Use Redis? There's a Good Chance It's Been Co-Opted

Use Redis? There’s a Good Chance It’s Been Co-Opted

Open source databases may have a problem. For the second time in just three years, a popular open-source database has become infected, on a massive scale, with cryptocurrency-related malware. In late 2016, the vector of the infection was MongoDB, and the source of the infection was ransomware ... Read More
What Does “Software Defined Perimeter” Mean to YOU?

What Does “Software Defined Perimeter” Mean to YOU?

|
In a recent article from CSO Online, analyst Jon Oltsik wrote that many security professionals are unclear about the true meaning of software defined perimeter because of its confusing nomenclature ... Read More
Beat the Odds: Why It’s Not Too Late To Start GDPR Compliance

Beat the Odds: Why It’s Not Too Late To Start GDPR Compliance

After several years in the making and a tidal wave of press coverage, the long-awaited EU General Data Protection Regulation (GDPR) finally came into force on May 25. And we’re all still here. But even if you still haven’t got your compliance house in order, it’s not too late ... Read More
Don’t Be GDPR Complacent, It’s Time to Get Compliant

Don’t Be GDPR Complacent, It’s Time to Get Compliant

Last week the biggest change to Europe’s privacy laws in almost a generation came into force. Depending on your organization it very well might require a major new approach to data protection — even if you’re located outside the EU ... Read More
Data Protection Officer - Dos & Don'ts for GDPR Challenges

Data Protection Officer – Dos & Don’ts for GDPR Challenges

| | GDPR
At the time of this writing, the GDPR is about two weeks away. That’s a very short time when it comes to preparing for a new compliance regime, and we hope that most of you reading this have completed your preparations already. If not… well, there’s still time to prepare ... Read More
Law Firm Data is Catnip for Hackers

Law Firm Data is Catnip for Hackers

Dig into a law firm, and you’ll find secrets. Sometimes these secrets are mundane, like who’s getting divorced, or who’s getting cut out of the will. Sometimes, however, these secrets can shake nations and economies ... Read More
Global Data Protection Laws: Japan

Global Data Protection Laws: Japan

| | data protection
Over the last few months, we’ve talked extensively about the GDPR – but the GDPR isn’t the only data protection regime on the planet. In Japan, legislators have just enacted changes to the nation’s flagship data privacy regime. Let’s look at how these changes will affect those hoping to do ... Read More
Preparing for Industrial Cyberattacks: Does your Industry Have a Plan?

Preparing for Industrial Cyberattacks: Does your Industry Have a Plan?

Imagine having to put rubber boots on to fix the damage from a cyberattack. This act was a reality for researchers at a simulated coal plant in Sweden, where a paid penetration tester proved the vulnerability of the plant’s physical systems by tampering with its cooling system ... Read More
2018 Will Be an Interesting Year for Information Security – Here’s How Safe-T Can Help

2018 Will Be an Interesting Year for Information Security – Here’s How Safe-T Can Help

As of this writing, we’re just a month into 2018, and it’s already looking like an interesting year in the realm of information security. Here, interesting means fraught. The first few days of the year ushered in devastating news in the form of the Specter and Meltdown vulnerabilities ... Read More