Blog Posts Tagged with "Regulation"

Ac61693522e1c081485f696ae6a5fb4b

5 Cybersecurity Predictions for 2019

December 04, 2018 Added by:Joseph Carson

The year is coming to a close. Therefore, it is important to analyze developing trends and prepare for the ever-changing threat landscape.

Comments  (0)

4238fc46fe869de66700ec14d6738248

Will We Get a GDPR for the IoT?

November 28, 2018 Added by:Scott Gordon

It might then be a good idea to imbue IoT security with the kind of weight that the GDPR gives personal data.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Security Gets Messy: Emerging Challenges from Biometrics, New Regulations, Insiders

October 11, 2018 Added by:Steve Durbin

Information security professionals are facing increasingly complex threats—some new, others familiar but evolving.

Comments  (0)

21ebb461b9add7173e8e69f62ef440b4

When a Regulators’ Visit Can Be the Least of Your Worries

August 28, 2018 Added by:Jesse Canada

Companies today have a huge task on their hands with the sheer volume of red tape to demonstrate compliance.

Comments  (0)

21a45a9d0545830392fdf2b51c4d8c54

GDPR: Ignore It at Your Own Risk

May 09, 2017 Added by:Tomáš Honzák

The GDPR will change business as we know it, and the best we can do is make sure we’re prepared.

Comments  (0)

D8cfa4fbaaebcf97800b91c2c7dedd5d

Getting Your Records GDPR-Ready

August 11, 2016 Added by:Gavin Siggers

The new European General Data Protection Regulation (GDPR) will be enforced in two years, but that is a relatively short period of time for businesses to assess the new requirements, evaluate existing measures and plan a path to full compliance.

Comments  (0)

959779642e6e758563e80b5d83150a9f

Fly First Class But Pay Economy for HIPAA Compliance

January 22, 2013 Added by:Danny Lieberman

After the sanity check with the team that constructed the threat scenarios, you and your HIPAA consultant need to calculate your Value at Risk. Calculating VaR will help shed light on where to save money and where to spend money...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

GAO Invites FDA to Improve Information Security for Medical Devices

October 08, 2012 Added by:Pierluigi Paganini

In the last decade the number of cyber incidents related to technologies that surround us is growth exponentially, the principal concerns are related to all those objects with an "intelligent component" that we daily use expose on internet for different purposes...

Comments  (5)

Bd07d58f0d31d48d3764821d109bf165

Revenge of the NERCs?

October 04, 2012 Added by:Tripwire Inc

Ultimately this is critical stuff. If we don’t want to find ourselves wandering the wastelands searching for food and water fighting off marauding bands of marauders (is that redundant?) its important for these ninjas to get it right and keep the pirates at bay...

Comments  (0)

924ce315203c17e05d9e04b59648a942

An Open Letter to Senator Rockefeller

September 20, 2012 Added by:Richard Stiennon

Like in many matters involving science and technology, scientists and technologists should be brought into future deliberations on cyber legislation. The technologists that make the Internet operate and the security experts that battle to defend it need to be brought to the table...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

TPP and its Impact on Digital Freedom

September 12, 2012 Added by:Electronic Frontier Foundation

"Disciplines related to IPR could impact how people gain access to the Internet and could constrain what people may say online or how they can collaborate and share content. It is imperative that the IPR chapter of the proposed TPP agreement not inappropriately constrain online activity..."

Comments  (0)

924ce315203c17e05d9e04b59648a942

There is No Need for a Cybersecurity Executive Order

September 11, 2012 Added by:Richard Stiennon

Forcing utility operators, banks, and earth resources companies to comply with frameworks based on outmoded asset and vulnerability methodologies will distract them from implementing threat based defenses. The Executive Order, if issued, will do much more harm than good...

Comments  (2)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Maine Supreme Court Affirms Smart Meter Opt-Out Program

September 09, 2012 Added by:David Navetta

Maine has been one of the most aggressive states to pursue widespread implementation of smart utility meters for customers throughout the state, but not all utility customers have embraced smart meters despite consumers concerns over privacy issues...

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

eVoting Gets Real

September 03, 2012 Added by:Alan Woodward

Having written about the characteristics of reliable e-voting systems in Scientific American recently it is interesting to see that officials are now working hard to implement it.

Comments  (0)

924ce315203c17e05d9e04b59648a942

Is an International Cyber Regulatory Agency Needed?

August 30, 2012 Added by:Richard Stiennon

An international treaty and regulatory body will not gain much traction in the military academies and think tanks around the world. Why restrict a nation’s options in war fighting – especially when cyber weapons are inexpensive and could reduce the overall level of force required to achieve an end goal?

Comments  (2)

959779642e6e758563e80b5d83150a9f

Ultimate Breach of Patient Privacy: Real-Time Death on Video

August 29, 2012 Added by:Danny Lieberman

As social media becomes part of the continuum of interaction in the physical and virtual worlds, privacy becomes an issue of discretionary disclosure control. Online privacy and patient privacy will evolve into a market for products and services with stratified pricing, packaging and product positioning...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »