Remove 2001 Remove Events Remove Security Remove Video
article thumbnail

Article 29 Working Party Releases Opinion on Data Processing at Work

Hunton Privacy

Employers should refrain from the use of facial recognition technologies in the context of video analytics at the workplace, as this may be deemed disproportionate. In addition, event data recorders used to prevent accidents should not result in the continuous monitoring of the employee driver.

article thumbnail

Ross Anderson

Schneier on Security

Of course it was before 2008, when we created the Security and Human Behavior workshop. It was well before 2001, when we created the Workshop on Economics and Information Security. He was a cryptographer and security engineer, but also very much a generalist. Also note his fifteen-lecture video series on that same page.

Paper 114
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: The back story on the convergence, continuing evolution of endpoint security

The Last Watchdog

The technology that corrals malicious software circulating through desktop PCs, laptops and mobile devices has evolved into a multi-layered security technology referred to as ‘endpoint security.’. What’s more, they’ve all successfully grown into multi-layered full-service endpoint security suppliers. keep intensifying.

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Naturally, database vendors are leading providers of database security tools, and a growing number of cloud-based database providers are moving deeper into the data security space. Security is paramount. Starting our list of the top database security vendors is the multinational cloud computing company, Alibaba Cloud.

Security 116
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

“Commissioned by organizers to predict worst-case scenarios for the Munich games, [Georg] Sieber came up with a range of possibilities, from explosions to plane crashes, for which security teams should be prepared. Latson 2014) Unfortunately, the events unfolded almost exactly like the scenario in Situation Number 21. 2020, p 1).

article thumbnail

Extended Validation Certificates are Dead

Troy Hunt

Despite this, Comodo suggests there's value in EV because of the "bigger security display": The larger security indicator makes it very clear to the user that the website is secure. You know what makes people think the website is "secure"? back in 2001. Too long ago?

Marketing 110
article thumbnail

European Data Privacy Day Expert Panel Provides 30-Year Retrospective on UK Data Protection

Hunton Privacy

She also oversaw the introduction of the Freedom of Information Act 2000 in January 2001, for which the Commissioner’s office became responsible. The name of the office was changed to its current name (the ICO) in 2001. The Commissioner has made significant use of these powers, particularly in response to security breaches.