Congressional Movement on Cybersecurity in a Bill to Reauthorize the Homeland Security Act of 2002

Data Matters

Senate’s Homeland Security and Governmental Affairs Committee ­approved a bill ( SB 2825 ) reauthorizing the Homeland Security Act of 2002 and including key cybersecurity provisions affecting the Department of Homeland Security (DHS). SB 2825 also clarifies liability protections for cyber-risk mitigation through DHS’s implementation of the SAFETY Act (“Support Anti-Terrorism by Fostering Effective Technologies Act of 2002.”) On March 7, 2018, the U.S.

Risk 60

Women in Security: Assessing the Progress

Data Breach Today

Cybersecurity challenges and solutions have evolved greatly since 2002. And so has the Executive Women's Forum, which was founded that year to advance female leaders in the profession. Founder Joyce Brocaglia reflects on the forum's accomplishments and challenges


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.



2002??????????????????IT??????????????????????????????????????????????????????????2015???ServiceNow????????????????????????????????????IT????????????????????????. ????????????????????????????IT???????????ITSM?????????ServiceNow????????????IT??????????????????????????????????????????????????????????????2020?3??ServiceNow??Emergency

IT 94

Top 10 reasons to upgrade Documentum

OpenText Information Management

was released in 2002, version 6.0 Software upgrades are vital for organizations to improve performance.

NIST proposes Secure Software Development Framework


Ever since Bill Gates fired off his famous Trustworthy Computing memo in January 2002, developing secure software has been a hot topic of discussion. It was important before then, for sure, but it was often overlooked. It took a series of high-profile worms such as Code Red and Nimda and a series of breaches to […]. Security app security application security application security testing software development

Sox Management Review Controls


The Sarbanes-Oxley Act of 2002 (SOX) regards management review controls (MRCs) as one of the most pertinent internal controls. MRCs are the evaluations done on the critical financial information systems. Sponsored


Estonia sues Gemalto for 152M euros over flaws in citizen ID cards issued by the company

Security Affairs

Estonia replaced Gemalto and its predecessor for the supply of ID cards since 2002, with the company Idemia. Estonia had used Gemalto and its predecessor for its ID cards since 2002, but replaced the manufacturer with Idemia after it found serious security flaws last year. Estonian sues Gemalto for 152 million euros following the security flaws in the citizen ID cards issued by the company that caused their recall in 2017.

RSAC insights: Security Compass leverages automation to weave security deeper into SecOps

The Last Watchdog

This, in fact, was the same general approach to developing and deploying new software that existed in early 2002 when Bill Gates slammed the brakes on all Windows development to focus on implementing Trustworthy Computing. In a day and age when the prime directive for many organizations is to seek digital agility above all else, cool new apps get conceived, assembled and deployed at breakneck speed. Related: DHS instigates 60-day cybersecurity sprints.

Better Late than Never? U.S. Bolsters Cybersecurity Ahead of Elections

Adam Levin

The grants came in the form of a special allocation from the Help America Vote Act (HAVA) of 2002. One of the most discussed topics of this year’s election cycle is how best to protect the elections themselves from hackers and other outside influence. Following the multitude of hacks , leaked emails , data breaches , and disinformation campaigns that marred the 2016 elections, Congress has allocated $380 million to states requesting cybersecurity assistance.

What is ArchiMate?


Originally based on IEEE 1471 , ArchiMate was developed in the Netherlands as a joint venture between private industry and the Dutch Government between 2002 and 2004.

BOOK REVIEW: ‘Security Yearbook’ preserves cybersecurity history — highlights tectonic shift

The Last Watchdog

Related: The role of PKI is securing digital transformation That was in 2002. Along with Richard Stiennon , I belong to a small circle of journalists and tech industry analysts who’ve been paying close attention to cybersecurity since Bill Gates curtailed commercial work on Windows to rivet Microsoft’s attention on defending its software code.

Citrix Workspace flaw can allow remote hack of devices running vulnerable app

Security Affairs

This vulnerability affects the following supported versions of Citrix Workspace app for Windows: Citrix Workspace app for Windows 1912 LTSR Citrix Workspace app for Windows 2002.

3.4 Million user records from LiveAuctioneers hack available for sale

Security Affairs

LiveAuctioneers is one of the world’s largest art, antiques & collectibles online marketplace that was founded in 2002. Auctions platform LiveAuctioneers admitted to have suffered a data breach that likely impacted approximately 3.4 million users.

Sales 94

Sarbanes-Oxley Act and Record Retention Best Practices

Armstrong Archives

The Sarbanes-Oxley Act (SOX) is a law passed in 2002 that sets forth standards for the recording and reporting of financial activities. A key part of that law involves record retention.

The Updates Must Go Through

Adam Shostack

For example, see our Timing the Application of Security Patches for Optimal Uptime , Usenix Lisa 2002). On Monday, the Department of Justice announced that it had cleaned malware (“webshells”) off of hundreds of infected mail systems running Microsoft Exchange. Microsoft has been trying to get folks to apply critical security patches to address a problem that’s being actively exploited.

IT 46

Webinar on the SAFETY Act and Cybersecurity: Protecting Your Reputation and Reducing Liability Risk

Hunton Privacy

In 2002, Congress enacted the Supporting Anti-Terrorism by Fostering Effective Technologies Act (“the SAFETY Act”) to limit the liabilities that energy, financial, manufacturing and other critical infrastructure companies face in the event of a serious cyber or physical security attack.

Organizational Accountability in U.S. Law and Its Relevance to a Federal Data Privacy Law: A CIPL Study

Hunton Privacy

Department of Justice and the Securities and Exchange Commission; The Sarbanes-Oxley Act of 2002 and Chapter Eight of the U.S. The Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP recently published a white paper on Organizational Accountability’s Existence in U.S. Regulatory Compliance and its Relevance for a Federal Data Privacy Law (the “White Paper”). The White Paper looks at the origins and applications of organizational accountability in U.S.

Paper 57

MY TAKE: New ‘cyberthreat index’ shows SMBs cognizant of big risks, ill-prepared to deal with them

The Last Watchdog

The company got its start in 2002 in Gulf Breeze, Florida, as a two-man operation that set out to help small firms filter the early waves of email spam. Small and midsize businesses — so-called SMBs — face an acute risk of sustaining a crippling cyberattack. This appears to be even more true today than it was when I began writing about business cyber risks at USA TODAY more than a decade ago.

Risk 153

The Belgian Constitutional Court annuls Data Retention Act

DLA Piper Privacy Matters

Authors : Heidi Waem and Gert-Jan Fraeyman. On 22 April 2021, the Belgian Constitutional Court annulled the Act of 29 May 2016 on the collection and storage of data in the electronic communications sector (the Data Retention Act).

Silent Night Zeus botnet available for sale in underground forums

Security Affairs

The name “Silent Night” Zbot is likely a reference to a weapon mentioned in the 2002 movie xXx, it was first spotted in November 2019 when a seller named “Axe” started offering it on the Russian underground forum forum.exploit[.]in.

Sales 113

Microsoft announces the launch of a bug bounty program for Xbox

Security Affairs

Since launching in 2002, the Xbox network has enabled millions of users to share their common love of gaming on a safe and secure service. Microsoft announced the launch of an Xbox bug bounty program with rewards of up to $20,000 for critical remote code execution flaws.

Belgium: ePrivacy proposal in progress: Council agrees on its position to start off ‘trilogue’ negotiations

DLA Piper Privacy Matters

Authors: Heidi Waem , Alizée Stappers and Simon Verschaeve.

Sharp Appoints Mike Marusic To The Position Of President And CEO, Sharp Imaging And Information Company Of America

Document Imaging Report

Mike Marusic joined Sharp in 2002 as Associate Vice President of Marketing for SIICA. Prior to joining Sharp in 2002, he headed up the marketing group for Panasonic’s copier and computer peripheral division and has over 25 years’ experience in the office technology sector.

Richard Thomas Selected as Chair for Guernsey’s New Data Protection Authority

Hunton Privacy

Thomas served as UK Information Commissioner from 2002 to 2009. Hunton & Williams LLP is pleased to announce that Richard Thomas , Global Strategy Advisor to the Centre for Information Policy Leadership (“CIPL”), has been selected as Chair for the Bailiwick of Guernsey’s new data protection authority.

Sandboxing: Advanced Malware Analysis in 2021

eSecurity Planet

Antivirus protection isn’t enough to protect against today’s advanced threats. To fill this gap and aid in the analysis, detection, and testing of malware, sandboxing is widely used to give organizations the setting, isolation, and security tools needed to preserve the integrity of the host network.

Top Database Security Solutions for 2021

eSecurity Planet

Founded in 2002 and based in Redwood Shores, California, Imperva has made a name for itself as a provider of security solutions for applications, data, and the network edge.

Cloud 62

Privacy and Innovation Combined in Information Governance


Europe has cultivated a culture that values privacy above all, with long-standing laws that dictate how private information can be gathered and used (including the Privacy and Electronic Communications Directive 2002). Today’s biggest US tech companies – historically known for their innovation, pragmatism, and willingness to adapt – are by and large failing to comply with privacy laws forth by GDPR.

OLAP and Hadoop: The 4 Differences You Should Know

Perficient Data & Analytics

Around since 2002. OLAP and Hadoop are not the same. OLAP is a technology to perform multi-dimensional analytics like reporting and data mining. It has been around since 1970. Hadoop is a technology to perform massive computation on large data. They can be used together but there are differences when choosing between using Hadoop/MapReduce data processing versus classic OLAP. For this chat, let’s avoid the concern of price and also assume the business needs have been thought through.

