RADAR Blog

Automating the Incident Risk Assessment and Response Process

Explore the ecosystem of technologies available to privacy professionals,  including innovative technology that streamlines and accelerates incident response. Click here to get the full text in PDF format.

Read more

Multi-Factor Authentication: Best Practice in Network Security and Privacy

Last month, Target reached a breach settlement of $18.5 Million in fines for the 2013 security breach that exposed the data of millions of customers across 47 states and the District of Columbia. In addition to this fine, the settlement additionally requires Target adopt a “comprehensive information security program” and includes implementing network security best practices of encrypting payment card information, separating cardholder data from the rest of the computer network – and implementing policies regarding multi-factor authentication.

Read more

GDPR Matchup: The APEC Privacy Framework and Cross-Border Privacy Rules

This article By Alex Wall, CIPP/E, CIPP/US was originally published in the IAPP Privacy Tracker.

Read more

Introducing New Mexico’s Data Breach Notification Act

With the signing of HB 15 on April 6, 2017, New Mexico became the 48th state and 52nd US jurisdiction to enact a data breach notification law, leaving only Alabama and South Dakota to go.  The Data Breach Notification Act, which goes into effect June 16, 2017, is similar to many long-standing state breach notification laws, but it also incorporates several recent trends in breach notification amendments identified by the RADAR team.

Read more

Beyond Data Breach: Why Every Incident Matters

This article by Alex Wall is the first in a series published with the IAPP Privacy Advisor, on the topic of establishing program metrics and benchmarking your privacy incident management program.

Read more

Operationalizing Incident Response with Technology

“No two incidents are alike” – how often have we heard this refrain from privacy and legal professionals? While it’s true that the details of every incident are unique, the risk factors associated with incidents are not unique. Consequently this saying has created a misconception that incident risk assessment cannot be automated.

Read more

Five Tips for Incident Response Readiness

This article by Alex Wall was originally published on the Compliance & Ethics Blog. Click here to view the original version of this article.

Read more

Assessing Ransomware Attacks and Shoring up Security Measures Under HIPAA

This article by Alex Speaks was originally published on the Compliance & Ethics Blog. Click here to view the original version of this article.

Read more

Evolving Conversations on the General Data Protection Regulation

It’s been over a year since the General Data Protection Regulation (GDPR) was adopted, and one year until it takes effect. In my recent travels to conferences, seminars, and meetings with leaders in privacy across the US, the GDPR and its fast-approaching May 2018 effective date seems to be top-of-mind for privacy professionals.

Read more

Mitigating the WannaCry Attack: Shoring up Security Measures and Assessing Ransomware Attacks Under HIPAA

A string of ransomware attacks revealed today in the United Kingdom have quickly spread to global scale, impacting dozens of countries around the world and disrupting systems critical to hospitals, telecommunications, and corporations in the process.

Read more

Privacy Initiatives In Your Own Backyard: Encouraging State-Level Work to Protect Private Information

As the date for compliance with the EU’s General Data Protection Regulation looms, many privacy and compliance professionals turn their eye towards international regulations. A recent meeting with a Portland, Oregon cybersecurity advocacy group reminded me that, with the increasingly complex and ever-changing nature of state data breach laws, it’s also important to keep a trained eye on privacy legislation in your own backyard.

Read more

Privacy Laws Are A Changin’: Three Data Breach Developments to Watch

This article by Alex Wall was originally published on the Compliance & Ethics Blog. Click here to view the original version of this article.

Read more

RADAR Named Inaugural Preferred Provider with Global Law Firm K&L Gates

This week we announced a strategic partnership with global law firm K&L Gates, with RADAR as the inaugural solution in the launch of the firm’s preferred provider program. With RADAR as a preferred provider, K&L Gates offers its clients enhanced-value services relating to the risk, detection, defense, and management of security incidents, including compliance with data breach laws.

Read more

The IAPP-RADAR Incident Response Center: Staying Current with Changing Data Breach Laws

When I first conceived the RADAR solution, I was motivated by firsthand observations of operational challenges and risks faced by privacy professionals and teams.

Read more

Shared Perspectives on Data Breach Response and Compliance

Last week I had the opportunity to bring together many perspectives in the incident response management process and discuss our shared challenges, our best practices, and how we can better work in unison.

Read more