HackDig : Dig high-quality web security articles for hacker

3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020

During 2019, new privacy laws were introduced, and many current laws evolved in the United States and across the global landscape. With the General Data Protection Regulation (GDPR) in full effect, we saw expensive fines levied upon companies that fell victim to data privacy breaches. As we move into a new year, probably the biggest takeaway from 2019 is tha
Publish At:2020-02-12 10:40 | Read:191 | Comments:0 | Tags:Data Protection Government Automation Compliance Data Breach

Assessment Frameworks for NIS Directive Compliance

According to the NIS Directive, Member States should adopt a common set of baseline security requirements to ensure a minimum level of harmonized security measures across EU and enhance the overall level of security of operators providing essential services (OES) and digital service providers (DSP).The NIS Directive sets three primary objectives:to improve t
Publish At:2020-02-09 10:21 | Read:98 | Comments:0 | Tags:Regulatory Compliance compliance dps ENISA NCSC NIS OES

11 Stats on CISO Spending to Inform Your 2020 Cybersecurity Budget

The global average cost of a data breach is now $3.92 million — a 12 percent increase since 2014. Fortunately, the average cybersecurity budget is also increasing alongside breach cleanup costs. How to prioritize your budget is never a simple question. However, there’s a lot of insight to be gleaned from industry studies on how chief information secur
Publish At:2019-10-18 10:20 | Read:645 | Comments:0 | Tags:CISO Business Continuity Chief Executive Officer (CEO) Chief

Stay Calm, Your Incident Response Is Ready

Historically speaking, having a plan of attack has gotten a bad rap. Helmuth von Moltke the Elder, who famously said, “No plan survives contact with the enemy,” shared that sentiment with a predecessor in war, Napoleon Bonaparte, who said, “I never had a plan of operations.” Eisenhower warmed up to planning a bit: “In preparing
Publish At:2019-10-18 10:20 | Read:596 | Comments:0 | Tags:Incident Response C-Suite Cost of a Data Breach Cyber Resili

The Current State of CCPA – What You Need to Know

In the digital age, more often than not, you can be sure that some enterprise has hold of your personal information. This information could be your name, email, phone number, IP address, country and other details. This can come from submitting a form, subscribing to a newsletter, accepting cookies, accepting the privacy policy or terms and conditions when cr
Publish At:2019-10-18 10:10 | Read:479 | Comments:0 | Tags:Regulatory Compliance CCPA consumer rights GDPR

What is NEI 08-09?

Most organizations with industrial control systems (ICS) fall into one of two categories: regulated and non-regulated. For those subject to government imposed regulatory requirements, the selection of a cybersecurity framework is obviously compelling. Such is the case with the nuclear energy industry and NEI 08-09.The nuclear energy industry is one of the sa
Publish At:2019-10-18 10:10 | Read:409 | Comments:0 | Tags:ICS Security Regulatory Compliance ics NEI 08-09 nuclear

NIST SP 1800-23, Energy Sector Asset Management: Securing Industrial Control Systems

Industrial organizations face a growing list of digital threats these days. Back in April 2019, for instance, FireEye revealed that it had observed an additional intrusion by the threat group behind the destructive TRITON malware at another critical infrastructure. This discovery came less than two years after the security firm discovered an attack in which
Publish At:2019-10-18 10:10 | Read:538 | Comments:0 | Tags:ICS Security Regulatory Compliance Energy Sector NIST

Getting a Grip on GDPR: The Secret Is Knowing Where to Begin

An old friend once gave me some really valuable advice about reaching a goal. He said that you can’t get to where you’re going if you don’t know where you are. Over the years, I’ve found that to be true in a lot of situations. But I think it’s especially fitting in discussing GDPR readiness. Know Where You Stand With GDPR Readin
Publish At:2017-11-06 09:40 | Read:4856 | Comments:0 | Tags:Data Protection Compliance Cybersecurity Legislation Data Pr

Think You Have Plenty of Time to Plan for GDPR? Think Again

We all do it. We look at a deadline that’s months away and we tell ourselves we’ve got lots of time to think about it. In fact, that’s probably what you thought when you first heard about the European Union (EU) General Data Protection Regulation (GDPR), which takes effect May 25, 2018. Even now, it’s still months away — right? So w
Publish At:2017-09-12 13:50 | Read:3757 | Comments:0 | Tags:Banking & Financial Services Data Protection Compliance Data

Board Directors Need to Get Involved With Cyber Risk Governance

Board directors are under a lot of pressure. They know that it’s only a matter of time before their organization suffers a cyber incident, and all eyes will naturally be on the directors themselves to see if they were properly exercising their risk oversight. Directors also know that all interactions with the CISO will be subject to close scrutiny in t
Publish At:2017-08-24 16:50 | Read:3475 | Comments:0 | Tags:CISO Risk Management Cyber Risk Cybersecurity Cybersecurity

Make Attorney-Client Privilege Part of Your Incident Response Strategy

According to Forrester, business and technology leaders often dismiss lawyers as obstacles to productivity. Many security teams fail to fully engage legal with incident response planning because: Lawyers are often seen as risk-averse, disengaged advisors. It’s difficult to know whether you’re talking to the right lawyer. There is a widespread b
Publish At:2017-08-01 18:05 | Read:2560 | Comments:0 | Tags:Incident Response Risk Management Incident Response (IR) reg

Achieve the Ultimate Data Protection for Your Trusted Digital Experience

The industry just gained another ally in the global fight against cybercrime with the launch of the new IBM z14 mainframe. With close to 70 percent of the world’s largest businesses — including those in banking, health care, insurance and retail — running on mainframes, IBM z not only increases power and speed to handle enormous transactions, but also
Publish At:2017-07-17 19:15 | Read:4471 | Comments:0 | Tags:Mainframe Compliance Data Privacy Data Protection Encryption

Companies Around the World are Ramping Up for the GDPR — Is Yours?

This is the first installment in a two-part series. The General Data Protection Regulation (GDPR) is coming. It’s a wide-ranging law that requires both heightened protection for personal data and thorough notification to any European Union (EU) data subject whose personal data is breached. This applies to living individuals on EU soil, both citizens
Publish At:2017-07-10 21:30 | Read:2827 | Comments:0 | Tags:Data Protection Compliance Data Privacy Data Security Genera

In Search of Equilibrium: Compliance and Security

The Moody Blues searched for the “Lost Chord,” Captain Kirk searched for Spock and the “In Search Of” television show sought to solve unexplained mysteries. Similarly, IT and security professionals are always searching for solutions that can balance myriad standards and regulations against a continuously evolving threat landscape. A
Publish At:2017-06-21 17:10 | Read:3119 | Comments:0 | Tags:Data Protection Compliance Data Privacy immune system Privac

Compliance Does Not Always Cure Health Care Security Woes

For organizations in highly regulated sectors such as health care, compliance with regulatory standards is not just a good idea; it’s the law. Moreover, there is a broad consensus that the regulatory standards are soundly based on security principles. Complaints about excessive or misguided regulations are not often heard. But the flip side of this r
Publish At:2017-05-14 01:10 | Read:3069 | Comments:0 | Tags:Data Protection Health Care Compliance Data Privacy Endpoint

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud