HackDig : Dig high-quality web security articles for hacker

3 Trends in Data Privacy Breach Laws That Will Carry Over to 2020

During 2019, new privacy laws were introduced, and many current laws evolved in the United States and across the global landscape. With the General Data Protection Regulation (GDPR) in full effect, we saw expensive fines levied upon companies that fell victim to data privacy breaches. As we move into a new year, probably the biggest takeaway from 2019 is tha
Publish At:2020-02-12 10:40 | Read:218 | Comments:0 | Tags:Data Protection Government Automation Compliance Data Breach

Cybersecurity and data protection in 2019: the BH Consulting year in review (part 1)

It’s that time of year again, where we look back at, and reflect on, the previous 12 months. In that spirit, here’s the BH Consulting review of 2019. The roundup we present is our take on cybersecurity, data protection and privacy issues.  As regular readers will know, we don’t aim to be a website of record when it comes to chronicling the latest malware out
Publish At:2020-02-12 07:25 | Read:204 | Comments:0 | Tags:Cybersecurity Data Protection

We are hiring – Data Protection Consultant

Due to market growth and continued expansion, BH Consulting is looking to augment its growing DPO-as-a-service team by hiring a new Data Protection Consultant. The candidate is passionate about data protection and is keen to demonstrate this. The candidate has at least 5 years experience in data protection or IT data project management, and is likely to be c
Publish At:2020-02-12 07:25 | Read:131 | Comments:0 | Tags:Data Protection Information Security Standards

Cybersecurity and data protection in 2019: the BH Consulting year in review (part 2)

Security is a busy field, and 2019 was no exception. Following last week’s blog looking back at the first six months of the year, here’s the second part covering cybersecurity, data protection and privacy stories that emerged between July and December.  July Summertime and the living wasn’t easy if your company was called BA or Marriott. The UK Information C
Publish At:2020-02-12 07:25 | Read:64 | Comments:0 | Tags:Cybersecurity Data Protection Information Security Standards

Absent incident response spells trouble for Travelex

In an ideal world, humans would only ever learn from doing things right, but failure is a persistent teacher. That’s why for every Norsk Hydro or Maersk competently and professionally handling major security incidents, there’s also a Travelex. In this blog, we dig into why the world’s largest foreign exchange company has become the latest cyber scapegoat. We
Publish At:2020-02-12 07:25 | Read:162 | Comments:0 | Tags:Cybersecurity Data Protection

Beauty and the Breach: Estée Lauder Exposes 440 Million Records in Unprotected Database

Cosmetic company Estée Lauder exposed 440 million records to the Internet in a database that was left accessible without proper protection, a security researcher says.Headquartered in New York, Estée Lauder sells products in more than 135 countries and territories. The Estée Lauder Companies owns multiple internationally renowned brands. The exposed dat
Publish At:2020-02-11 18:48 | Read:126 | Comments:0 | Tags:NEWS & INDUSTRY Incident Response Data Protection

Firefox 74 Will Disable TLS 1.0 and TLS 1.1 by Default

Beginning March, when Firefox 74 is set to arrive in the release channel, Mozilla will disable older Transport Layer Security (TLS) protocol versions as default options for secure connections.An improvement over the Secure Sockets Layer (SSL) protocol, TLS is meant to improve the security of the Web, but flaws and weaknesses in older iterations, specifically
Publish At:2020-02-11 11:26 | Read:233 | Comments:0 | Tags:NEWS & INDUSTRY Security Architecture Data Protection Ma

Israel's Likud Party Exposed Details of Over 6 Million Voters

An election application used by Israel’s Likud party has exposed the personal information of over 6 million voters.Likud, the party of Israeli Prime Minister Benjamin Netanyahu, has contracted a company named Feed-b to create an election management system called Elector, which has been advertised as highly secure.Developer and journalist Ran Bar-Zik discover
Publish At:2020-02-10 09:36 | Read:136 | Comments:0 | Tags:NEWS & INDUSTRY Identity & Access Vulnerabilities Da

Why 2020 Will Be the Year Artificial Intelligence Stops Being Optional for Security

Artificial intelligence (AI) isn’t new. What is new is the growing ubiquity of AI in large organizations. In fact, by the end of this year, I believe nearly every type of large organization will find AI-based cybersecurity tools indispensable. Artificial intelligence is many things to many people. One fairly neutral definition is that it’s a bran
Publish At:2020-02-09 10:30 | Read:178 | Comments:0 | Tags:Artificial Intelligence Data Protection Identity & Access di

What Leadership Qualities for CISOs Are Most Important in 2020?

Organizations today have to balance the need for continuous evolution along the digital continuum with the need to protect their data and operations and keep cyber risk at an acceptable level. The chief information security officer (CISO) role is uniquely positioned to help organizations manage those dualities, but it requires a different set of leadership q
Publish At:2020-02-09 10:30 | Read:87 | Comments:0 | Tags:CISO digital trust Business Continuity C-Suite Chief Informa

Irish Regulator Probes Google, Tinder Over Data Processing

Irish regulators have launched separate inquiries into Google and dating app Tinder over how they process user data, in a new round of regulatory scrutiny aimed at tech companies.Ireland’s Data Protection Commission said Tuesday that it decided to look into how Google handles location data after a number of consumer groups across the European Union filed com
Publish At:2020-02-05 10:15 | Read:146 | Comments:0 | Tags:NEWS & INDUSTRY Privacy Compliance Data Protection Priva

AI-based Document Classification Firm Concentric Emerges From Stealth

Concentric Emerges from Stealth with AI Document Classification Product and $7.5 Million Seed FundingUnstructured documents -- especially those that have been given wrong or no sensitivity classification -- are among the most difficult assets for any enterprise to track and secure. Problems come from staff inappropriately sharing and insecurely storing docum
Publish At:2020-01-30 22:15 | Read:193 | Comments:0 | Tags:NEWS & INDUSTRY Data Protection

Leaked Report Shows United Nations Suffered Hack

The United Nations has been hacked.An internal confidential document from the United Nations, leaked to The New Humanitarian and seen by The Associated Press, says that dozens of servers were “compromised” at offices in Geneva and Vienna.Those include the U.N. human rights office, which has often been a lightning rod of criticism from autocratic governments
Publish At:2020-01-29 12:00 | Read:203 | Comments:0 | Tags:NEWS & INDUSTRY Incident Response Data Protection

Data Privacy Day 2020: 4 Ways to Protect Your Data

Data Privacy Day 2020: 4 Ways to Protect Your Data January 28th, 2020 No Comments Data Privacy, Data Protection, Online Privacy With the rollout of the California Consumer Privacy Act this month, many people wonder what data protection means, and wh
Publish At:2020-01-28 10:05 | Read:468 | Comments:0 | Tags:Data Privacy Data Protection Online Privacy california consu

German Privacy Watchdog Investigates Clothing Retailer H&M

A German privacy watchdog says it has opened an investigation into clothing retailer H&M amid evidence that the Swedish retailer had committed “massive data protection breaches” by spying on its customer service representatives in Germany.Hamburg’s data protection commissioner said in a statement Monday that a hard drive containing about 60 gigabytes of
Publish At:2020-01-27 22:15 | Read:328 | Comments:0 | Tags:NEWS & INDUSTRY Privacy Data Protection Privacy & Co


Share high-quality web security related articles with you:)


Tag Cloud