article thumbnail

What Is an Insider Threat? Definition, Types, and Examples

IT Governance

The risks presented by negligent insiders are, by definition, harder to define. Brian Johnson, who had been made redundant by the paper manufacturer Georgia-Pacific after 15 years’ service, was able to use login credentials that remained valid. Definition, Types, and Examples appeared first on IT Governance UK Blog.

article thumbnail

AI governance: What it is, why you need it, and why it’s essential for your AI initiatives

Collibra

Businesses everywhere are seeking ways to leverage LLMs as fast as governments are talking about ways to regulate them. What you need is a governance model for AI. You need AI governance. So what is AI governance? Why you need AI governance The time is coming when every business that uses AI will need AI governance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 4 – 10 December 2023

IT Governance

Only 3 definitely haven’t had data breached. million LivaNova Source 1 ; source 2 (New) Manufacturing UK Yes 2.2 million LivaNova Source 1 ; source 2 (New) Manufacturing UK Yes 2.2 Source (New) Manufacturing Canada Yes 1.2 Source (New) Manufacturing Canada Yes 1.2 Organisation name Sector Location Data exfiltrated?

article thumbnail

The Week in Cyber Security and Data Privacy: 22 – 28 April 2024

IT Governance

Only 4 definitely haven’t had data breached. Source (New) Manufacturing Taiwan Yes 4,715,133 Mustafa Centre Source 1 ; source 2 (Update) Retail Singapore Yes >3,5000,000 TRAXERO Source (New) Software USA Yes 2,634,753 Piping Rock Health Products Source 1 ; source 2 ; source 3 (New) Manufacturing USA Yes 2,103,100 FBCS, Inc.

article thumbnail

The proposed EU Cyber Resilience Act: what it is and how it may impact the supply chain

Data Protection Report

The CRA introduces common cybersecurity rules for manufacturers, developers and distributors of products with digital elements, covering both hardware and software. Manufacturers of products must also comply with various requirements relating to the handling of vulnerabilities which are set out in section 2 of Annex I of the CRA.

article thumbnail

The Weeks in Cyber Security and Data Privacy: 18 – 31 December 2023

IT Governance

Only 5 definitely haven’t had data breached. TB exfiltrated Comcast Cable Communications, LLC (Xfinity) Source 1 ; source 2 (New) Telecoms USA Yes 35,879,455 Tecnoquadri Srl Source (New) Manufacturing Italy Yes 33,000,000 Asia Insurance Co. Source (New) Manufacturing USA Yes >400 GB Hafez Insurance Co.

article thumbnail

Autonomous Vehicles – Canada’s Current Legal Framework: Privacy (Part 4)

Data Protection Report

Across the globe, the race is already underway among vehicle manufacturers to develop fully autonomous vehicles (AVs). In this post, we will describe some of the risks introduced by personal information collection, and some of the legal obligations of vehicle manufacturers in protecting their customers’ privacy.

Privacy 85