<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/"
   xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom"
   version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title><![CDATA[ GDPR - Rapid7 Cybersecurity Blog ]]></title>
    <description><![CDATA[Rapid7 transforms data into insight, empowering security professionals to progress and protect their organizations.]]></description>
    <link>https://www.rapid7.com/blog/</link>
    <image>
      <url>https://blog.rapid7.com/favicon.png</url>
      <title>Rapid7 Cybersecurity Blog</title>
      <link>https://www.rapid7.com/blog/</link>
    </image>
    <lastBuildDate>Tue, 21 Apr 2026 03:17:04 GMT</lastBuildDate>
    <atom:link href="https://www.rapid7.com/tag/gdpr/rss" rel="self" type="application/rss+xml" />
    <ttl>60</ttl>
    <item>
      <title><![CDATA[Utilize File Integrity Monitoring to Address Critical Compliance Needs]]></title>
      <description><![CDATA[<p>With data breaches too often in the news, businesses have been tasked with the nonstop and never-ending activity of monitoring critical systems and keeping up with regulatory standards and laws such as <a href="/solutions/compliance/pci-dss/">PCI DSS</a>, <a href="/solutions/compliance/hipaa/">HIPAA</a>, and <a href="/solutions/compliance/gdpr/">GDPR</a>.</p><p>Some of these standards require you to deploy a <a href="/solutions/file-integrity-monitoring/">file integrity monitoring (FIM)</a> internal control within your operating environment to protect your organization’s critical assets and data. For PCI DSS, those specifically include your cardholder data environment, and for HIPAA, it is any system that stores or transmits patient data.</p><p>To help organizations address their compliance auditing needs, we are excited to introduce file integrity monitoring for <a href="/products/insightidr/">InsightIDR</a>.</p><h2>What is FIM?</h2><div style="overflow: hidden"><span><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6b5e8518bbeb6da2/683de2bb3323a5c1a980a9ca/FIM_Config_JD.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="FIM_Config_JD.png" asset-alt="FIM_Config_JD.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6b5e8518bbeb6da2/683de2bb3323a5c1a980a9ca/FIM_Config_JD.png" data-sys-asset-uid="blt6b5e8518bbeb6da2" data-sys-asset-filename="FIM_Config_JD.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="FIM_Config_JD.png" sys-style-type="display"/></figure></span></div><p>A FIM solution actively watches the changes of files within your environment. By monitoring file modification activities, InsightIDR provides key metrics to detect suspicious behavior applied to critical system files that don’t often change and to privileged data files being sabotaged.</p><div><h4><br/>See InsightIDR’s new FIM capabilities in action with a free 30-day trial.</h4><a href="/try/insightidr">Try InsightIDR</a></div><br/><h2>FIM compliance rule coverage and benefits</h2><p>InsightIDR FIM provides specific coverage for the following compliance requirements:</p><ul><li>PCI DSS Requirement 10.5</li><li>PCI DSS Requirement 11.5</li><li>HIPAA 164.312(b)</li><li>HIPAA 164.312(c)(1)</li><li>HIPAA 164.312(c)(2)</li><li>GDPR Article 32-1.b</li><li>GDPR Article 32-2</li></ul><h3>PCI</h3><p>For example, the PCI DSS standard explicitly requires the demonstration of compliance via FIM. Specifically, PCI DSS mandates that you track changes on critical assets such as the following:</p><ul><li>Critical system files, like system and executable files</li><li>Content files that contain card data and personally identifiable information (PII)</li><li>Configuration files to critical applications, such as a database storing card and PII data</li><li>Digital key and credential files for secure authentication and authorization</li><li>Historical and archived log and audit files</li></ul><div style="overflow: hidden"><span><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0d52fb992de11b63/683de2e0237ea658e791c31d/FIM_Reports_JD.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="FIM_Reports_JD.png" asset-alt="FIM_Reports_JD.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0d52fb992de11b63/683de2e0237ea658e791c31d/FIM_Reports_JD.png" data-sys-asset-uid="blt0d52fb992de11b63" data-sys-asset-filename="FIM_Reports_JD.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="FIM_Reports_JD.png" sys-style-type="display"/></figure></span></div><h3>HIPAA and GDPR</h3><p>Like PCI DSS, HIPAA requires the implementation of policies and technologies to safeguard protected health information (PHI) from alteration and destruction. Similarly, GDPR requires the protection of personal data files and applications:</p><ul><li>Configuration and system files to critical PHI/personal data storage applications</li><li>Configuration and system files to critical PHI/personal data transportation/communication applications</li><li>Digital key and credential files to access critical PHI/personal data applications</li></ul><h3>UBA</h3><p>In addition to compliance coverage, FIM expands InsightIDR’s industry-leading user behavior analytics (UBA) to apply to file modification events. New file modification events may be looped into an investigation to fully understand the critical file modifications as they relate to a user’s other actions within your environment. Additionally, file modification events may be aggregated into fully customizable dashboard charts to better understand FIM visually within your environment. The charts and underlying data may be exported for your auditor to peruse.</p><h3>Powered by Insight Agent, monitor in near-real-time</h3><p>Taking advantage of the Insight Agents already deployed, InsightIDR FIM adds another layer of compliance visibility and critical file-change tracking to an already robust suite of security tools. InsightIDR enables you to keep watch and validate critical file changes that may endanger your business and customers.</p><h2>Getting started with FIM in InsightIDR</h2><p>Let’s take a look at how Rapid7 can help you achieve your compliance needs and reap the value of InsightIDR.</p><p>FIM for InsightIDR runs on common Windows Audit Policy configurations with which IT teams should be intimately familiar. Take a look at the <a href="https://docs.rapid7.com/insightidr/file-integrity-monitoring/">InsightIDR help page to set up FIM in your environment</a>. As a trusted advisor to your compliance and security needs, Rapid7 offers <a href="https://docs.rapid7.com/insightidr/fim-recommendations/">recommendations to FIM configurations</a>, which will be updated accordingly as the industry moves forward and we learn more over time.</p><div><h4><br/>See InsightIDR’s new FIM capabilities in action with a free 30-day trial.</h4><a href="/try/insightidr">Try InsightIDR</a></div><br/>]]></description>
      <link>https://www.rapid7.com/blog/post/2019/03/13/utilize-file-integrity-monitoring-to-address-critical-compliance-needs</link>
      <guid isPermaLink="false">bltfcb1210730eba605</guid>
      <category><![CDATA[InsightIDR]]></category>
      <category><![CDATA[Incident Detection]]></category>
      <category><![CDATA[Incident Response]]></category>
      <category><![CDATA[Compliance]]></category>
      <category><![CDATA[GDPR]]></category>
      <category><![CDATA[HIPAA]]></category>
      <category><![CDATA[PCI]]></category>
      <category><![CDATA[Detection and Response]]></category><dc:creator><![CDATA[Alex Teng]]></dc:creator>
      <pubDate>Wed, 13 Mar 2019 17:12:50 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt76e18e142c77c10b/683de3152cfe320813dc16f2/Magnifying_Glass.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[GDPR Preparation March and April:  Course Correct]]></title>
      <description><![CDATA[<p>Wow, how did March just happen? Living in a country that just fell apart like a clown car because of snow, it’s still feeling decidedly wintery here in the UK, and as a weather obsessed Brit I am fully looking forward to sunnier times. You know, that single day sometime in August. By that time, we’ll have crossed the border into the brave new world of the <a href="/solutions/compliance/gdpr/">General Data Protection Regulation (GDPR)</a>, and like many of you, I am curious as to what that world will look like.</p><p>During the 2018 countdown to the GDPR there have been some major milestones falling of late: 100 working days until GDPR, 100 actual days until GDPR, <a href="/blog/post/2018/02/15/tonight-im-gonna-ir-like-its-99-days-until-gdpr/">99 days until GDPR</a>, and so on. By the way, you do have our solemn vow that we’re not going to remind you on a daily basis how close it’s getting to May 25th, 2018. But for those folks still trying to work out what the hell to do for GDPR,  by the time this blog hits the interwebs it’ll be around 50 working days in the US until go-day. Not long (tick tock, etc etc), but if you’re reading this as your first step, at least you’re <em>doing something</em>, which is a good start.</p><p><a href="/fundamentals/gdpr/">GDPR</a> could most definitely be described as a massive exercise in both consumer and business trust, and if you outwardly state that you don’t care about GDPR compliance, or indeed just keep quiet and hope this all blows over, then there are multiple ways it could come back to haunt you. But let’s hope as you’re reading this blog you’re not falling into that camp: instead, you’re either just a little late to the party and are looking for <a href="/blog/tag/gdpr/">ideas on where to start</a>, or you’re somewhere out there on the GDPR forever-road.</p><p>I haven’t personally spoken to any of the (hopefully) mythical beasts who are sitting back and purposely doing nothing whilst awaiting the fireworks once GDPR becomes enforceable, but I do hear rumours that this is happening. As courses of actions go, this really isn’t a good idea, even if you thoroughly believe that you won’t/can’t get hauled up for non-compliance, or “it’ll only be the big guys” who get called out, or it’ll be a big newsworthy data breach that puts the first organisation into the GDPR spotlight. One of the big misconceptions about GDPR, is that it’s just about data breaches, and whilst this is an important part, it’s not the only way in which you could find your organisation in investigative hot water (as your lawyer will no doubt tell you!).</p><p>So in the next couple of months, assuming you’ve got to grips with things such as personal data discovery, reviewing your incident response and <a href="/fundamentals/security-program-basics/">security program</a>, and understanding your privacy and data retention policies and procedures, now is a good time to look at what you’ve learned and implement any changes. Maybe your organisation is in a heavily governed industry, like finance, so in theory there’s been less work to do, but regardless of where you are or what you do, if you handle the personal data of EU folks then there will be a level of work needed to prepare for GDPR.</p><p>When you implement these changes, do ensure you put the related people, processes and technology through their paces to make sure things are working as they should be. For security teams, something like a breach readiness assessment or a <a href="/globalassets/_pdfs/product-and-service-briefs/rapid7_threat_simulation_ttx_service_brief.pdf">threat simulation tabletop exercise</a> will help you understand how well your <a href="/fundamentals/incident-response/">incident response</a> processes stand up. In our February GDPR blog, we talked about doing a “Right to be erased” drill - it’s worth doing a few of these in the run up to May 25th, as this is a place you could come unstuck if someone is unhappy with the way in which you’ve dealt with their request.</p><p>The other area that we recommend revisiting at this point is third party data processor agreements. These are organisations that you send personal data to, such as a third party payments company, or a cloud-based data storage vendor. This is a vital step in <a href="https://www.youtube.com/watch?v=JDG2m5hN1vo">the chain</a>, as without the right contracts in place you could be held responsible for the non-compliance of a processor, which could potentially be a very costly exercise if something goes wrong. If you haven’t had a chance to check in with the data processors that you work with, then do make this a priority over the coming weeks.</p><p>As with everything GDPR, your legal counsel and, if you have one, Data Protection Officer are the right places to go if you have questions specific to your organisation. We have a range of assets that can help you better understand the regulation, if you’re looking for a fresh pair of eyes to help you understand your organisation’s <a href="/globalassets/_pdfs/product-and-service-briefs/rapid7-consulting-services-brief-gdpr-readiness-assessment.pdf">GDPR readiness</a>, our consultants are able to assist you with the alignment of your data privacy and security ducks.</p><p>Want to read more of our GDPR preparation blog series? Look no further than our <a href="/blog/tag/gdpr/">GDPR blog tag</a>.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2018/03/21/gdpr-preparation-march-and-april-course-correct</link>
      <guid isPermaLink="false">bltabfef7f2f3b26a94</guid>
      <category><![CDATA[GDPR]]></category>
      <category><![CDATA[Incident Response]]></category>
      <category><![CDATA[Compliance]]></category>
      <category><![CDATA[Detection and Response]]></category><dc:creator><![CDATA[Sam Humphries]]></dc:creator>
      <pubDate>Wed, 21 Mar 2018 13:30:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt193b8c6a9d7d35df/683de28dda5c308089a8355a/GDPR-March-and-April.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Tonight I'm gonna IR like it's 99 (days until GDPR)…]]></title>
      <description><![CDATA[<p>Sorry Nena, it was going to be you or Prince that was going to get the headline, and whilst <a href="https://www.youtube.com/watch?v=HZ1TQYjCwYc">99 Red Balloons</a> is a catchy 80’s classic, I had to give credit to <a href="https://www.youtube.com/watch?v=rblt2EtFfC4">His Royal Purpleness</a>. It was that or pay tribute to a childhood favourite vanilla ‘whippy’ ice cream, adorned with a Cadbury’s Flake, but I’m not so sure that would resonate so well with a global audience.</p><p>“Why 99?”, you may ask. Why not a nice round hundred? Well, 99 is relevant for two very important reasons: Firstly, per the title, today marks 99 days until the <a href="/solutions/compliance/gdpr/">General Data Protection Regulation (GDPR)</a> comes into force. Secondly, the average time to detect that a breach has occurred is 99 days. So we’re now within the Averages Window, and this is a pretty key milestone.</p><p><a href="/fundamentals/gdpr/">The GDPR</a> covers many different topics and one of those topics is breach notification. <a href="/globalassets/_pdfs/product-and-service-briefs/rapid7-solution-brief-gdpr-article-33-34.pdf">Articles 33 and 34 of the GDPR</a> cover this requirement; essentially organisations have 72 hours to report a personal data breach if there is a significant risk to the impacted data subjects (aka “living people”). The 72 hour clock starts ticking at the point of breach discovery, not at the time the breach actually occurred, so if we go with the aforementioned average, that’s 102 days from when an attacker bust through the defences and did something untoward with the data. (For the record, there are no good songs with 102 in the title—I checked, and with an IMDB score of 4.9 I’m not going to give 102 Dalmatians blog title airtime. Sorry, Walt. Those EDMs fans amongst our readership will be overjoyed to know that there is a track called <a href="https://soundcloud.com/s-watson/72-hours-xstaassen-feat-scott-watson">72 hours</a>...)</p><p>The next question you may ask is “what counts as discovery?”, and that is indeed a great question. Working Party 29, the group responsible for helping untangle the legalese vagueness of the GDPR, are on hand to help. They have issued draft guidelines to help organisations better prepare, including giving clarification on what counts as a personal data breach.</p><p>Let’s get back to 99 for a moment. 99 days is an age in breach terms. Yes, it’s dropped from 146, or 201, or 205, or 320, depending on the piece of past research you wish to read, but it’s still a bloody long time whichever way you look at it. At the point of discovery, it’s highly likely the attackers are long gone, but trying to unpick exactly what went on over 14 weeks ago is not the easiest of tasks. In addition, you only have 3 days to work out the fundamentals, assuming you have round the clock <a href="/fundamentals/incident-response/">incident response</a> folks at your disposal.</p><p>In the next 99 days, breaches will continue to occur and unfortunately go unnoticed, but there’s one fundamental difference coming down the pipe, which is the upcoming regulatory change around notification. Now, I am in no way suggesting that it’s better to find out before GDPR comes in to effect so that you don’t necessarily need to notify (many other regulations already include this requirement today). As a human who shares data with a multitude of organisations, I am a big fan of breach notification, and the related requirements to keep my personal data as safe as possible. But, I would like you to take some time to think about how prepared your organisation is to both detect and respond to breach. Do you have the right people, process, and technology in place? When did you last update your incident response plan? When did your incident response program last get put through its paces, via a penetration test or firedrill exercise such as a threat simulation (aka a tabletop exercise)? Do you have the ability to spot the usage of compromised credentials within your environment? Now is the time to look hard at the overall breach readiness of your organisation. Making changes now could make the difference between needing to send notifications to a Supervisory Authority, and indeed your customers. Ideally, you want to be able to spot attackers earlier in the attack chain, investigate quickly, and respond with confidence.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2018/02/15/tonight-im-gonna-ir-like-its-99-days-until-gdpr</link>
      <guid isPermaLink="false">blt20c090ab9e122631</guid>
      <category><![CDATA[GDPR]]></category>
      <category><![CDATA[Compliance]]></category><dc:creator><![CDATA[Sam Humphries]]></dc:creator>
      <pubDate>Thu, 15 Feb 2018 15:05:00 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[GDPR Preparation Checklist: January – Teach and Tidy]]></title>
      <description><![CDATA[<p>New year, new things to think about when it comes to your <a href="/solutions/compliance/gdpr/">GDPR compliance</a> preparations. Hopefully your GDPR project is in full swing by now. If it’s not, then you do really need to be getting your skates well and truly on. Do take a look through our <a href="/blog/post/2017/11/14/gdpr-preparation-november-form-storm/">November</a> and <a href="/blog/post/2017/12/04/gdpr-compliance-checklist-december-assess-review/">December</a> preparation blogs for ideas on how to get going. As of January 1, 2018, there were 144 days left until GDPR Day hits, so depending on where you are in the world, and when you’re reading this blog, you’ve got about 100 working days left to go.</p><p>Without further ado, here are our recommendations for January:</p><h2>Enable your entire organization on GDPR compliance</h2><p>Everyone, really, <em>everyone</em> in your organisation should have some level of GDPR awareness, because it only takes the actions of one unaware person to put you in breach of the regulation (the database under a desk situation, for example).  Personal data is everywhere. I’m sat next to two phones and typing at a laptop writing this blog from my house. All of these contain personal data, and many organisations’ employees are in the same boat. Employees who are closest to personal data—such as engineering, marketing, operations, and HR—need the most training.  