EU Council Agrees on Proposed ePrivacy Regulation

Data Matters

The ePrivacy Regulation is meant to replace the existing ePrivacy Directive 2002/58 (ePrivacy Directive), which dates to 2002 and was meant to address the requirements of new digital technologies and facilitate the advance of electronic communication services. These issues are still being addressed in the new ePrivacy Regulation — but technology has advanced significantly since 2002, and therefore a revisit of the ePrivacy legal framework was considered appropriate.

ABBYY Reports 25% Revenue Growth in 2017

Document Imaging Report

Ulf Persson became the CEO in January 2017, after serving as a member and the Chairman of ABBYY’s Board since 2002. MILPITAS, Calif., – Feb. 13, 2018 – ABBYY ® , a global provider of intelligent capture solutions to improve business outcomes, today announced the results of 2017. The company achieved a total revenue growth of 25%, the highest rate in five years.

Here’s a Story Where Picking the Right Font Was Never More Important: eDiscovery Trends

eDiscovery Daily

Per Ars Technica , Cambria was designed no earlier than 2004, while Calibri was designed between 2002 and 2004; both only became widely available in 2007. This is a story that a word geek like me can really appreciate. We talk a lot on this blog about the importance of metadata to provide additional useful information in discovery productions and help minimize the risk of fraud.

Recommended reading for Next Generation KM, Collaboration and Intranet 2.0


2002, 'The Multi-faceted Nature of Virtual Teams' , Cahier du GreSI, no 02-11, November 2002. 2002, 'Collaborative Infrastructure Formation in Virtual Projects' , Journal of Global Information Technology Management, Vol. 2, 2002, pp.29-47. 2002, Emergence: The Connected Lives of Ants, Brains, Cities , Scribner, New York. This following is a combined list of recommended reading ( in addition to mine own work !)

New CMSWire article: A Brief History of Social Intranets


Using 2002 (the date of Clay Shirky's social software summit) as my line in the sand, I explore the origins of social software before that time and what happened in the enterprise after that date

IT 40

Not Proof, but Another Lead: WikiLeaks' Latest Includes Google/China Tip

John Battelle's Searchblog

They have broken into American government computers and those of Western allies, the Dalai Lama and American businesses since 2002, cables said. According the the NYT's coverage of today's WikiLeaks trove (only a small percentage have been released publicly, the rest have been reviewed by the Times): China’s Politburo directed the intrusion into Google’s computer systems in that country, a Chinese contact told the American Embassy in Beijing in January, one cable reported.

Interview With Mark Myers on the Texas Digital Archive

The Texas Record

1] ATF104, 2002, Photographs, Texas Governor Rick Perry Press Office Files for First Lady Anita Perry. Devices used by Governor Rick Perry to create electronic records [1] This is the first in a two-part series exploring the Texas Digital Archive (TDA) with Electronic Records Specialist Mark Myers of the Archives and Information Services (ARIS) division at TSLAC. Mark is responsible for ingesting electronic records into the TDA.

Transition to Electronic Government: Signs of the Time


In 2002, I accepted the position of Statewide Records and Forms Coordinator for the Wisconsin Department of Electronic Government (DEG).

European Commission Plans to Upgrade e-Privacy Directive to a Regulation

Hunton Privacy

The e-Privacy Directive was enacted in 2002 and designed to protect the right to privacy and confidentiality of users of electronic communication services, such as Internet service and broadband providers. On December 12, 2016, Politico reported that the European Commission intends to replace the e-Privacy Directive with a Regulation.


Nintex Acquires Process Management Leader Promapp

Document Imaging Report

Headquartered in Auckland, New Zealand, Promapp was founded in 2002 by Ivan Seselj and is co-owned by Richard Holmes. BELLEVUE, Wash.—July July 31, 2018—Nintex, the world’s leader in intelligent process automation (IPA), is pleased to announce it has acquired Promapp, a business process management software company which provides partners and customers new tools to better optimize business processes through a market leading visual process mapping solution.

ELAR at SOAS to create new online archive to safeguard the world’s disappearing languages


Founded in 2002 to preserve and make accessible endangered languages recordings as resources for linguists, social scientists and language communities, the Endangered Languages Archive documents and preserves humanities intangible cultural heritage encoded in endangered languages. ELAR at SOAS University of London, will use Preservica to protect and provide greater online access to over 16,000 hours of audio-visual recordings of endangered languages.

Addressing the Spectrum of Risks


Whether you’re researching SAST, DAST, SCA, RASP, one thing is for certain: eventually it all starts to blur into a game of anagram. If you’re struggling to understand how to get your application security testing program off the ground, you wouldn’t be the first.

Risk 52