Titaniam

Industry

[Link] Hacker posts exploits for over 49,000 vulnerable Fortinet VPNs

Hacker posts exploits for over 49000 vulnerable Fortinet VPNs This article about how information about 49,000 vulnerable Fortinet VPNs have been posted online by hackers, has been making the rounds today. Given that the vulnerability in question has been known since 2018, most have used this as way to illustrate the importance of patching. Something …

[Link] Hacker posts exploits for over 49,000 vulnerable Fortinet VPNs Read More »

[Link] Neelima Rustagi launches ‘Zero to Exit’ podcast

Neelima Rustagi launches zero to exit podcast Congratulations to our Board of Advisor’s member Neelima Rustagi and her co-conspirator Ankur Shah, for their exciting new project Zerotoexit which features legendary entrepreneurs and product leaders and showcases key learnings from their journeys. We wish you all the best! https://www.buzzsprout.com/1410772

[Link] Privacy For Big Data: Monster Or Myth?

Privacy for big data monster or myth Titaniam advisor Caroline Wong recently published an article in Forbs highlighting the need for Titaniam’s solution for data privacy/data protection in enterprise search and big data analytics systems. Thank you Caroline! Interested in learning more about how Titaniam can help? Get started today with a demo https://www.forbes.com/sites/forbestechcouncil/2020/11/02/privacy-for-big-data-monster-or-myth/

[Link] Ethical framework for consumer-generated data in health…

Ethical Framework for Consumer generated data in Health Care Security leaders in healthcare, learn how to meet MITRE guidelines for handling of Consumer-Generated Healthcare Data (CGD) with Titaniam Protect and avoid long expensive projects that do not cover data privacy for healthcare analytics. Interested in learning more about how Titaniam can help? Get started today with a …

[Link] Ethical framework for consumer-generated data in health… Read More »

[Link] Why privacy is essential to equitable recovery

Why privacy is essential to equitable recovery In the following article Julie Brill, Chief Privacy Officer for Microsoft, calls on the US to implement stronger data privacy protection. The winds are changing. Organizations who are entrusted with customer data should be preparing for greater measures and stricter enforcement. Data should be secure and private by default. …

[Link] Why privacy is essential to equitable recovery Read More »

[Link] COVID-19 crisis shifts cybersecurity priorities and budgets

Covid 19 crisis shifts Cybersecurity priorities and budgets It is that time of year when we are told we have been allocated only 50% of the budget we requested. Now what? McKinsey & Company outlines below how cybersecurity budgets have been refocused and valuable projects been put on hold. Sensitive data protection and privacy is as fundamental …

[Link] COVID-19 crisis shifts cybersecurity priorities and budgets Read More »

[Link] Children are being ‘datafied’ with companies and organasations

Children are being datafied with companies and Organasations Right on the heels of the GDPR comes the AADCOP. Effective September 2020 with a year to fall into compliance, the Age Appropriate Design Code of Practice (AADCOP) from the ICO, is an extension of the Data Protection Act 2018 that affects providers of information society services …

[Link] Children are being ‘datafied’ with companies and organasations Read More »

[Link] Seven Best Practices for Keeping Sensitive Data Out of Logs

Seven Best Practices for Keeping Sensitive Data Out of Logs Adding another best practice to Joe Kroback’s seven best practices for keeping sensitive data out of logs: 8. Obfuscate sensitive data-in-use at all times so you never transact or manipulate it in clear text. No clear text sensitive data-in-use means no clear text sensitive data …

[Link] Seven Best Practices for Keeping Sensitive Data Out of Logs Read More »