Personal data might well enter your environment through some form of human entry, so ensuring customer services, sales, support et al all understand <a href="/fundamentals/gdpr/">the fundamentals of GDPR</a>. There is a myriad of online courses available, including certifications, and it may also be wise to include GDPR-related training in your new hire and annual conduct training.</p><h2>Clean out unnecessary personal data</h2><p><a href="https://gdpr-info.eu/art-5-gdpr/">Article 5 of the GDPR</a> states that personal data must be “adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed (‘data minimisation’)”. Additionally, personal data must be “kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the personal data are processed…(‘storage limitation’).”</p><p>This means you can only process the personal data you actually need (you can read more about adequacy from the ICO), and only keep it for as long as is necessary to perform the tasks for which you need it. With many compliance regulations, paperwork is key: document which types of personal data you have, the categories of personal data they fall into, why you need the personal data, and for how long you retain this data.</p><p>A question I hear pretty frequently boils down to “which compliance wins in a fight?” For example, what should you do if GDPR says you should remove personal data you don’t need, but a different compliance requirement says you need to keep records for a specific amount of time (even if you no longer provide a service to the individuals the data belongs to)? Alas, this is a question you’ll need to answer with your legal experts of choice. The ICO has some sage advice on what to do in these circumstances.  The TL;DR is that both/all win and it’s really not a competition, even though GDPR has a much bigger maximum fine stick to wield. Your legal counsel can offer advice specific to your circumstances.</p><p>If there is no legal, regulatory or valid reason to have specific personal data, it may be time to consider getting rid of it. As an added bonus, you’ll win back some storage too.</p><h2>Contact data subjects to ensure personal data accuracy</h2><p>Article 5 also states that personal data must be “accurate and, where necessary, kept up to date; every reasonable step must be taken to ensure that personal data that are inaccurate, having regard to the purposes for which they are processed, are erased or rectified without delay (‘accuracy’).”  You’re likely already seeing organizations reaching out to you personally to check data is up to date, as like many things that fall under GDPR this is good business practice. Clarification on accuracy (META!!) is also covered by our friends over at the ICO. Before you stop reading this blog and run off to go sending out emails, in-app messages or even letters on Actual Paper, please carry on reading through the next section as you’ve likely got some further communication to do.</p><h2>Update consent mechanisms, privacy policies, and legal agreements</h2><p>Not that I have any major life regrets (well, one small one involving not saying hello to <a href="https://www.youtube.com/watch?v=5j7fg0Kb9qs">Rod Hull</a>, a British kids’ TV entertainer, in the street once, and a few weeks later he died. I’m still reeling a bit, can you tell? Sorry, I digress, but it was a valuable lesson nonetheless.)…BUT, if I had a Delorean and a flux capacitor, right now would be a good moment to go <a href="https://www.youtube.com/watch?v=TLQWGoysbgM">back in time</a> and retrain as a data privacy lawyer. Seriously, these are busy people right now.</p><p>Let’s talk about <a href="https://ico.org.uk/for-organisations/uk-gdpr-guidance-and-resources/lawful-basis/a-guide-to-lawful-basis/lawful-basis-for-processing/consent/">consent</a> first, as this has been a topic of much debate. Consent needs to be provided for personal data to be processed, and it must be able to be rescinded as easily as it was given. There are additional rules around consent for services provided to children. Working party 29, who are the group responsible for clarifying the GDPR articles, have issued <a href="https://iapp.org/resources/article/wp29-guidelines-on-transparency/">guidelines on transparency</a>, which includes the topic of consent. Many organisations expect to be making changes to contracts and web applications to meet this part of the regulation.</p><p>Your privacy policy, plus legal agreements with third party suppliers, and to any data controller whose data your organization processes, will also need updating to meet GDPR requirements. Find a good data privacy lawyer and work out which changes are needed so that you have time to update documentation and your website.</p><p>Whether you decide to jointly or separately revisit consent and data accuracy discussions with your customers, prospects, employees, and any other EU data subjects you hold data about is a matter for to discuss with your team and counsel. It might be easier to hit both birds with one stone, especially if you have a lot of data.</p><p><em>Watch the </em><a href="/blog/tag/gdpr/"><em>GDPR blog tag</em></a><em> to keep up as we get closer to GDPR go-time.</em></p>]]></description>
      <link>https://www.rapid7.com/blog/post/2018/01/10/gdpr-preparation-checklist-january-teach-and-tidy</link>
      <guid isPermaLink="false">blt8dff424bd20e325e</guid>
      <category><![CDATA[GDPR]]></category>
      <category><![CDATA[Compliance]]></category><dc:creator><![CDATA[Sam Humphries]]></dc:creator>
      <pubDate>Wed, 10 Jan 2018 09:30:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltff08bb15cad5ac08/683de6b118a5533d10687252/spray-cleaner-2.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[MDR and GDPR: More than a lot of letters]]></title>
