Blog Posts Tagged with "Regulation"
GDPR: Ignore It at Your Own Risk
May 09, 2017 Added by:Tomáš Honzák
The GDPR will change business as we know it, and the best we can do is make sure we’re prepared.
Comments (0)
Getting Your Records GDPR-Ready
August 11, 2016 Added by:Gavin Siggers
The new European General Data Protection Regulation (GDPR) will be enforced in two years, but that is a relatively short period of time for businesses to assess the new requirements, evaluate existing measures and plan a path to full compliance.
Comments (0)
Fly First Class But Pay Economy for HIPAA Compliance
January 22, 2013 Added by:Danny Lieberman
After the sanity check with the team that constructed the threat scenarios, you and your HIPAA consultant need to calculate your Value at Risk. Calculating VaR will help shed light on where to save money and where to spend money...
Comments (0)
GAO Invites FDA to Improve Information Security for Medical Devices
October 08, 2012 Added by:Pierluigi Paganini
In the last decade the number of cyber incidents related to technologies that surround us is growth exponentially, the principal concerns are related to all those objects with an "intelligent component" that we daily use expose on internet for different purposes...
Comments (5)
Revenge of the NERCs?
October 04, 2012 Added by:Tripwire Inc
Ultimately this is critical stuff. If we don’t want to find ourselves wandering the wastelands searching for food and water fighting off marauding bands of marauders (is that redundant?) its important for these ninjas to get it right and keep the pirates at bay...
Comments (0)
An Open Letter to Senator Rockefeller
September 20, 2012 Added by:Richard Stiennon
Like in many matters involving science and technology, scientists and technologists should be brought into future deliberations on cyber legislation. The technologists that make the Internet operate and the security experts that battle to defend it need to be brought to the table...
Comments (0)
TPP and its Impact on Digital Freedom
September 12, 2012 Added by:Electronic Frontier Foundation
"Disciplines related to IPR could impact how people gain access to the Internet and could constrain what people may say online or how they can collaborate and share content. It is imperative that the IPR chapter of the proposed TPP agreement not inappropriately constrain online activity..."
Comments (0)
There is No Need for a Cybersecurity Executive Order
September 11, 2012 Added by:Richard Stiennon
Forcing utility operators, banks, and earth resources companies to comply with frameworks based on outmoded asset and vulnerability methodologies will distract them from implementing threat based defenses. The Executive Order, if issued, will do much more harm than good...
Comments (2)
Maine Supreme Court Affirms Smart Meter Opt-Out Program
September 09, 2012 Added by:David Navetta
Maine has been one of the most aggressive states to pursue widespread implementation of smart utility meters for customers throughout the state, but not all utility customers have embraced smart meters despite consumers concerns over privacy issues...
Comments (0)
eVoting Gets Real
September 03, 2012 Added by:Alan Woodward
Having written about the characteristics of reliable e-voting systems in Scientific American recently it is interesting to see that officials are now working hard to implement it.
Comments (0)
Is an International Cyber Regulatory Agency Needed?
August 30, 2012 Added by:Richard Stiennon
An international treaty and regulatory body will not gain much traction in the military academies and think tanks around the world. Why restrict a nation’s options in war fighting – especially when cyber weapons are inexpensive and could reduce the overall level of force required to achieve an end goal?
Comments (2)
Ultimate Breach of Patient Privacy: Real-Time Death on Video
August 29, 2012 Added by:Danny Lieberman
As social media becomes part of the continuum of interaction in the physical and virtual worlds, privacy becomes an issue of discretionary disclosure control. Online privacy and patient privacy will evolve into a market for products and services with stratified pricing, packaging and product positioning...
Comments (1)
TPP: Don’t Let Them Trade Away Internet Freedom
August 28, 2012 Added by:Electronic Frontier Foundation
The intellectual property (IP) chapter would have negative ramifications for freedom and innovation and second, the process has shut out multi-stakeholder participation and is shrouded in secrecy. The TPP is a threat because it rewrites global rules on IP enforcement and restrict the public domain...
Comments (0)
FTC Seeks Comment on Proposed Revisions to COPPA Rule
August 27, 2012 Added by:David Navetta
The proposed modifications to the definitions of "operator" and "website or online service directed to children" address commenters’ concerns related to the use of third party advertising networks and downloadable software kits, or plug ins, that collect personal information through child-directed websites...
Comments (2)
Compliance is Not Always a Four-Letter Word
August 22, 2012 Added by:Tripwire Inc
This typical reaction I get in the US is many organizations see compliance as a “tax” and try to get away with doing the bare minimum. How do you and your organizations view compliance? Do you see it as a four-letter word, a nuisance, or as a step along the path to more effective security?
Comments (0)
Illinois Bars Employers from Obtaining Social Media Credentials
August 20, 2012 Added by:David Navetta
Although privacy advocates and federal regulators and legislators have primarily been focusing on consumer privacy issues, such as behavioral advertising and data mining, the significant changes in workplace privacy protections demand continued vigilance from employers...
Comments (1)
- SAP Cyber Threat Intelligence Report – April 2018
- Cloud Security Alert – Log Files Are Not the Answer
- Avoiding Holes in Your AWS Buckets
- The Three Great Threats to Modern Civilization
- 2020 Vision: How to Prepare for the Future of Information Security Threats
- Why Data Loss Prevention Will Suffer the Same Fate as Anti-Virus
- Unconventional Thinking — Four Practices to Help Mitigate Risk
- The Night the Lights Went out in Georgia (Almost)
- Is Blockchain Really Disruptive in Terms of Data Security?
- Half-Baked Security Approaches: What Cybersecurity Can Learn from Legal Weed