security Across the SDLC

October 31 @ 11:00 am - 12:00 pm

More Webinars

Subscribe to our Newsletters

TSTV Podcast

Most Read on the Boulevard

Broken ARM: Mali Malware Pwns Phones
Don’t Say ‘Skynet’ — NSA’s AI Security Center is New Hub for Agency Efforts
Using ML to Accelerate Incident Management
Boards are Finally Taking Cybersecurity Seriously
How to Talk So Your CISO Will Listen
DEF CON 31 – Joseph Gabay’s ‘Warshopping- Phreaking Smart Shopping Cart Wheels Through RF Sniffing’
2023 OWASP Top-10 Series: API10:2023 Unsafe Consumption of APIs
Google Chrome Heap Buffer Overflow Vulnerability (CVE-2023-5217) Notification
Avoid libwebp Electron Woes On macOS With positron
The CVE-2023-5217 Deja Vu – Another Actively Exploited Chrome Vulnerability Affecting a WebM Project Library (libvpx)

Download Free eBook

Managing the AppSec Toolstack

Industry Spotlight

Two Campaigns Drop Malicious Packages into NPM
Cybersecurity Data Security DevOps Featured Industry Spotlight Malware Network Security News Security Boulevard (Original) Spotlight Threat Intelligence 

Two Campaigns Drop Malicious Packages into NPM

October 4, 2023 Jeffrey Burt | 4 hours ago 0
AWS’ MadPot Honeypot Operation Corrals Threat Actors
Cloud Security Cybersecurity Data Security Featured Incident Response Industry Spotlight Malware Network Security News Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches 

AWS’ MadPot Honeypot Operation Corrals Threat Actors

October 3, 2023 Jeffrey Burt | Yesterday 0
Broken ARM: Mali Malware Pwns Phones
Analytics & Intelligence API Security Application Security AppSec Cybersecurity Data Privacy Data Security Deep Fake and Other Social Engineering Tactics Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Incident Response Industry Spotlight IOT IoT & ICS Security Malware Mobile Security Most Read This Week News Popular Post Securing the Edge Security at the Edge Security Awareness Security Boulevard (Original) Social Engineering Software Supply Chain Security Spotlight Threat Intelligence Threats & Breaches Vulnerabilities Zero-Trust 

Broken ARM: Mali Malware Pwns Phones

October 3, 2023 Richi Jennings | Yesterday 0

Top Stories

Nutanix Simplifies Data Recovery to Thwart Ransomware Attacks
Analytics & Intelligence Cybersecurity Data Security Featured Incident Response Malware News Security Boulevard (Original) Social - Facebook Spotlight Threat Intelligence 

Nutanix Simplifies Data Recovery to Thwart Ransomware Attacks

October 4, 2023 Michael Vizard | 8 hours ago 0
Akamai Sees Surge of Cyberattacks Aimed at Financial Services
Analytics & Intelligence Application Security Cybersecurity Data Privacy Data Security Featured Governance, Risk & Compliance Incident Response Malware News Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Akamai Sees Surge of Cyberattacks Aimed at Financial Services

October 3, 2023 Michael Vizard | Yesterday 0
Threat Groups Accelerating the Use of Dual Ransomware Attacks
Analytics & Intelligence Cybersecurity Data Security Featured Identity & Access Malware Network Security News Security Boulevard (Original) Spotlight Threats & Breaches 

Threat Groups Accelerating the Use of Dual Ransomware Attacks

October 2, 2023 Jeffrey Burt | 2 days ago 0

Security Humor

Randall Munroe’s XKCD ‘A Halloween Carol’

Randall Munroe’s XKCD ‘A Halloween Carol’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2023 Techstrong Group Inc. All rights reserved.