Congressional Movement on Cybersecurity in a Bill to Reauthorize the Homeland Security Act of 2002

Data Matters

Senate’s Homeland Security and Governmental Affairs Committee ­approved a bill ( SB 2825 ) reauthorizing the Homeland Security Act of 2002 and including key cybersecurity provisions affecting the Department of Homeland Security (DHS). SB 2825 also clarifies liability protections for cyber-risk mitigation through DHS’s implementation of the SAFETY Act (“Support Anti-Terrorism by Fostering Effective Technologies Act of 2002.”) On March 7, 2018, the U.S.

Risk 60

Women in Security: Assessing the Progress

Data Breach Today

Cybersecurity challenges and solutions have evolved greatly since 2002. And so has the Executive Women's Forum, which was founded that year to advance female leaders in the profession. Founder Joyce Brocaglia reflects on the forum's accomplishments and challenges


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.



2002??????????????????IT??????????????????????????????????????????????????????????2015???ServiceNow????????????????????????????????????IT????????????????????????. ????????????????????????????IT???????????ITSM?????????ServiceNow????????????IT??????????????????????????????????????????????????????????????2020?3??ServiceNow??Emergency

IT 94

Top 10 reasons to upgrade Documentum

OpenText Information Management

was released in 2002, version 6.0 Software upgrades are vital for organizations to improve performance.

NIST proposes Secure Software Development Framework


Ever since Bill Gates fired off his famous Trustworthy Computing memo in January 2002, developing secure software has been a hot topic of discussion. It was important before then, for sure, but it was often overlooked. It took a series of high-profile worms such as Code Red and Nimda and a series of breaches to […]. Security app security application security application security testing software development

Sox Management Review Controls


The Sarbanes-Oxley Act of 2002 (SOX) regards management review controls (MRCs) as one of the most pertinent internal controls. MRCs are the evaluations done on the critical financial information systems. Sponsored


President Biden Signs Two Bills Aimed at Enhancing Government Cybersecurity

Hunton Privacy

The Cybersecurity Act amends certain provisions of the Homeland Security Act of 2002. On June 21, 2022, President Biden signed into law, the State and Local Government Cybersecurity Act of 2021 (S. 2520) (the “Cybersecurity Act”) and the Federal Rotational Cyber Workforce Program Act (S.

Estonia sues Gemalto for 152M euros over flaws in citizen ID cards issued by the company

Security Affairs

Estonia replaced Gemalto and its predecessor for the supply of ID cards since 2002, with the company Idemia. Estonia had used Gemalto and its predecessor for its ID cards since 2002, but replaced the manufacturer with Idemia after it found serious security flaws last year. Estonian sues Gemalto for 152 million euros following the security flaws in the citizen ID cards issued by the company that caused their recall in 2017.

Episode 229: BugCrowd’s Casey Ellis On What’s Hot In Bug Hunting

The Security Ledger

Programs like iDefense Labs Vulnerability Contributor Program (VCP) (launched in 2002) and TippingPoint’s Zero Day Initiative (2005) were accused -at the time- of incentivizing the work of criminals and bad actors. .

Spanish police dismantled SIM swapping gang who stole money from victims’ bank accounts

Security Affairs

In 2018, the FBI Internet Crime Complaint Center (IC3) received complaints for 1,611 SIM swapping attacks, while the number of complaints in the period between 2018 e 2002 was 320 causing a total of losses of $12 million.

Better Late than Never? U.S. Bolsters Cybersecurity Ahead of Elections

Adam Levin

The grants came in the form of a special allocation from the Help America Vote Act (HAVA) of 2002. One of the most discussed topics of this year’s election cycle is how best to protect the elections themselves from hackers and other outside influence. Following the multitude of hacks , leaked emails , data breaches , and disinformation campaigns that marred the 2016 elections, Congress has allocated $380 million to states requesting cybersecurity assistance.

Paper 61

What is ArchiMate?


Originally based on IEEE 1471 , ArchiMate was developed in the Netherlands as a joint venture between private industry and the Dutch Government between 2002 and 2004.

3.4 Million user records from LiveAuctioneers hack available for sale

Security Affairs

LiveAuctioneers is one of the world’s largest art, antiques & collectibles online marketplace that was founded in 2002. Auctions platform LiveAuctioneers admitted to have suffered a data breach that likely impacted approximately 3.4 million users.

