article thumbnail

SEC Announces Settled Charges Against First American for Cybersecurity Disclosure Controls Failures – Lessons Learned

Data Matters

The SEC is considering enhancing its disclosure rules concerning cybersecurity risk governance and has indicated a target release date of October 2021. The Order alleges that this vulnerability exposed over 800 million images dating back to 2003, including sensitive personal data, such as Social Security numbers and financial information.

article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

See the Top Governance, Risk and Compliance (GRC) Tools. Other industry standards too can have the force of “pseudo-law” – notably, the NIST Cybersecurity Framework, which federal regulators often apply to financial-services firms and government contractors. PIPL Raises the Bar – And the Stakes.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Observations on the Cybersecurity Executive Order and Presidential Policy Directive

Hunton Privacy

by passing legislation to give our government a greater capacity to secure our networks and deter attacks.” Finally, the alphabet soup of agencies in the Executive Order and PPD again raise the troubling question of who is in charge when it comes to cybersecurity in the federal government.

article thumbnail

Privacy and Cybersecurity Top 10 for 2018

Data Matters

In Carpenter , the government obtained months’ worth of a suspect’s cell phone location records pursuant to the Stored Communications Act (SCA). Carpenter argues that the government is required to receive a warrant under the Fourth Amendment for his location records. A Pivot Toward Asia for Privacy and Cybersecurity Laws.

article thumbnail

FTC Seeks Comment on Proposed Changes to GLBA Implementing Rules

HL Chronicle of Data Protection

The Safeguards Rule, which originally went into effect in 2003, is process-oriented. The proposed Rule would allow the CISO to be an employee of a service provider or affiliate, although in that case the FI would be required to designate a senior member of its personnel to direct and oversee the CISO. Board reporting.

Privacy 40
article thumbnail

UNRAVELING EternalBlue: inside the WannaCry’s enabler

Security Affairs

Its exploitation can have serious consequences, resulting in data breaches, financial losses, operational disruption, and reputation damage to organizations. The widespread presence increased the potential attack surface and made it a critical concern for security professionals.

Phishing 114
article thumbnail

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

Hailing from Portland, Oregon, Exterro launched in 2004 and specialized in workflow-driven software and governance, risk, and compliance (GRC) solutions. Started in 2003 out of Boulder, Colorado, LogRhythm’s first focus and flagship product was their SIEM software.