Connect with us

Cyber Security

Organisations Have Begun Establishing Lines of Defense for Data Security

Published

on

Ahmed Sousa, the Systems Engineering Director (EMEA) at Poly, speaks about data security and compliance policies companies need to follow in the region

How has the need for data security and compliance changed over the past year?
Data security has become even more critical to organizations and government entities for more than just moral and legal reasons. Data falling into the hands of hackers and immoral people could spell a lot of trouble for the entities and society as a whole. It can also cause damage to the reputation of these organizations besides having financial and logistical repercussions.

For most companies during the quarantine, work environments changed significantly. Workers were sent home, services moved to cloud providers and the security perimeter looked different.  Companies and security organizations have had to quickly adapt and implement new (and sometimes creative!) ways to monitor activity to identify and thwart threats – oftentimes with little to no new financial resources or tools.   
 
What are the best-practice standards and frameworks that can help companies achieve and maintain data security and compliance?
Globally, ISO/IEC 27001 is the most widely accepted international standard for information security best practices and provides assurance that the best-practice information security processes have been established and implemented.

Every organization should focus on 3 core elements that function as a security framework – Confidentiality, Integrity, and Availability. Some of the best practices include data auditing, real-time alerts, risk assessments and clean up of stale data.
 
Are there any regional data compliance regulations and frameworks, which companies that handle large amounts of public data need to follow?
In Europe, GDPR compliance is the framework that organizations adhere to. In the region, there are no such specific laws but the onus is on each organization to ensure that they are being safe and ethical. Public data is information that can be freely used, reused, and redistributed by anyone with no existing local, national, or international legal restrictions on access or usage. The main consideration for processing public data is ensuring veracity.
 
What according to you are the five tips that companies need to follow to comply with data security regulations?
Go back to basics. Companies must continuously evaluate the following:

  • Policies, Procedures, Standards and Guidelines – These documents must exist and be reviewed at regular intervals to ensure they are up to date and address both risks and requirements.
  • Employee Training and Awareness – Workers should receive regular security awareness training that addresses the real risks an organization faces.  Make sure your training curriculum address not only concepts and industry best practices but also your internal security and data privacy policies
  • Be aware of any data protection regulations you must comply with – Data Protection laws are quickly being adopted and/or updated in many countries and even in individual states across the globe.  Know what your obligations are regarding the movement of data (Cross-Border Data Transfers especially). You may need to formally execute written agreements to satisfy regulatory requirements and process data in compliance with laws.
  • Network Security – Corporate and development networks should be managed and controlled to protect both systems and applications
  • Vulnerability Management – Managing technical vulnerabilities within the companies information systems should be constructed on timely information through regular threat assessments.

Many countries have passed their own version of data protection laws recently. How does your company help its clients with securing their data and staying compliant?
Poly helps unleash the power of human collaboration with secure video, voice, and content solutions. Poly privacy and security practices are applied to the design, development, implementation, hosting, and maintenance of systems, infrastructure, and the networks that store Poly and customer data.

Poly’s Information Security Management System (ISMS) is ISO/IEC 27001:2013 certified. Poly’s ISMS is comprehensive and covers people, processes, and technologies used to provide unified communication and collaboration services and solutions to employees, customers (both hosted and on-premises). The Poly Product Security Standards align with NIST Special Publication 800-53, ISO/IEC 27001:2013, and OWASP for application security.

Guidelines, standards, and policies are implemented to provide our developers industry-approved methods for adhering to the Poly Product Security Standards. Also, Poly follows a secure software development life cycle (S-SDLC) with an emphasis on security throughout the product development process.

Do you believe the line between data security and data privacy has started to blur?
Not blurring, no. Security is the process of layering together tools, technical configurations, and procedures (like logging and monitoring) to prevent compromises in data confidentiality, integrity, and availability.  Privacy is a legal concept.  We can use security measures to accomplish privacy objectives.

Organizations have begun establishing lines of defense for data security. Many are even working on compliance through their privacy and security teams with a focus on data governance and management. It is important that every function in the organization from HR, Marketing, Operations to Security understand their responsibility and be in compliance.

Continue Reading

Cyber Security

ESET Research Uncovers Iran-Aligned BladedFeline Spying on Iraqi, Kurdish Officials

Published

on

The Iran-aligned threat group BladedFeline has targeted Kurdish and Iraqi government officials in a recent cyber-espionage campaign, according to ESET researchers. The group deployed a range of malicious tools discovered within the compromised systems, indicating a continued effort to maintain and expand access to high-ranking officials and government organizations in Iraq and the Kurdish region. The latest campaign highlights BladedFeline’s evolving capabilities, featuring two tunneling tools (Laret and Pinar), various supplementary tools, and, most notably, a custom backdoor Whisper and a malicious Internet Information Services (IIS) module PrimeCache, both identified and named by ESET.

Whisper logs into a compromised webmail account on a Microsoft Exchange server and uses it to communicate with the attackers via email attachments. PrimeCache also serves as a backdoor: it is a malicious IIS module. PrimeCache also bears similarities to the RDAT backdoor used by OilRig Advanced Persistent Threat (APT) group.

Based on these code similarities, as well as on further evidence presented in this blogpost, ESET assesses that BladedFeline is a very likely subgroup of OilRig, an Iran-aligned APT group going after governments and businesses in the Middle East. The initial implants in the latest campaign can be traced back to OilRig. These tools reflect the group’s strategic focus on persistence and stealth within targeted networks.

BladedFeline has consistently worked to maintain illicit access to Kurdish diplomatic officials, while simultaneously exploiting a regional telecommunications provider in Uzbekistan, and developing and maintaining access to officials in the government of Iraq.

ESET Research assesses that BladedFeline is targeting the Kurdish and Iraqi governments for cyberespionage purposes, with an eye toward maintaining strategic access to the computers of high-ranking officials in both governmental entities. The Kurdish diplomatic relationship with Western nations, coupled with the oil reserves in the Kurdistan region, makes it an enticing target for Iran-aligned threat actors to spy on and potentially manipulate. In Iraq, these threat actors are most probably trying to counter the influence of Western governments following the US invasion and occupation of the country.

In 2023, ESET Research discovered that BladedFeline targeted Kurdish diplomatic officials with the Shahmaran backdoor, and previously reported on its activities in ESET APT Activity reports. The group has been active since at least 2017, when it compromised officials within the Kurdistan Regional Government, but is not the only subgroup of OilRig that ESET Research is monitoring. ESET has been tracking Lyceum, also known as HEXANE or Storm-0133, as another OilRig subgroup. Lyceum focuses on targeting various Israeli organizations, including governmental and local governmental entities and organizations in healthcare.

ESET expects that BladedFeline will persist with implant development in order to maintain and expand access within its compromised victim set for cyberespionage.

Continue Reading

Cloud

SentinelOne Simplifies Secure Cloud Migrations on AWS

Published

on

SentinelOne today announced its participation in the Amazon Web Services (AWS) Independent Software Vendor (ISV) Workload Migration Program. This initiative supports AWS Partner Network (APN) members with SaaS offerings on AWS to accelerate and streamline workload migrations.

Through the program, SentinelOne will provide AWS customers with accelerated, secure cloud migration support, leveraging modern AI-powered CNAPP capabilities to ensure rapid and protected transitions. With access to AWS funding, technical resources, and go-to-market support, SentinelOne will help organizations reduce migration timelines and costs while maintaining robust security.

SentinelOne’s Singularity Cloud Security delivers real-time visibility and protection throughout the migration journey—whether from on-premises or another cloud—enabling a secure, seamless transition to AWS.

“Through our participation in the AWS ISV Workload Migration Program, SentinelOne is helping customers accelerate secure cloud migrations with end-to-end protection and visibility,” said Ric Smith, President of Product, Technology, and Operations at SentinelOne. “Whether moving from on-prem or another cloud to AWS, organizations can count on us to deliver the security they need throughout their journey—realizing the performance, speed, agility, and cost benefits of the cloud.”

Singularity Cloud Security combines agentless and agent-based protection for deep visibility, continuous posture management, and real-time threat detection across hybrid and multi-cloud environments. By collaborating with AWS and ecosystem partners, SentinelOne ensures seamless integration into migration projects, helping customers move faster, reduce risk, and scale confidently in the cloud.

Availability: SentinelOne’s solutions are available globally.

Continue Reading

Cyber Security

Beyond Blocklists: How Behavioural Intent Analysis Can Safeguard Middle East Businesses from Rising AI-Driven Bot Threats

Published

on

The Middle East is facing an unprecedented surge in AI-driven bot attacks, with malicious automation now outpacing traditional defenses. Mohammad Ismail, Vice President for EMEA at Cequence Security, warns that legacy tools like IP blocklists and rate limiting are no match for today’s sophisticated threats (more…)

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.