      <description><![CDATA[<p>With 2018 now well in our sights, the countdown to the General Data Protection Regulation (GDPR). is most definitely on. Articles 33 and 34 of the <a href="/fundamentals/gdpr/">GDPR</a> require organizations to communicate personal data breaches when there is a high risk of impact to the people to whom the data pertains. GDPR security requirements and breach notification go hand-in-hand, for obvious reasons. In the words of the European Commission Working Party 29 (the group who are tasked with clarifying the requirements of the GDPR): Article 32 of the GDPR “makes clear that the controller and processor should have appropriate technical and organizational measures in place to ensure an appropriate level of security of personal data: the ability to detect, address, and report a breach in a timely manner should be seen as essential elements of these measures. So in brief, if there's a good chance a breach would affect people's personal data, there's gotta be a comprehensive plan in place to address it—quickly.</p><p>Traditional defenses are not geared toward detecting the more complex threats and exploits used in today’s sophisticated threat landscape. Moreover, attackers don’t just operate during business hours. And the longer an attacker goes undetected, the more potential there is for them to do damage. The answer for many organizations is to set up a <a href="/fundamentals/security-operations-center/">Security Operations Center (SOC)</a>, but this can be a daunting and costly task. It takes a lot of time and money to build a SOC and to competently staff it around the clock. And that’s assuming you can find (and keep!) the right people.</p><p>There is another way.</p><h2>Rapid7 Managed Detection and Response</h2><p>Rapid7 Managed Detection and Response (MDR) Services, provides 24/7 incident detection and response. This makes it that much easier for organizations to tackle their detection and response needs without needing to invest in building and staffing a SOC themselves. Per the advice of Working Party 29, “a key element of any data security policy is being able, where possible, to prevent a breach and, where it nevertheless occurs, to react to it in a timely manner.” This is great, but to do it well is often beyond the budgetary means of many organizations.</p><p>This begs the question-- what’s included in Rapid7 MDR?</p><h2>People, Process, Technology</h2><p>Rapid7 built our Managed Detection and Response offering around people, process, and technology. The Rapid7 SOC is full of some of the finest talent in cyber security. They eat, sleep, and breathe alerts. When they finish up at work, many of them go to meetups on hacking. The technical people on the team average more than 10 years experience. They’ve worked for public and private sector organizations. Even the most junior analyst has seen over 300 threats and many breaches.</p><p>The backbone of the Rapid7 Managed Detection and Response Service is Rapid7 InsightIDR, for <a href="/fundamentals/siem/">SIEM</a>, User Behavior Analytics (UBA), and Endpoint Detection and Response (EDR), but we don’t just manage the technology for you. The team both hunts for threats and conducts investigations to understand what is going on in your environment. If a lead is a threat, and the threat is a live attacker, the team can easily pivot into incident response escalation mode. Two incident escalations are included annually with the service, so if the worst happens you know the experts have your back.</p><p>Prior to deploying Rapid7 <a href="/fundamentals/what-is-managed-xdr-mxdr/">MXDR</a>, the team conducts a compromise assessment and builds a threat profile for the organization.The threat profile enables understanding of user behavior within the organization so that it’s easier to spot anomalies and make better use of threat intelligence. The compromise assessment ensures that there is a clean environment prior to starting. In some cases, our team has done a compromise assessment and found issues that previous companies had missed.</p><h2>Round the clock support</h2><p>Rapid7 has security operations centers around the globe, where our analysts execute the 24/7/365 coverage. The combination of people, process, and technology makes it possible to better meet organization’s needs for GDPR, without the overhead of an in-house SOC.</p><p>Explore <a href="/services/managed-detection-and-response-mdr/">Rapid7 Managed XDR</a>.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2017/12/18/mdr-and-gdpr-more-than-a-lot-of-letters</link>
      <guid isPermaLink="false">blt668b26e199675874</guid>
      <category><![CDATA[GDPR]]></category>
      <category><![CDATA[Managed Detection and Response (MDR)]]></category><dc:creator><![CDATA[Kimberlee Bachman]]></dc:creator>
      <pubDate>Mon, 18 Dec 2017 18:43:13 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Creating a Risk-Based Vulnerability Management Program for GDPR with InsightVM]]></title>
      <description><![CDATA[<p><a href="/solutions/compliance/gdpr/">The General Data Protection Regulation’s (GDPR)</a> deadline in 2018 is rapidly approaching, and as companies <a href="/blog/post/2017/02/23/preparing-for-gdpr/">prepare for GDPR compliance</a>, they’re facing a struggle that’s plagued every security program for years: how to quantify that nebulous, scary thing called “risk.” <a href="/fundamentals/gdpr/">GDPR compliance</a> specifically talks about “risk” several times in its guidelines, particularly in Article 32 where it states that “Controllers and processors much implement a level of security appropriate to the risk.”</p><p>Fortunately, our <a href="/products/insightvm/download/">vulnerability management solution</a> has been built from the ground up to focus on risk and how to measure it, instead of just CVSS scores and other rating systems that don’t take business context into account. Here’s how <a href="/products/insightvm/">InsightVM</a> can help you meet your GDPR compliance needs in an automated and efficient way, saving you time to worry about more intricate security concerns.</p><h3>Automatically prioritize systems that process personal data for remediation</h3><p>With InsightVM’s criticality tags, you can tag specific systems that process personal data as more important than other systems, amplifying the risk score of the asset and ensuring that the vulnerabilities found on these assets are prioritized for remediation. You can also tag assets by owner or by type (e.g., GDPR - App Server) to make reporting a breeze.</p><h3>Track remediation progress to ensure GDPR systems are fixed in a timely manner</h3><p>Remediation projects in InsightVM let the security team assign the right projects to the right people and track live to ensure that SLAs are met and GDPR systems are patched in a timely manner. You can also <a href="/blog/post/2017/07/06/remediation-workflow-now-integrates-with-servicenow/">integrate with ticketing solutions like JIRA and ServiceNow</a> to seamlessly fold remediation into your IT team’s existing workflow.</p><h3>Live dashboards for tracking GDPR compliance progress</h3><p>InsightVM’s Liveboard gives you live dashboards that you can customize for any user in your organization—making it easy to obtain a report card on your GDPR systems. These can be further filtered down to create holistic corporate-wide views for a CIO or CISO, or office-specific views for a security director.</p><h3>Tutorial: Creating a GDPR compliance dashboard in InsightVM</h3><p>Now that you’ve tagged your GDPR assets as “Critical,” let’s walk through how to create a dashboard for these assets so you can track risk and remediation progress live.</p><p>First, we’ll create a general dashboard using one of InsightVM’s pre-built templates. The “Assets Dashboard” is a good place to start as this comes pre-built with most of the cards we would find useful. To do so, click on the dropdown on the dashboards page and click on “Assets Dashboard” under the Rapid7 Recommended section.</p><div style="overflow: hidden"><span><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte149d658c2282747/683de08c3beff00de0a7c43d/IVM-GDPR-1.jpg" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="IVM-GDPR-1.jpg" asset-alt="IVM-GDPR-1.jpg" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte149d658c2282747/683de08c3beff00de0a7c43d/IVM-GDPR-1.jpg" data-sys-asset-uid="blte149d658c2282747" data-sys-asset-filename="IVM-GDPR-1.jpg" data-sys-asset-contenttype="image/jpeg" data-sys-asset-alt="IVM-GDPR-1.jpg" sys-style-type="display"/></figure></span></div><p>Give this new dashboard a relevant name and a description, and click OK to save.</p><div style="overflow: hidden"><span><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc50ca746c980e754/683de0b130073e21d7eb1847/IVM-GDPR-2.jpg" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="IVM-GDPR-2.jpg" asset-alt="IVM-GDPR-2.jpg" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc50ca746c980e754/683de0b130073e21d7eb1847/IVM-GDPR-2.jpg" data-sys-asset-uid="bltc50ca746c980e754" data-sys-asset-filename="IVM-GDPR-2.jpg" data-sys-asset-contenttype="image/jpeg" data-sys-asset-alt="IVM-GDPR-2.jpg" sys-style-type="display"/></figure></span></div><p>This will give us a default view that looks like this:</p><div style="overflow: hidden"><span><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt879b6a5fc34fe306/683de0d93a1c5a346b4ba896/IVM-GDPR-3.jpg" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="IVM-GDPR-3.jpg" asset-alt="IVM-GDPR-3.jpg" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt879b6a5fc34fe306/683de0d93a1c5a346b4ba896/IVM-GDPR-3.jpg" data-sys-asset-uid="blt879b6a5fc34fe306" data-sys-asset-filename="IVM-GDPR-3.jpg" data-sys-asset-contenttype="image/jpeg" data-sys-asset-alt="IVM-GDPR-3.jpg" sys-style-type="display"/></figure></span></div><p>Remember, these cards can be freely moved around, added, or removed, so let’s pull one that's particularly interesting for GDPR to the top: “Assets by Vulnerability Severity Over Time” shows how the number of critical, severe, and moderate vulnerabilities have changed over time.</p><div style="overflow: hidden"><span><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc1870b9235249076/683de0fe18a5536097687056/IVM-GDPR-4.jpg" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="IVM-GDPR-4.jpg" asset-alt="IVM-GDPR-4.jpg" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc1870b9235249076/683de0fe18a5536097687056/IVM-GDPR-4.jpg" data-sys-asset-uid="bltc1870b9235249076" data-sys-asset-filename="IVM-GDPR-4.jpg" data-sys-asset-contenttype="image/jpeg" data-sys-asset-alt="IVM-GDPR-4.jpg" sys-style-type="display"/></figure></span></div><p>Every card in InsightVM can be filtered using a list of granular filters for anything from specific software detected on a system to open ports and tags. Since we have already tagged all of our GDPR systems as “very critical” using InsightVM’s criticality tags, we can filter this card down to just those assets by expanding the card and using the filter asset.tags STARTS WITH "very high".</p><div style="overflow: hidden"><span><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltbc3ef3f5544a0a10/683de12330073ee507eb186b/IVM-GDPR-5.jpg" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="IVM-GDPR-5.jpg" asset-alt="IVM-GDPR-5.jpg" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltbc3ef3f5544a0a10/683de12330073ee507eb186b/IVM-GDPR-5.jpg" data-sys-asset-uid="bltbc3ef3f5544a0a10" data-sys-asset-filename="IVM-GDPR-5.jpg" data-sys-asset-contenttype="image/jpeg" data-sys-asset-alt="IVM-GDPR-5.jpg" sys-style-type="display"/></figure></span></div><p>The best part? Now that we’ve done this once, we can click on “Save Filter” to save and easily apply this filter to the rest of the cards in our dashboard, giving us a true GDPR compliance dashboard with just a few minutes of work.</p><div style="overflow: hidden"><span><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt65375e913aad2863/683de149cc60423df82067c0/IVM-GDPR-6.jpg" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="IVM-GDPR-6.jpg" asset-alt="IVM-GDPR-6.jpg" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt65375e913aad2863/683de149cc60423df82067c0/IVM-GDPR-6.jpg" data-sys-asset-uid="blt65375e913aad2863" data-sys-asset-filename="IVM-GDPR-6.jpg" data-sys-asset-contenttype="image/jpeg" data-sys-asset-alt="IVM-GDPR-6.jpg" sys-style-type="display"/></figure></span></div><p>Want additional GDPR compliance tips and tricks? Check out our <a href="https://information.rapid7.com/gdpr-toolkit.html">GDPR toolkit</a> for help on getting ready for May 25th, and of course feel free to reach out to your friendly neighborhood sales rep or Customer Success Manager!</p><p>Not an InsightVM customer? You can <a href="/products/insightvm/download/">download a free 30-day trial today</a> to try any of the features that I covered above.</p><p><em>Want more? Get </em><a href="/blog/tag/gdpr/"><em>all our GDPR blog content here</em></a><em> or add it to your </em><a href="/blog/tag/gdpr/rss/"><em>RSS feed</em></a><em>.</em></p>]]></description>
      <link>https://www.rapid7.com/blog/post/2017/12/13/creating-a-risk-based-vulnerability-management-program-for-gdpr-with-insightvm</link>
      <guid isPermaLink="false">blt06720c0b238c6b64</guid>
      <category><![CDATA[GDPR]]></category>
      <category><![CDATA[Vulnerability Management]]></category>
      <category><![CDATA[InsightVM]]></category><dc:creator><![CDATA[Nathan Palanov]]></dc:creator>
      <pubDate>Wed, 13 Dec 2017 18:25:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt65375e913aad2863/683de149cc60423df82067c0/IVM-GDPR-6.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[GDPR Compliance Checklist: December – Assess & Review]]></title>
