February 2, 2023
Via: TechRadarNetflix seemingly hasn’t decided what its password-sharing rules should be, as it’s recently made changes to those rules, only to revert to its original ones almost immediately. If you’ve somehow missed it over the past year or so, Netflix has […]
September 11, 2018
Via: Security WeekGoogle is going to Europe’s top court in its legal fight against an order requiring it to extend “right to be forgotten” rules to its search engines globally. The technology giant is set for a showdown at the European Union […]
June 7, 2018
Via: Dark ReadingColorado has enacted a new data breach notification law that contains some of the most stringent requirements in the US. If your company has customers in Colorado, get ready to revamp your policies notifying victims of a data breach. Last […]
February 20, 2017
Via: Security AffairsOn Thursday, the New York state announced that a cyber security regulation will take effect on March 1st. The regulations will require financial institutions and insurers to meet minimum cyber security standards and report cyber incidents to regulators. The organizations subject […]
January 6, 2017
Via: InfoWorldOdds are, software (or virtual) containers are in use right now somewhere within your organization, probably by isolated developers or development teams to rapidly create new applications. They might even be running in production. Unfortunately, many security teams don’t yet […]
November 3, 2016
Via: Naked SecurityJust over a week ago the US Federal Communications Commission (FCC) imposed new privacy rules for ISP customers. The rules aimed to give customers better control, more privacy and stronger security over their data. But, while the rules imposed restrictions […]
October 7, 2016
Via: Help Net SecurityA preliminary study involving 40 computer users of different ages, occupations, and living in different settings has shown what most of use already know to be true: security fatigue is a real thing. Security fatigue – weariness from dealing with […]
September 21, 2016
Via: Computer WeeklyCyber security and privacy protections are among key safety considerations makers of self-driving cars will be required to meet under a recently published US government policy. The US Department of Transportation’s 15-point safety assessment for self-driving cars aims to control […]
August 2, 2016
Via: SC MagazineThe U.S. Department of Homeland Security (DHS) has issued guidelines to help organizations properly report cyber incidents to the proper federal office. Cyber Incident Reporting covers everything from defining what constitutes a cyber incident to when it is time to […]
July 29, 2016
Via: Security WeekThe European Union is expected to propose tighter rules on the export of dual-use technologies in September. The Union has been embarrassed by evidence that surveillance technology from companies such as Germany’s FinFisher GmbH and Italy’s Hacking Team have been used […]
June 21, 2016
Via: The HillThe nations behind an export agreement are meeting to discuss a controversial cybersecurity provision. The 41 countries that are part of the Wassenaar Arrangement gathered in Vienna on Monday to review a number of changes to the agreement, which is […]
April 8, 2016
Via: The HillSen. Ed Markey (D-Mass.) on Thursday introduced a bill to create strict cyber-security standards for the aviation industry as it increasingly becomes a target for hackers and cyber spies. The legislation follows up on Markey’s investigation into the security practices […]
January 4, 2016
Via: The HillLawmakers pushing for global cyberspace norms have scored an early win. The major cyber-security bill that President Obama signed into law two weeks ago includes a clause requiring the State Department to publicly produce an international cyberspace policy within 90 […]
December 21, 2015
Via: CIOIt may have been easy for Congress on Friday to approve the Cybersecurity Information Sharing Act (CISA), despite past controversy around it. This bill does not hike federal spending or impose sweeping regulatory rules. Its main feature is something many […]
December 14, 2015
Via: Help Net SecurityTurn the Cyber Kill Chain against your attacker Created by Lockheed Martin, the “Cyber Kill Chain” model has traditionally been used to describe the evolving stages of a cyber attack. However, if this model is applied to internal security processes […]
September 21, 2015
Via: Cyber WarfareThe #pentagon‘s chief information officer is calling for an international set of “#rules of engagement” for cyber #warfare. “Rules of the road that apply whether you are inside #dod or frankly if you are on your own [computer] system,” explained […]
September 10, 2015
Via: Cyber Warfare#democrats on the #house intelligence committee on Thursday urged #intelligence community leaders to help create international ####rules of engagement, similar to the Geneva Conventions, for cyber warfare. “We don’t know what constitutes an act of war, what the appropriate response […]
August 2, 2015
Via: vulnerabilitiesIn spite of self-congratulatory pats on the back from several corners of the security world, this week’s decision from the Commerce Department’s Bureau of Industry and Security (BIS) to rewrite the proposed U.S. implementation of the Wassenaar Arrangement rules was […]