Connect with us

Cyber Security

Ardent Privacy raises seed funding to help businesses automate Data…

Avatar

Published

on

AI powered data minimization platform.

Ardent Solution showing data heat map

Our AI driven Data Minimization solution will help companies reduce privacy risk and simplify compliance with CCPA, GDPR and upcoming privacy regulations.” said Sameer Ahirrao, CEO of Ardent Privacy.

Ardent Privacy, a Maryland-based data privacy company, announced today that it received a $200,000 investment from TEDCO’s latest $800,000 funding round. TEDCO identifies, invests in, and helps grow technology companies in Maryland.

“We are excited to partner with TEDCO to pursue our mission to help companies in their data privacy journey. Enterprises are losing data in breaches not only because they are under attack, but also due to a lack of data hygiene and the absence of a data-centric security approach. Enterprises need a “Marie Kondo” tidying up approach for organizational data as they are challenged with data deluge and privacy compliance requirements at the same time. Our innovative data minimization technology will help companies reduce privacy risk and simplify compliance with CCPA and upcoming privacy regulations,” said Sameer Ahirrao, CEO of Ardent Privacy.

“We believe these companies are in a critical area of known need, setting them on a path to build strong businesses here in Maryland,” stated Frank Glover, lead director, TEDCO Seed Fund, and director, Maryland Venture Fund.

Companies have growing challenges with privacy with increased scrutiny of personal data by regulators, heightened consumer expectations, and the changing global environment. On July 16, CJEU (European Union’s top court) struck down the EU-US Privacy Shield agreement. It found the Privacy Shield invalid due to inadequate privacy, surveillance, and data protection rights for the transfer of personal data between the EU and the US. The California Consumer Protection Act (CCPA) was enacted on January 1, 2020, and enforcement began on July 1. Companies holding Californian’s data are accountable for consumer data they own, and negligence can result in huge fines. Fourteen more states are in the process of passing similar laws. Virginia recently (July 1, 2020) enacted their Insurance Data Security Act enforcing security compliance for insurers and producers in Commonwealth.

Ardent Privacy Solution

Ardent Privacy’s AI-driven solution helps companies reduce their unwanted or excess data footprint to become compliant and resilient in case of a breach. It provides deep discovery capabilities essential to meet privacy requirements for compliance, such as data subject access requests (DSAR). Organizations collect and retain vast amounts of personal data which represents a substantial liability for privacy compliance. For example, CCPA holds companies accountable for consumer data they own, and negligence can result in huge fines. By utilizing the Ardent Privacy solution, companies can reduce risk and liability by limiting excess storage of personal data. Data minimization reduces the costs associated with securing data and storage. It is vital for companies to know what data they have and only keep what they need to do business.

About Ardent Privacy

Ardent Privacy helps enterprises to comply with data privacy regulations such as the California Consumer Privacy Act (CCPA), the EU’s General Data Protection Regulation (GDPR), the Federal Information Security Management Act (FISMA), insurance data security laws, and more. Ardent Privacy’s AI-powered data privacy platform provides a quick and easy to use data minimization solution to discover, identify, inventory, map, minimize, and securely delete personal data. Ardent achieves data minimization using machine learning and artificial intelligence to report on large data sets in hours rather than days.
LinkedIn page: https://www.linkedin.com/company/ardent-privacy

About TEDCO

TEDCO enhances economic development growth through the fostering of an inclusive entrepreneurial innovation ecosystem. TEDCO identifies, invests in, and helps grow technology companies in Maryland.

Share article on social media or email:

Source: https://www.prweb.com/releases/ardent_privacy_raises_seed_funding_to_help_businesses_automate_data_minimization_and_privacy_compliance/prweb17272839.htm

Cyber Security

Russian hackers steal Prince Harry and Meghan Markle photos via Cyber Attack

Avatar

Published

on

According to a biography ‘Finding Freedom’, Russian hackers reportedly stole 100s of photos and videos related to the marriage of Duke with Duchess of Sussex that includes some snaps related to the Queen of Britain.

Authored by Omid Scobie and Carolyn Durand, the biography gives us details on why Prince Harry chose to depart the royal life to lead a quiet living in United States along with his newly born son ‘Archie’ Harrison Mountbatten Windsor and wife Meghan Markle.

Coming to the data leak, the breach is a wake up call to the entire world on how hackers could invade into the personal lives of celebrities without their knowledge to create havoc thereafter.

Cybersecurity Insiders has learnt that the stolen photos were related to the wedding photographer Alexi Lubomiriski, hired to digitally capture the wedding of the Duke with Meghan in May’18. Around 200 photos related to the Prince’s wedding were stolen by a computer programmer based in Russia out of which many were ‘outtakes’ meant to be directed to the computer trash can.

The biography specifies that the memorabilia were siphoned from a cloud account owned by the marriage photographer and includes pictures taken by Harry and Meghan along with the Queen at the wedding.

A photo sharing website named Tumblr is seen displaying a few of the stolen pictures possibly leaked by the hacker. 

An inquiry into the data breach and leakage of wedding photos was launched by the law enforcement in Britain after it received an official complaint from the authorities at the Queens palace.

Note- In June 2019, hackers somehow managed to infiltrate the personal computer of the New York based fashion photographer Alexi Lubomirski well- known in the fashion community of London for digitally capturing the lives of Scarlett Johnson, Jennifer Lopez, Britney Spears, Natalie Portman on many ocassions/events.

Source: https://www.cybersecurity-insiders.com/russian-hackers-steal-prince-harry-and-meghan-markle-photos-via-cyber-attack/?utm_source=rss&utm_medium=rss&utm_campaign=russian-hackers-steal-prince-harry-and-meghan-markle-photos-via-cyber-attack

Continue Reading

Cyber Security

Texas School District experiences DDoS Cyber Attack

Avatar

Published

on

On the very first day of virtual learning, a Texas school district has made it official that it became a victim of a cyber attack that disrupted virtual classes for 48 minutes. However, the good news is that the IT staff of the school district was swift enough to thwart the Denial of service cyber attack, neutralizing its repercussions to full extent.

The school district that is in discussion is based on the City of Humble, Texas, United States and is known as ‘The Humble Independent School District (Humble ISD) ’.

Liz Celania- Fagan, the Superintendent of Humble ISD, has confirmed the incident via twitter and informed the world that the virtual classes that were impacted by the cyber incident were back online after a break of nearly an hour.

Liz mentioned in her statement that all those students who were logged into the classes via their student Gmail accounts might not be able to log into their student email accounts until the incident is technically resolved.

Note- A denial of service attack aka distributed denial of service attack is launched through botnets that aim to shut down a computer network by bombarding it with fake web traffic.

Meanwhile, The Federal Bureau of Investigation (FBI) has issued a nationwide alert that all school districts that are planning for virtual classes for this academic year should take adequate Cybersecurity measures as there is a high possibility that their servers might be targeted by ransomware.

“As many of the K-12 schools are planning virtual classes from September, it makes them vulnerable to cyber attacks such as ransomware”, says Corey Harris, a special agent of FBI.

There is a good chance that hacking groups might be after social security numbers and other faculty or staff info added Harris.

Hope, the CIOs or CTOs of school districts have taken a note of the ransomware alert issued by FBI targeting K-12 schools.

Source: https://www.cybersecurity-insiders.com/texas-school-district-experiences-ddos-cyber-attack/?utm_source=rss&utm_medium=rss&utm_campaign=texas-school-district-experiences-ddos-cyber-attack

Continue Reading

Cyber Security

Digital signatures security explained

Avatar

Published

on

[ This article was originally published here ]

This blog was written by an independent guest blogger.
Digital signatures have been around for decades, but recent events have put them back in the spotlight. They were heralded as the future of cybersecurity as far back as 1999, but in the intervening years came to be somewhat taken for granted by security engineers. Not any longer: the massive move to home working precipitated by the Covid-19 pandemic have forced many to take a fresh look at the security value of digital signatures, why they matter, and their relationship to encryption.
We thought we’d do the same. In this article, we’ll give you a refresher course on how digital signatures work, why they are important for security, and what the future holds.
How do digital signatures work?
Digital signatures, at the most fundamental level, are mathematical algorithms used to validate the authenticity and integrity of an electronic message….

