Tag Archive for: protections

Biometrics Experts and New Study Highlight How Behavioral Biometrics Supports Strict Regulation and Offers Better Data Privacy Protections



News and research before you hear about it on CNBC and others. Claim your 1-week free trial to StreetInsider Premium here.


New report from Biometrics expert, Goode Intelligence draws insights from BehavioSec and law firm Osborne Clarke to analyze how behavioral biometrics technology can be successfully implemented in compliance with GDPR, CCPA, and similar regulations

SAN FRANCISCO–(BUSINESS WIRE)–
BehavioSec, the industry pioneer and technology leader for behavioral biometrics and continuous authentication, today announced new findings that organizations and consumers can feel more comfortable with wider use of behavioral biometrics to safeguard their online digital experiences and identities.

Following a year of digital transformation on a societal level, the demand for better online user experience and a stronger level of digital identity protection has become essential. With a year when the world has seen a combination of personal data theft with new rulings and proposed legislation, like the EU Schrems II in July 2020 and the US National Biometrics Information Privacy Act in August [US Senators Merkley, D-OR and Sanders, I-VT], the need for expert guidance has never been higher. BehavioSec shares this research and a company milestone to highlight how behavioral biometrics can be adopted transparently with clear benefits, and in compliant fashion with comprehensive data protection laws. These include measures like the European General Data Protection Regulation (GDPR), the European Commission’s PSD2/SCA and its Open Banking mandate, the US California Consumer Privacy Act (CCPA) and similar, anticipated requirements of regulations proposed in other regions.

To validate the safe use of behavioral biometrics at a time when headlines are full of allegations about technologies like facial recognition and “deep fake” simulations being abused, BehavioSec sponsored the report, “2021 Global Data Privacy Regulation of Physical & Behavioral Biometrics” by respected industry research firm Goode Intelligence. In the report, Chief Analyst Alan Goode dives into the relevance of current and proposed global privacy and data protection legislation on the successful and…

Source…

Bad password practices. Data scraping and data dumps. Sidestepping privacy protections. No honor among thieves.


At a glance.

  • Password users behaving badly.
  • Implications of the Facebook data dump.
  • Sidestepping Apple privacy policies.
  • Crooks mistreating other crooks.
  • Comment on the LinkedIn data scraping incident.

Passwords: out of sight, out of mind. (And out of control.)

There’s a battle raging between two conflicting forces: the need for secure passwords, and the frailty of human memory. The LastPass Blog explores the results of a recent survey they conducted on two thousand Americans and their password habits. While 70% feel they have too many passwords to remember, on average they use the same password over six sites. And with the surge in remote work meaning most individuals need to access various accounts on multiple devices, 65% experience anxiety when they realize they’re using a device that doesn’t have the password they need. SiliconANGLE notes that, according to the Workplace Password Malpractice Report, 62% of US employees write their passwords down on a piece of paper. TechRadar adds that while a whopping 81% store that piece of paper right next to the device the password is meant to protect, and 67% admit they don’t even know where that paper is. Nearly half store their passwords in an unprotected document in the cloud, and troublingly, nearly two-thirds have shared their password with someone via text or email. 

What does the Facebook data leak mean for Facebook users?

Now that the Facebook data leak is front-page news, the big question has become, what can users do if they fear they’re among the half-billion individuals exposed? Forbes explores the difficulty of trying to protect oneself in this type of situation. If it were just passwords that were exposed, changing login info would be an easy fix. But these hackers leaked data like names, birthdates, and addresses — things that are difficult to change on a whim — and all for free. 

CyberNews shares the views of several industry experts. “Putting it out for free also provides some cover should anyone try to trace the stolen data back to its source. Yet another explanation could be that a competing criminal element or other entity put the data out there to demonetize it and take value away from the criminals,” said…

Source…

Nutanix Adds Additional Ransomware Protections


Nutanix has added additional ransomware protections to its cloud platform to help enterprises prevent, detect and recover from ransomware attacks across multiple cloud environments, according to a statement from the company.

These protections, available now to partners and customers, are built in to the Nutanix stack and include new threat monitoring and detection, as well as more granular data replication and access controls, according to the statement.

Nutanix Adds Additional Ransomware Protections

The Nutanix cloud platform, via the Flow Security Central feature of Nutanix Flow, now offers anomaly detection based on machine learning (ML) and IP reputation services, according to the company. Flow Security Central helps identify known attack vectors, including potential ransomware, at the network level before it can reach the application and data layers. Specifically, Flow Security Central now monitors networks for anomalies, malicious behavior and common network attacks. Flow Security Central also monitors endpoints to identify traffic from suspicious locations, according to the statement.

The Nutanix cloud platform now also includes native ransomware detection for file storage services within Nutanix Files. File analytics now detects abnormal and suspicious access patterns and identifies known ransomware signatures to block data access in real-time, the company said. In addition, File analytics also identifies misconfigurations and allows for immutable snapshots capabilities, according to the statement.

New features within the Nutanix Objects storage solution also protect application data, according to the statement. Objects includes more granular permissions to access object data for primary and secondary storage and offers the ability to configure write once, read many (WORM) policies for individual files and objects to guard against unauthorized deletion or encryption of data, according to the statement. Additionally, Objects’ locking features meet the non-rewritable and non-erasable storage requirements for electronic records as specified under the relevant SEC, FINRA, and CFTC regulations, according to the…

Source…

Cybereason and Intel Drive New Ransomware Protections


Dubai, UAE – January 12, 2021 – Cybereason has announced a partnership to adopt new Intel Hardware Shield protections for Ransomware available on the 11th Gen Intel Core vPro mobile platforms. Cybereason’s multi-layered protection, in collaboration with Intel Threat Detection Technology, will enable full-stack visibility to uncover ransomware attacks.

The solution represents the first instance where PC hardware plays a direct role in ransomware cyber defense to better protect enterprise endpoints from costly attacks, and underscores both companies’ commitment to empowering defenders by reversing the adversary advantage.

Ransomware continues to evade traditional anti-malware defenses, highlighting the need for a new approach to protecting the enterprise from costly attacks, system downtime, and reputational damage. Cybereason’s superior prevention, detection and response capabilities combined with Intel Hardware Shield protects enterprise customers from ransomware while improving overall security performance.

Lior Div, CEO & Co-Founder, Cybereason

“This collaboration with Intel to add CPU based threat detection bolsters our long history and industry-leading capabilities in detecting and eradicating ransomware. The combination of best-of-class hardware, software, and security know-how provides defenders with full-stack visibility critical to ending the era of double extortion that is currently costing organisations hundreds of millions each year”, said Lior Div, CEO and Co-Founder, Cybereason.

“Ransomware was a top security threat in 2020, software alone is not enough to protect against ongoing threats. Our new 11th Gen Core vPro mobile platform provides the industry’s first silicon enabled threat detection capability, delivering the much needed hardware based protection against these types of attacks. Together with Cybereason’s multi-layered protection, businesses will have full-stack visibility from CPU telemetry to help prevent ransomware from evading traditional signature-based defences”, said Stephanie Hallford, Client Computing Group Vice President and General Manager of Business Client Platforms at Intel.

Cybereason expects to…

Source…