Sales 102

RSAC insights: Security Compass leverages automation to weave security deeper into SecOps

The Last Watchdog

This, in fact, was the same general approach to developing and deploying new software that existed in early 2002 when Bill Gates slammed the brakes on all Windows development to focus on implementing Trustworthy Computing. In a day and age when the prime directive for many organizations is to seek digital agility above all else, cool new apps get conceived, assembled and deployed at breakneck speed. Related: DHS instigates 60-day cybersecurity sprints.

Sarbanes-Oxley Act and Record Retention Best Practices

Armstrong Archives

The Sarbanes-Oxley Act (SOX) is a law passed in 2002 that sets forth standards for the recording and reporting of financial activities. A key part of that law involves record retention.

Why you should keep data observability separate from data cleansing


The SEC mandates this stating firms cannot be in a “ position of auditing their own work” (SOX 2002). . As a principal for data quality, I enjoy taking time to work with our customer base. Since joining Collibra, I had the privilege of speaking to over 60 companies in just a few months.

Risk 87

US citizens lost more than $68M to SIM swap attacks in 2021, FBI warns

Security Affairs

In 2018, the FBI Internet Crime Complaint Center (IC3) received complaints for 1,611 SIM swapping attacks, while the number of complaints in the period between 2018 e 2002 was 320 causing a total of losses of $12 million.

Webinar on the SAFETY Act and Cybersecurity: Protecting Your Reputation and Reducing Liability Risk

Hunton Privacy

In 2002, Congress enacted the Supporting Anti-Terrorism by Fostering Effective Technologies Act (“the SAFETY Act”) to limit the liabilities that energy, financial, manufacturing and other critical infrastructure companies face in the event of a serious cyber or physical security attack.

Organizational Accountability in U.S. Law and Its Relevance to a Federal Data Privacy Law: A CIPL Study

Hunton Privacy

Department of Justice and the Securities and Exchange Commission; The Sarbanes-Oxley Act of 2002 and Chapter Eight of the U.S. The Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP recently published a white paper on Organizational Accountability’s Existence in U.S. Regulatory Compliance and its Relevance for a Federal Data Privacy Law (the “White Paper”). The White Paper looks at the origins and applications of organizational accountability in U.S.

Paper 59

BOOK REVIEW: ‘Security Yearbook’ preserves cybersecurity history — highlights tectonic shift

The Last Watchdog

Related: The role of PKI is securing digital transformation That was in 2002. Along with Richard Stiennon , I belong to a small circle of journalists and tech industry analysts who’ve been paying close attention to cybersecurity since Bill Gates curtailed commercial work on Windows to rivet Microsoft’s attention on defending its software code.

Citrix Workspace flaw can allow remote hack of devices running vulnerable app

Security Affairs

This vulnerability affects the following supported versions of Citrix Workspace app for Windows: Citrix Workspace app for Windows 1912 LTSR Citrix Workspace app for Windows 2002.

The Belgian Constitutional Court annuls Data Retention Act

DLA Piper Privacy Matters

Authors : Heidi Waem and Gert-Jan Fraeyman. On 22 April 2021, the Belgian Constitutional Court annulled the Act of 29 May 2016 on the collection and storage of data in the electronic communications sector (the Data Retention Act).

Silent Night Zeus botnet available for sale in underground forums

Security Affairs

The name “Silent Night” Zbot is likely a reference to a weapon mentioned in the 2002 movie xXx, it was first spotted in November 2019 when a seller named “Axe” started offering it on the Russian underground forum forum.exploit[.]in.

Sales 114

The Updates Must Go Through

Adam Shostack

For example, see our Timing the Application of Security Patches for Optimal Uptime , Usenix Lisa 2002). On Monday, the Department of Justice announced that it had cleaned malware (“webshells”) off of hundreds of infected mail systems running Microsoft Exchange. Microsoft has been trying to get folks to apply critical security patches to address a problem that’s being actively exploited.

IT 46

Sharp Appoints Mike Marusic To The Position Of President And CEO, Sharp Imaging And Information Company Of America

Info Source

Mike Marusic joined Sharp in 2002 as Associate Vice President of Marketing for SIICA. Prior to joining Sharp in 2002, he headed up the marketing group for Panasonic’s copier and computer peripheral division and has over 25 years’ experience in the office technology sector.

MY TAKE: New ‘cyberthreat index’ shows SMBs cognizant of big risks, ill-prepared to deal with them

The Last Watchdog

The company got its start in 2002 in Gulf Breeze, Florida, as a two-man operation that set out to help small firms filter the early waves of email spam. Small and midsize businesses — so-called SMBs — face an acute risk of sustaining a crippling cyberattack. This appears to be even more true today than it was when I began writing about business cyber risks at USA TODAY more than a decade ago.

