HackDig : Dig high-quality web security articles for hacker

GDPR: An impact around the world

A little more than one month after the European Union enacted the General Data Protection Regulation (GDPR) to extend new data privacy rights to its people, the governor of California signed a separate, sweeping data protection law that borrowed several ideas from GDPR, sparking a torch in a legislative data privacy trend that has now spanned at least 10 cou
Publish At:2020-04-01 17:18 | Read:154 | Comments:0 | Tags:Government Malwarebytes news Privacy Security world Argentin

Now Is the Time to Get up to Speed with CMMC and SP 800-171 Rev 2

At the beginning of March 2020, Fifth Domain reported that Colorado-based aerospace, automotive and industrial parts manufacturer Visser Precision LLC had suffered a DoppelPaymer ransomware infection. Those behind this attack ultimately published information stolen from some of Visser’s customers. Those organizations included defense contractors Lockheed Mar
Publish At:2020-03-30 01:56 | Read:131 | Comments:0 | Tags:Government NIST 800-171 ransomware Secure Supply Chain secur

Four Important Steps to Secure the United States 2020 Election

It’s an unfortunate reality that cyber attacks on the U.S. 2020 election are likely to happen. However, while this is a potent threat to democracy, an even greater threat is to not take the necessary actions to prevent these attacks until it is too late.There are many different types of cyberattacks that the U.S. 2020 election could face.Attacks on electroni
Publish At:2020-03-10 02:17 | Read:338 | Comments:0 | Tags:Government IT Security and Data Protection cyberattack elect

A Road Map for Better Government Cybersecurity From North Dakota

Imagine the impact on the government cybersecurity landscape if the mantra for every U.S. state were something like, “Every student, every school, cyber-educated.” It’s the first I’ve heard about an objective this bold, and it comes from a state that gets little media exposure: North Dakota. The small Great Plains state has establishe
Publish At:2020-02-25 08:22 | Read:818 | Comments:0 | Tags:Government Artificial Intelligence (AI) Cybersecurity Jobs C

Municipal Cyberattacks Put Us All at Risk: What Can We Learn From Previous Attacks?

2019 was a tough year for the overall cybersecurity of state and local governments and municipal institutions. If you follow security news, there were times when not a week would go by without word of how the latest municipal cyberattacks impeded or even halted day-to-day operations. This stream of recent hacking incidents targeting government and municipal
Publish At:2020-02-21 13:22 | Read:368 | Comments:0 | Tags:Data Protection Government Cyberattacks Data Breach Healthca

U.S. Department of Defense Disclosed Data Breach at DISA

The U.S. Department of Defense (DoD) warned that a data breach at the Defense Information Systems Agency (DISA) might have compromised some individuals’ personal information.In a photograph of a letter obtained by Reuters, DISA CIO and Risk Management Executive Roger S. Greenwell warned recipients that a data breach might have compromised their persona
Publish At:2020-02-21 09:25 | Read:190 | Comments:0 | Tags:Government Latest Security News data breach Department of De

Why Threat Actors Are Increasingly Conducting Cyberattacks on Local Government

Cyberattacks on local government in the U.S. have increased dramatically over the last several years. In 2019 alone, ransomware affected more than 100 state and local governments, according to Recorded Future — and that’s just one threat vector. Municipalities are also at risk from insider threats, coordinated attacks and other perils. What is it about
Publish At:2020-02-17 18:22 | Read:362 | Comments:0 | Tags:Government Credit Card Data Cyberattacks Data Breaches Data

3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020

During 2019, new privacy laws were introduced, and many current laws evolved in the United States and across the global landscape. With the General Data Protection Regulation (GDPR) in full effect, we saw expensive fines levied upon companies that fell victim to data privacy breaches. As we move into a new year, probably the biggest takeaway from 2019 is tha
Publish At:2020-02-12 10:40 | Read:416 | Comments:0 | Tags:Data Protection Government Automation Compliance Data Breach

Cloud Security and Artificial Intelligence in the Financial Sector

I recently had the honor of testifying before the House Financial Services Committee’s Taskforce on Artificial Intelligence about two critical emerging issues in the financial services sector – cloud and artificial intelligence (AI). Both have incredible potential for energizing the financial sector, but they also raise important security concerns. Financial
Publish At:2019-12-06 16:45 | Read:731 | Comments:0 | Tags:Executive Perspectives public sector artificial intelligence

Would ‘Medicare for All’ help secure health data?

DISCLAIMER: This post is not partisan, but rather focuses on risk assessment based on history and what threats we are facing in the future. We do not endorse any healthcare plan style in any way, outside of examining its data security risk. For many folks, the term ‘Healthcare for All’ brings up an array of emotions ranging from concern to happiness, and
Publish At:2019-11-26 21:50 | Read:1220 | Comments:0 | Tags:Government Privacy Security world adam kujawa AMCA American

What Can We Learn From the ‘Global State of Information Security Survey 2018’?

In October 2018, PricewaterhouseCoopers (PwC) released the latest edition of “The Global State of Information Security Survey.” For this report, the professional services firm surveyed over 9,000 leaders, including CEOs, chief financial officers (CFOs), chief information officer (CIOs) and chief information security officers (CISOs), from 122 cou
Publish At:2017-11-02 13:10 | Read:4736 | Comments:0 | Tags:Risk Management Chief Information Officer (CIO) Chief Inform

Cybersecurity Strategy, Risk Management and List Making

When confronted with the daunting task of developing a cybersecurity strategy, many people don’t know where to start. The quick answer is to make a list of the tasks required to accomplish the project, organize them by functional categories and determine what resources need to be brought together to accomplish the tasks on the list. This might seem lik
Publish At:2017-10-03 08:40 | Read:4577 | Comments:0 | Tags:CISO Government Risk Management Cybersecurity Cybersecurity

e-Signature Security Speeds Government Paperwork Along

As public administrators have learned, efficiency in government is largely a matter of executing the small things well. A saved mailing expense or avoided delay can add up to a lot more work for a lot less tax money, which is one practical definition of good government in action. One example of this process is a current U.S. Census Bureau initiative to imple
Publish At:2017-09-11 19:25 | Read:7165 | Comments:0 | Tags:Data Protection Fraud Protection Government Authentication D

Government Agencies Must Work With the Private Sector to Bolster Infrastructure Security

Securing data is never easy. It often requires the infusion of outside expertise to put together an effective information security strategy. Data stored on government servers is especially valuable to both individual fraudsters and nation-state actors, and government agencies have been under pressure to enhance their infrastructure security capabilities and
Publish At:2017-08-18 13:25 | Read:4327 | Comments:0 | Tags:Data Protection Government Cybersecurity Cybersecurity Frame

The Godfathers of Virtualization Returning to VMWorld

Ian Pratt and Simon Crosby sold XenSource to Citrix in 2007. After working at Citrix, they decided to once again spin off and focus on cybersecurity. They are available to meet during VMWorld if you’d like to talk virtualization and security. We think of them as The Godfathers of Virtualization. They work they did with XenSource lead to what is today’s clo
Publish At:2017-08-15 17:35 | Read:5211 | Comments:0 | Tags:Company News application isolation browsing click cybersecur

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud