Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Andy Green

Frequently Asked Questions (FAQ): GDPR and HR/Employee Data

As I wrote in another post, HR records are considered personal data and covered under the General Data Protection Regulation (GDPR). Since I keep on hearing from people who should...

Read More

Data Security and Privacy Lessons From Recent GDPR Fines

We’re more than a year into the General Data Protection Regulation (GDPR) era, and we now have a few enforcement actions under our belts as data points. Earlier in 2019,...

Read More

NYS SHIELD Act: Updates to PII, Data Security, and Breach Notification  

After the devastating Equifax incident, the New York State legislature introduced the Stop Hacks and Improve Electronic Data Security or SHIELD Act in order to update the  existing  breach rules....

Read More

Insights into User Entity Behavior Analytics (UEBA)

User Behavior Analytics or UBA was and still is the term for describing searching for patterns of usage that indicate unusual computing activities — regardless of whether it’s coming from...

Read More

We Know About Your Company’s Data: OSINT Lessons for C-Levels

 I’ve been on a mission the last few months to bring  basic knowledge about data security to the upper reaches of the organization. Our C-level readers and other executives, who...

Read More

The California Privacy Act (CCPA) Clones Are Coming: States Draft Copycat Laws

In 2018, the California Consumer Privacy Act (CCPA) was signed into law. Its goal is to extend consumer privacy protections to the internet. The CCPA was heavily influenced by the...

Read More

PowerShell for Pentesters: Scripts, Examples and Tips

In case you haven’t noticed, we’ve been championing PowerShell as a pentesting tool in more than a few blog posts. One big reason to learn PowerShell and use it to...

Read More

A Quick Dip into Event Query Language (EQL)

Did you ever have the urge to put together a few PowerShell scripts leveraging the Windows Management Interface (WMI) to create your own file security monitoring package? My advice: wait...

Read More

Windows BlueKeep Vulnerability: Deja Vu Again With RDP Security Weaknesses

It’s a familiar data security story: under-patched Windows software, hidden security vulnerabilities, and hackers who know how to exploit them. But if the patch involves Windows Remote Desk Protocol (RDP),...

Read More

Understanding Security Analytics Platforms

I’ve already written about the fundamentals of security analytics. To review: it’s the process of aggregating, correlating, and applying other more advanced techniques to raw event data in order to...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.