Risk 114

FTC Announces Significant Updates to GLB Safeguards Rule

Hunton Privacy

Promulgated in 2002 pursuant to the Gramm-Leach-Bliley Act, the Safeguards Rule obligates covered financial institutions to develop, implement and maintain a comprehensive information security program that complies with the Rule’s requirements.

Best beginner cyber security certifications

IT Governance

It was created in 2002 to meet the growing demand for qualified and specialised information professionals, and covers a range of topics, including network security, access controls, cryptography and risk management. Are you considering a career in cyber security?

Richard Thomas Selected as Chair for Guernsey’s New Data Protection Authority

Hunton Privacy

Thomas served as UK Information Commissioner from 2002 to 2009. Hunton & Williams LLP is pleased to announce that Richard Thomas , Global Strategy Advisor to the Centre for Information Policy Leadership (“CIPL”), has been selected as Chair for the Bailiwick of Guernsey’s new data protection authority.

Belgium: ePrivacy proposal in progress: Council agrees on its position to start off ‘trilogue’ negotiations

DLA Piper Privacy Matters

Authors: Heidi Waem , Alizée Stappers and Simon Verschaeve.

Microsoft announces the launch of a bug bounty program for Xbox

Security Affairs

Since launching in 2002, the Xbox network has enabled millions of users to share their common love of gaming on a safe and secure service. Microsoft announced the launch of an Xbox bug bounty program with rewards of up to $20,000 for critical remote code execution flaws.

SEC Fines Alternative Data Provider for Securities Fraud

Data Matters

813 (2002). On September 14, 2021, the U.S. Securities and Exchange Commission (SEC) settled an enforcement action against App Annie Inc., an alternative data provider for the mobile app industry, and its former CEO Bertrand Schmitt.

Sales 85

Transition to Electronic Government: Signs of the Time


In 2002, I accepted the position of Statewide Records and Forms Coordinator for the Wisconsin Department of Electronic Government (DEG).

ELAR at SOAS to create new online archive to safeguard the world’s disappearing languages


Founded in 2002 to preserve and make accessible endangered languages recordings as resources for linguists, social scientists and language communities, the Endangered Languages Archive documents and preserves humanities intangible cultural heritage encoded in endangered languages. ELAR at SOAS University of London, will use Preservica to protect and provide greater online access to over 16,000 hours of audio-visual recordings of endangered languages.

Not Proof, but Another Lead: WikiLeaks' Latest Includes Google/China Tip

John Battelle's Searchblog

They have broken into American government computers and those of Western allies, the Dalai Lama and American businesses since 2002, cables said. According the the NYT's coverage of today's WikiLeaks trove (only a small percentage have been released publicly, the rest have been reviewed by the Times): China’s Politburo directed the intrusion into Google’s computer systems in that country, a Chinese contact told the American Embassy in Beijing in January, one cable reported.

ABBYY Reports 25% Revenue Growth in 2017

Info Source

Ulf Persson became the CEO in January 2017, after serving as a member and the Chairman of ABBYY’s Board since 2002. MILPITAS, Calif., – Feb. 13, 2018 – ABBYY ® , a global provider of intelligent capture solutions to improve business outcomes, today announced the results of 2017. The company achieved a total revenue growth of 25%, the highest rate in five years.

Here’s a Story Where Picking the Right Font Was Never More Important: eDiscovery Trends

eDiscovery Daily

Per Ars Technica , Cambria was designed no earlier than 2004, while Calibri was designed between 2002 and 2004; both only became widely available in 2007. This is a story that a word geek like me can really appreciate. We talk a lot on this blog about the importance of metadata to provide additional useful information in discovery productions and help minimize the risk of fraud.

Managing the Unpredictability of eDiscovery Costs

eDiscovery Daily

As a proven leader in eDiscovery, CloudNine has provided innovative data collection and review solutions for hundreds of law firms and legal service providers since 2002.

Next generation public library LMS


The Library Consortium (until recently the London Library Consortium) has existed since 2002. From 2002 to 2019, the consortium?s Next generation public library LMS. The technology and people underpinning the Library Consortium?s

Silicon Review awards top workplace of the year


Mr. Read served as CEO and President of Nimsoft from 2002 to 2010, leading the company to its acquisition by CA Technologies. Silicon Review has included amongst its list of top 50 workplaces in 2020. You can see the full list here and read the interview with Gary Read our CEO below.