Bernard Brode Posted by:

Bernard Brode

      

Avatar

Source: https://www.cybersecurity-insiders.com/digital-signatures-security-explained/?utm_source=rss&utm_medium=rss&utm_campaign=digital-signatures-security-explained

Continue Reading
Nano Technology5 hours ago

SEMI Partners with GLOBALFOUNDRIES to Offer Apprenticeship Program Aimed at Building the Electronics Talent Pipeline

Fisher Yu, University of Arkansas CREDIT University of Arkansas
Nano Technology5 hours ago

Materials science researchers develop first electrically injected laser: The diode laser uses semiconducting material germanium tin and could improve micro-processing speed and efficiency at much lower costs

Nano Technology5 hours ago

Advance in programmable synthetic materials: Reading sequence of metal atoms in MOFs allows encoding of multiple chemical functions

Blockchain5 hours ago

Invest 3% in Bitcoin to Avoid COVID-19 Lockdown Devaluation — BitGo CEO

Blockchain5 hours ago

Cointelegraph Launches Newsletter for Professional Investors

Blockchain5 hours ago

Bitcoin Cash short-term Price Analysis: 12 August

Blockchain6 hours ago

Token Launches From Ethereum to Telegram: Where Do We Go From Here?

AR/VR6 hours ago

Enterprise VR Hardware Specialist Varjo Raises $54 Million in Latest Funding Round

Blockchain6 hours ago

Grayscale Bitcoin Trust Saw Surge in Investor Interest After March

Blockchain6 hours ago

VeChain & Oxford Announce New Framework to Assess Consensus Protocols

Blockchain6 hours ago

Championing Blockchain Education in Africa: Women Leading the Bitcoin Cause

Gaming6 hours ago

Evening Reading – August 11, 2020

Blockchain7 hours ago

Chainlink: Traders under zero loss, but why?

Blockchain8 hours ago

The Babylon Project: A Blockchain Focused Hackathon with a Commitment to Diversity & Inclusion

AR/VR8 hours ago

Varjo Raises $54M Financing to Support Its Retina-Quality VR/AR Headsets for Enterprise

Blockchain8 hours ago

Ethereum, Zcash, Dogecoin Price Analysis: 12 August

Blockchain8 hours ago

Peer-to-Peer Exchange CryptoLocally Now Offers Instant Credit Card Payment

Blockchain9 hours ago

Cardano (ADA) Holds On to Crucial Support By a Thread

Blockchain10 hours ago

Bitcoin Creates Double-Top After Failing Close Above $12,000

Blockchain10 hours ago

DeFi Farmers Rush to Yam and Serum for Explosive Yields

Energy11 hours ago

Copper Foil Market Size Worth $10.3 Billion By 2027 | CAGR: 9.7%: Grand View Research, Inc.

Energy12 hours ago

Corundum Market Size Worth $3.5 Billion By 2027 | CAGR: 4.0%: Grand View Research, Inc.

AR/VR12 hours ago

Mozilla is Shuttering its XR Team Amidst Major Layoff, But ‘Hubs’ Will Continue

Energy12 hours ago

New Energy Challenger, Rebel Energy, Places Blue Prism Digital Workers at the Heart of its Launch Plans

Science12 hours ago

Teknosa grows by 580 percent in e-commerce and pulls its operating profit into positive territory in Q2, despite the pandemic

Science12 hours ago

Novo Ventures Portfolio Company F2G Closes US$60.8 Million Financing

Science12 hours ago

F2G Closes US$60.8 Million Financing to fund late stage development of novel mechanism antifungal agent

Blockchain13 hours ago

LocalCryptos Integrates Inbuilt Crypto-To-Crypto Exchanges, Powered by ChangeNOW

Publications13 hours ago

Putin’s plan for Russia’s coronavirus vaccine is at ‘high risk of backfiring,’ expert says

Publications13 hours ago

UK enters recession after GDP plunged by a record 20.4% in the second quarter

Gaming13 hours ago

Another Steam Game Festival Is Coming In October

Science13 hours ago

Top 25 Nationally Ranked Carr, Riggs & Ingram (CRI) Welcomes Cookeville-Based Firm, Duncan, Wheeler & Wilkerson, P.C.

Science13 hours ago

Avast plc Half Year Results For The Six-Months Ended 30 June 2020

Cyber Security14 hours ago

Russian hackers steal Prince Harry and Meghan Markle photos via Cyber Attack

Gaming14 hours ago

Oddworld: New ‘N Tasty Coming To Switch In October

Gaming14 hours ago

Linkin Park’s Mike Shinoda Is Writing A Song For Gamescom 2020

Cyber Security14 hours ago

Texas School District experiences DDoS Cyber Attack

Gaming14 hours ago

‘EVE: Echoes’ from CCP Games and Netease Is Now Available Early on the App Store, Servers Go Live Tomorrow

Gaming14 hours ago

Hans Zimmer Created An Extended Netflix “Ta Dum” Sound For Theatres

Cannabis14 hours ago

Everything you need to know about the Exxus Snap VV

Trending