      <description><![CDATA[<p>With under six months to go until the <a href="/solutions/compliance/gdpr/">General Data Protection Regulation (GDPR)</a> comes into force, organizations that handle the personal data of EU citizens are preparing for this new compliance regulation. In order to help you through this new regulation, we’re creating a series of helpful blog posts to see you all the way to May 25th 2018. This GDPR-focused infographic covers the month-by-month high level topics. If you missed our <a href="/blog/post/2017/11/14/gdpr-preparation-november-form-storm/">November blog</a>, please read it first.</p><p>With holiday season now in full swing in many parts of the world it’s important that GDPR preparation doesn’t get lost in the festivities. Here are our recommendations for December.</p><h2>Assess your security program for GDPR readiness</h2><p>In order to meet the requirements of GDPR, it’s possible that your <a href="/fundamentals/security-program-basics/">security program</a> may need some changes. <a href="https://www.privacy-regulation.eu/en/32.htm">Article 32</a> of the GDPR is all about applying a level of security appropriate to the risk, which also happens to be an approach that Rapid7 has long favored. So, if you’re only running some traditional anti-virus and have a firewall poked full of holes at the gateway then you’ll definitely have some work to do, but even if you have a top-notch-weapons-grade-seven-star security program it’s still worth ensuring that your people, processes and technology are set up for GDPR success. If you’re looking for assistance with this, our strategic advisory services consultants can tailor a <a href="/globalassets/_pdfs/product-and-service-briefs/rapid7-consulting-services-brief-gdpr-readiness-assessment.pdf">GDPR readiness assessment</a> to fit your needs.</p><h2>Uncover shadow IT services</h2><p>If you’ve read the <a href="/blog/post/2017/11/14/gdpr-preparation-november-form-storm/">November GDPR blog</a>, you might be asking why this is getting called out again. We cannot stress the importance of this enough – you will come unstuck if you don’t get a handle on <a href="/fundamentals/shadow-it/">shadow IT</a> services. From databases under desks, to unsanctioned cloud based applications, shadow IT could be hiding personal data that you’re not securing. Shadow IT tends to occur when users aren’t getting the system or service that they need to perform a task. You need to discover what’s being used and work out whether you need to provision some new services, bring currently used services into the fold so that you can secure them, or block some of them altogether. Blocking services may result in new shadow IT problems springing up, so be wary of being the Department of No.</p><h2>Perform Privacy Impact Assessments (PIAs)</h2><p><a href="https://www.avepoint.com/blog/avepoint-blog/privacy-impact-assessments-gdpr-requirement/">PIAs</a>, also known as DPIAs (no prizes for guessing what the D stands for) will help guide a lot of your GDPR decisions, so you if you haven’t already done so do start kicking these off now. And if you are a fan of things that are free, then you’ll really like <a href="https://iapp.org/resources/apia/">this tool</a> from Avepoint and the International Association of Privacy Professionals (IAPP).</p><h2>Review and update data retention policy</h2><p>With every compliance regulation since the history of having <a href="https://www.youtube.com/watch?v=Yw9GNz-EYP8">20 seconds to comply</a>, documentation is key. You likely already have a data retention policy in place (if not, then you need to get one), and so now is the time to review it and update where necessary. GDPR requires you only to keep personal data for as long as you actually need it.  And if you don’t need it any more, then purge away. Other compliances that apply to your organization are relevant here too, as their data retention requirements may already stipulate for how long you need to keep personal data. It’s worth calling out here a question that many people are already asking – what about the (misnomer-ed) “right to be forgotten”? The Internet Commisioner’s Office (ICO) in the UK have released some <a href="https://ico.org.uk/for-organisations/uk-gdpr-guidance-and-resources/">excellent guidance</a> on this topic that clarifies what the right to erasure actually entails.</p><h2>Review and update access control</h2><p>From a security point of view, limiting user access privileges to systems and information is called out in a whole host of different frameworks. When you are thinking about securing your environment for GDPR, you need to ensure only users who need access to personal data have access to that personal data, and again you need to have solid documentation covering this. It’s fair to say that not all organizations have historically had a good handle on access control. Granting application administrative privileges to a user has been a surefire way to get a helpdesk ticket closed quickly when they’ve reported an inability to perform a task. Revoking privileges when an employee leaves is another area that can sometimes be left wanting.</p><p>You also need to think about which devices can access your network, as in our BYOD world it’s relatively easy for users to transfer personal data onto a whole host of unmanaged devices. Giving your access control policies a periodic good wash and brush is something you should be doing anyway, but documentation alone doesn’t equal compliance (or security!). A myriad of technology vendors in the market today can help you solve access control challenges, such as <a href="https://www.forescout.com/">Forescout</a> for NAC and <a href="https://www.cyberark.com/">Cyberark</a> for privileged account security.</p><h2>Document your incident response processes</h2><p>Articles 33 and 34 of the GDPR bring in mandatory personal data breach notification and communication. If you are unfortunate enough to have lived through the pain of a breach, or even if you haven’t (but have no doubt lived them vicariously through the seemingly daily news reports), then you’ll know the importance of an incident response plan. Whether you’ve got a <a href="/fundamentals/security-operations-center/">security operations center</a> deep in a mountainside, or you’re an IT/Security ninja army of one, and indeed anything in between, then you need to have an <a href="/fundamentals/incident-response/">incident response</a> process in place. Remember paper, that thing we all try to avoid? It has a very valid use here – if you only have your processes in electronic format then you may not be able to access them at the time you need them most. Print off your incident response processes, and make sure you put them somewhere you can easily locate them.</p><p>Overwhelmed over the thought of building out an incident response plan at your organization? Check out our <a href="/services/managed-detection-and-response-mdr/">MDR services</a>, we would be happy to partner with you.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2017/12/04/gdpr-compliance-checklist-december-assess-review</link>
