Advertisement
Top

Tag: policy


Threats & Malware, Vulnerabilities

Volkswagen Fires Cybersecurity Whistleblower

January 26, 2022

Via: SecureWorld

While sometimes controversial, whistleblowers have the potential to save an organization from millions of dollars in losses, public backlash, or government regulation—unless they are treated with disrespect and not taken seriously. In September 2021, a senior employee at Volkswagen tried […]


Network security, Security

Policy and patience key in Biden’s cybersecurity battle

September 24, 2021

Via: Help Net Security

Last month, President Biden hosted a group of technology and insurance executives to build support for a “whole-of-nation effort” to improve cybersecurity. The executive summit was one of a series of steps the Biden administration has taken to try to […]


Mobile, Privacy protection

AT&T, T-Mobile, Sprint, Verizon Blasted For Data Privacy Policies

August 13, 2019

Via: Threat Post

A U.S. senator has put telecommunication companies – AT&T, T-Mobile, Sprint and Verizon – on notice for their data collection and retention policies. Last week, U.S. Senator Ron Wyden (D-Ore.) sent an open letter to the CEOs of the four […]


Network security

Nearly half of firms suffer data breaches at hands of vendors

April 24, 2019

Via: Help Net Security

As trusted partners, third-party vendors often become an overlooked or unwitting accomplice in criminal activities. As privacy laws and cybersecurity regulations continue to increase accountability around data confidentiality and protection, eSentire wanted to know how seriously firms take the risks […]


Access control

85% of organizations fail to meet even basic PAM security hygiene

April 5, 2019

Via: Help Net Security

While nearly four out of five organizations (78 percent) now include privileged credential protection as part of their cybersecurity policies, their privileged access management (PAM) security practices are woefully lacking and even worse than you might expect. Eighty-five percent are […]


Privacy protection

Senate Panel to Hear From Internet Execs on Privacy Policies

September 26, 2018

Via: Security Week

The Trump administration is hoping Congress can come up with a new set of national rules governing how companies can use consumers’ data that finds a balance between “privacy and prosperity.” But it will be tricky to reconcile the concerns […]


Network security

3 Tips for Driving User Buy-in to Security Policies

June 18, 2018

Via: Dark Reading

Teaching users why it’s important to commit to security controls is a far more effective strategy than simply demanding that they follow them. Here’s how. IT usage and security policies can be an annoyance for employees who simply see them […]


Network security

Trump, senators headed for clash on cyber policy

June 12, 2018

Via: The Hill

Senators are barreling toward a clash with the Trump administration over how to deter and respond to cyberattacks. The Senate is taking up annual defense policy legislation this week that would set a national policy for cybersecurity and cyber warfare, […]


Mobile security, Vulnerabilities

Facebook Defends Against Device-Integrated APIs Policy, But Concerns Remain

June 5, 2018

Via: Threat Post

Facebook is hitting back against a New York Times article alleging that it struck deals enabling phone-makers to access users’ personal information. The incident is yet another blow to the social media giant as it continues to deal with questions […]


Cyber warfare

Trump sends cyber warfare strategy to Congress

April 20, 2018

Via: The Hill

President Trump has sent to Congress a long-awaited report on U.S. policy for deterring and responding to attacks in cyberspace. The policy was sent to the House and Senate committees with oversight of the departments of State, Homeland Security, Defense […]


Privacy protection

Facebook Data Privacy Policies Bashed By Critics After Cambridge Analytica Incident

March 20, 2018

Via: Threat Post

Facebook is in hot water after acknowledging that a consulting group – that has worked on several high profile political campaigns, including that of President Donald Trump’s – used the social media company’s platform to harvest the data of 50 […]


Cloud security

Google Updates Cloud Access Management Policies

October 4, 2017

Via: Dark Reading

Custom roles for Cloud Identity and Access Management will give users full control of 1,287 public permissions in the Google Cloud. Google today released a beta version of custom roles for Cloud Identity and Access Management (IAM) on the Google […]


Vulnerabilities

Components of an effective vulnerability management process

October 12, 2016

Via: Help Net Security

Vulnerabilities continue to grab headlines. Whether it is a zero-day that affects “tens of millions” servers around the globe or an old unpatched flaw that leads to a data compromise, we will keep reading about them. The modern security landscape […]


Network security

Dems oppose data localization in draft platform

July 4, 2016

Via: The Hill

The Democratic National Committee carves out a stance against data localization requirements in the party’s draft platform, released Friday. The draft calls for greater “access to global markets for American intellectual property and other digital trade by opposing quotas, discriminatory […]


Data loss

Data Loss Prevention: Make It Work

January 27, 2016

Via: Security Week

As the name implies, DLP is about preventing loss or misuse of data. By various means, including content discovery and analysis, it helps preclude end users from accidentally or maliciously sharing sensitive, critical, and confidential data that might put a […]


Privacy protection, Security

Kicking Off A New Era For Policing Cybersecurity

November 4, 2015

Via: Dark Reading

In the wake of FTC v. Wyndham, government agencies are becoming more aggressive about protecting corporate data and customer privacy. But the new rules are very much a work in progress. It’s an unquestionable fact that our industry’s current state […]


Application security

Spotify explains its new “give us your data” policy

August 24, 2015

Via: application-security

Even a small modification might be a change you don’t like, such as a shift from “we won’t share your data with anyone else” to “now we’ve been acquired, we will allow our new parent company to use some of […]


Editorial, Security

The business payment security survival guide

July 29, 2015

Via: Russel Edwards

A business payment security survival guide is a useful tool for small businesses. Anyone looking to start an online store, or already established businesses trying to countercheck or improve their security procedures could benefit from such information. When outsourcing the […]


Privacy protection

Uber to tweak privacy policy so it can better understand you and your friends

May 28, 2015

Via: privacy-protection

Uber Technologies is set to tweak its #privacy #policy so it can access a rider’s location when the Uber app is running in the background. The change in policy will also allow it to send special offers to users’ friends and […]