Este breve documento busca plantear reflexiones alrededor de la realidad del ransomware con el fin de brindar espacios para pensar sobre cómo abordar este reto, qué margen de acción se puede lograr y, sobremanera, cómo encontrar algunos patrones que adviertan sobre el avance de este tipo de amenazas en la organización.
Nota Completa
shareShare This
Related Stories
A view from Brussels: Behavioral advertising is an unstoppable current
Rarely has a European Data Protection Board plenary generated so much aggravation and heated opinions as what we are seeing this week.
The EDPB issued its opinion on the pay-or-consent models being deployed by large online platforms as a legal construct to support behavioral advertising. This follo...
Ransomware group sells medical, financial records from data breach
Ransomware group RansomHub claimed it is selling U.S. citizen's medical and financial records following a cyberattack on Change Healthcare, Wired reports. Emsisoft Threat Analyst Brett Callow said it is likely an attempt to collect additional ransom payments from the health care companies involved i...
Brazil's ANPD opens public consult on high-risk data
Brazil's data protection authority, the Autoridade Nacional de Proteção de Dados, is soliciting public feedback on what personal data should be considered high risk as part of a study on the topic. Public input closes 16 May.Full story...
Semiconductor manufacturer experiences data breach
Semiconductor manufacturer Nexperia informed the Netherlands' data protection authority, the Autoriteit Persoonsgegevens, of a data breach, Techerati reports. Nexperia did not confirm data loss during the breach due to an investigation into the attack but said it implemented "extensive mitigation" e...
Podcast: James Dempsey and John Carlin talk top trends in cybersecurity
In tandem with privacy, cybersecurity law is rapidly evolving to meet the needs of an increasingly digitized and complex economy. To help practitioners keep up with this ever-changing space, the IAPP recently published the second edition of "Cybersecurity Law Fundamentals." IAPP Editorial Director J...
Comments
If you want to comment on this post, you need to login.