Remove 10
Remove 2001 Remove 2017 Remove Government Remove Security
article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

This week, in our last podcast of the year, we revisit some of the biggest information security stories from the past 12 months. Hello and welcome to the final IT Governance podcast of 2018. The year started with the revelation of Spectre and Meltdown – major security flaws affecting processors manufactured by Intel, ARM and AMD.

article thumbnail

A Cyber Insurance Backstop

Schneier on Security

In the first week of January, the pharmaceutical giant Merck quietly settled its years-long lawsuit over whether or not its property and casualty insurers would cover a $700 million claim filed after the devastating NotPetya cyberattack in 2017. 11, 2001, terrorist attacks. The 9/11 attacks cost insurers and reinsurers $47 billion.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Identity-based Cryptography

Thales Cloud Protection & Licensing

out of 5 stars on Chrome web store, 9 out of 10 pairs of participants failed to complete the assigned task of exchanging encrypted emails, i.e. 90% failure rate. The first practical IBE scheme was given by Boneh and Franklin [7] in 2001 using bilinear pairing on elliptic curves. This type of scheme (e.g., [8,9])

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Take the example of the pandemic: only some governments engaged pandemic experts to develop actions plans. Commissioned by organizers to predict worst-case scenarios for the Munich games, [Georg] Sieber came up with a range of possibilities, from explosions to plane crashes, for which security teams should be prepared.

article thumbnail

Extended Validation Certificates are Dead

Troy Hunt

Here are the world's 10 largest sites: no EV! pic.twitter.com/IYf2Km4LkD — Troy Hunt (@troyhunt) July 14, 2017. Despite this, Comodo suggests there's value in EV because of the "bigger security display": The larger security indicator makes it very clear to the user that the website is secure.

Marketing 109
article thumbnail

NIAC Issues Recommendations to Improve Critical Infrastructure Cybersecurity

Hunton Privacy

On August 22, 2017, the National Infrastructure Advisory Council (“NIAC”) issued a report entitled Securing Cyber Assets: Addressing Urgent Cyber Threats to Critical Infrastructure (“NIAC Report”). Relatedly, President Trump’s recent E.O. Relatedly, President Trump’s recent E.O.