      <guid isPermaLink="false">bltbe615aedbbe8aa21</guid>
      <category><![CDATA[GDPR]]></category>
      <category><![CDATA[Compliance]]></category><dc:creator><![CDATA[Sam Humphries]]></dc:creator>
      <pubDate>Mon, 04 Dec 2017 14:15:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9e195745c9945a33/683de3a12a76869300bc8549/checklist.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[GDPR Preparation: November – Form & Storm]]></title>
      <description><![CDATA[<p>With just over six months to go until the General Data Protection Regulation (<a href="/solutions/compliance/gdpr/">GDPR</a>) comes into force, organizations that handle the personal data of EU citizens are preparing for this new compliance regulation. If you’ve not gotten started yet, or your plans are still in their infancy, we’re creating a series of helpful blog posts to see you through to May 25th 2018.</p><p>With holiday season fast approaching in many parts of the world, getting your plans off the ground now is vitally important, as January tends to come around all too quickly. Here are our recommendations for November:</p><h3>Form a cross-functional team with representation from every major group in the organization</h3><p>Although it’s a legal text, GDPR isn’t just for the legal team to worry about. It’s highly likely that every department in your organization does something with personal data. You need a senior-level representative from each area to be part of your GDPR task force. They’ll need to understand what GDPR is and how it affects their areas. Our <a href="https://www.youtube.com/watch?v=B6Dzc7_3w-k">Whiteboard Wednesday: GDPR Overview</a> covers the regulation at a high level, and <a href="https://iapp.org/resources/article/bird-bird-guide-to-the-general-data-protection-regulation/">this guide</a> from legal firm Bird & Bird provides an easily digestible walk through the regulation in more detail without needing a legal degree.</p><h3>Seek legal counsel</h3><p>If you do have your own in-house data protection legal specialists, then it’s likely you’re already way ahead in your planning. If you don’t have such a luxury within your organization, then it’s time to bring in a third party to assist. There are a plethora of law firms offering these types of services, so you shouldn’t have to look too hard.</p><h3>Determine if you need to appoint a Data Protection Officer (DPO)</h3><p>If your organization fits within one of these three categories, then you must designate a DPO:</p><ul><li>It is a public authority (except for courts acting in their judicial capacity)</li><li>It carries out large-scale systematic monitoring of individuals (e.g., online behavior tracking)</li><li>It carries out large-scale processing of special categories of data, or data relating to criminal convictions and offence</li></ul><p>The role of the DPO is to inform and advise on data protection matters; to monitor compliance and cooperate with the supervisory authority; and to act as a point of contact for the supervisory authority. This is a very senior role, but does not have to be a full time employee. There are various options available for virtual DPOs, and your legal counsel will be able to advise as to whether or not you require one.</p><h3>Map the journey of personal data into, through, and out of your ecosystem</h3><p>Firstly, it’s important to understand what is meant by “personal data”, as we’re not just talking PII here.  It’s essentially one or more pieces of data that can directly or indirectly identify a living person. <a href="https://www.i-scoop.eu/gdpr/gdpr-personal-data-identifiers-pseudonymous-information/">This article</a> explains things very well. Understanding the paths of personal data throughout your organization is the first step in applying the <a href="https://www.privacy-regulation.eu/en/5.htm">six principles of data processing</a> (aka article 5 of GDPR). <a href="/fundamentals/web-application-security/">Web applications</a> are a common entry point, as are people whose role it is to enter and update data, such as sales, marketing, customer services, technical support, etc. Look at where personal data is stored, how it gets there, and whether you use cloud-based and/or third-party applications. Now is the time, too, to start thinking about how to get a handle on unsanctioned services (aka <a href="/blog/post/2016/10/20/overcome-nephophobia-dont-be-a-shadow-it-ostrich/">shadow IT</a>). If you can’t see where personal data is going, you have no means of discovering and securing that data.</p><h3>Discover and categorize personal data</h3><p>Once you’ve worked out where and how personal data arrives, travels, is stored and leaves, then you need to understand what you have, and why you have it. This is where your task force comes into its own – the people closest to the data are the ones who should be telling you what you have. There are various tools available to help you achieve this: <a href="https://onetrust.com/">OneTrust</a> and <a href="https://www.spirion.com/">Spirion</a> are just a couple of examples.</p><h3>Contact any third-party data processors to request details of their GDPR plans</h3><p>Now is the time to reach out to any third-party providers who process personal data on your behalf. These could be financial services, cloud-based applications, storage providers, and more. As the owner of the data (the data controller in GDPR terminology), it is your responsibility to make sure you have the correct contractual agreements in place with data processors; otherwise, you could be held jointly responsible for any issues that arise under GDPR.</p><p>We also offer a GDPR Readiness Assessment that can help you understand the gaps in your current processes and technology, and will provide you with a strategic roadmap to GDPR compliance.</p><p><em>Watch the </em><a href="/blog/tag/gdpr/"><em>GDPR blog tag</em></a><em> to keep up  as we get closer to GDPR go-time.</em></p>]]></description>
      <link>https://www.rapid7.com/blog/post/2017/11/14/gdpr-preparation-november-form-storm</link>
      <guid isPermaLink="false">bltdf908735f2b887fe</guid>
      <category><![CDATA[GDPR]]></category>
      <category><![CDATA[Compliance]]></category><dc:creator><![CDATA[Sam Humphries]]></dc:creator>
      <pubDate>Tue, 14 Nov 2017 13:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9706a86328fa6160/683de0a13beff05e08a7c44d/gdpr-eu-stars.jpg" medium="image" />
    </item>
  </channel>
</rss>