Comprehensive software reviews to make better IT decisions
Titus’ Timely Release of Illuminate 2020 Pushes Privacy Angle
In early March, Titus released Titus Illuminate 2020, which was the company’s answer to the question of analyzing data at rest. This latest version of Illuminate leverages machine learning and AI in an effort to manage data that contains potentially sensitive or high-risk personal information.
A key feature of Titus Illuminate is its ability to integrate with Titus’ Privacy Accelerator. This product was released in the fall of 2019 with the objective of helping organizations reduce risk exposure with respect to personal data, an area of heavy focus with the introduction of stringent privacy laws (GDPR, CCPA).
Enhanced data privacy functions of Illuminate’s most recent release include guidance on whether cloud or on-premises storage is a viable option for certain personal data types. The company’s introduction of Smart RegEx serves to streamline the identification of sensitive personal data’s location within the organization.
Though aimed at assisting organizations with compliance with incumbent privacy regulations and compliance efforts, Illuminate 2020 may serve a secondary function in light of the current global pandemic. Data privacy efforts in the wake of COVID-19 have been taking a backseat as organizations scramble to protect the health and safety of employees and turn focus away from the privacy of their personal data. Organizations may be unaware of a new subset of personal data that has been collected and stored and as such may increasingly need to lean on pre-existing software solutions, such as data classification suites, in order to assist with privacy management.
While business priorities have shifted in the short term, organizations should aim to achieve longevity and maintain a certain standard when it comes to the privacy of their employees’ or clients’ personal data. The solution? Leverage the increased functionality of pre-existing software solutions, in any and all ways possible.
Want to Know More?
By exploiting a five-year-old configuration error, a hacker was able to access Amazon’s S3 cloud storage buckets on which Twilio’s code was loaded. As a result, customers were able to unknowingly download the modified code for twenty-four hours.
Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti Partnership have already gone live as an integrated component of the VMDR solution.
IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.
RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation across CVEs and CWEs.
Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike. Couple this with the continued security issues around remote work during the pandemic, and security teams have their hands full.
Navigating the vendor risk management space, particularly in the current environment that consists of a mix of cloud, managed services, and critical supply chain, is key to ensuring that you don’t inadvertently introduce new risks through this dynamic channel.
On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their vulnerability management programs to industry averages Kenna Security has compiled over the years.
COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in the office to working from home has made it difficult for security measures to keep pace. Specifically, how are businesses meant to maintain the same secure networks when their employees are no longer working in the office? Outside of the security of the IT departments, IT and security have a tough time ensuring that patching and vulnerability management remain at the forefront of a business’s priorities.
From employee management through leadership and communication, increased cyber threats, logistics and operations to post-pandemic planning and risk mitigation, the threat landscape has experienced enormous change. These noticeable shifts force us to consider rethinking and retooling how we address risk.