Congressional Movement on Cybersecurity in a Bill to Reauthorize the Homeland Security Act of 2002

Data Matters

Senate’s Homeland Security and Governmental Affairs Committee ­approved a bill ( SB 2825 ) reauthorizing the Homeland Security Act of 2002 and including key cybersecurity provisions affecting the Department of Homeland Security (DHS). SB 2825 also clarifies liability protections for cyber-risk mitigation through DHS’s implementation of the SAFETY Act (“Support Anti-Terrorism by Fostering Effective Technologies Act of 2002.”) On March 7, 2018, the U.S.

Risk 60

Women in Security: Assessing the Progress

Data Breach Today

Cybersecurity challenges and solutions have evolved greatly since 2002. And so has the Executive Women's Forum, which was founded that year to advance female leaders in the profession. Founder Joyce Brocaglia reflects on the forum's accomplishments and challenges

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

ServiceNow??????????????!?

DXC

2002??????????????????IT??????????????????????????????????????????????????????????2015???ServiceNow????????????????????????????????????IT????????????????????????. ????????????????????????????IT???????????ITSM?????????ServiceNow????????????IT??????????????????????????????????????????????????????????????2020?3??ServiceNow??Emergency

IT 94

Top 10 reasons to upgrade Documentum

OpenText Information Management

was released in 2002, version 6.0 Software upgrades are vital for organizations to improve performance.

NIST proposes Secure Software Development Framework

DXC

Ever since Bill Gates fired off his famous Trustworthy Computing memo in January 2002, developing secure software has been a hot topic of discussion. It was important before then, for sure, but it was often overlooked. It took a series of high-profile worms such as Code Red and Nimda and a series of breaches to […]. Security app security application security application security testing software development

Sox Management Review Controls

Cllax

The Sarbanes-Oxley Act of 2002 (SOX) regards management review controls (MRCs) as one of the most pertinent internal controls. MRCs are the evaluations done on the critical financial information systems. Sponsored

28

Estonia sues Gemalto for 152M euros over flaws in citizen ID cards issued by the company

Security Affairs

Estonia replaced Gemalto and its predecessor for the supply of ID cards since 2002, with the company Idemia. Estonia had used Gemalto and its predecessor for its ID cards since 2002, but replaced the manufacturer with Idemia after it found serious security flaws last year. Estonian sues Gemalto for 152 million euros following the security flaws in the citizen ID cards issued by the company that caused their recall in 2017.

The Updates Must Go Through

Adam Shostack

For example, see our Timing the Application of Security Patches for Optimal Uptime , Usenix Lisa 2002). On Monday, the Department of Justice announced that it had cleaned malware (“webshells”) off of hundreds of infected mail systems running Microsoft Exchange. Microsoft has been trying to get folks to apply critical security patches to address a problem that’s being actively exploited.

IT 46

Better Late than Never? U.S. Bolsters Cybersecurity Ahead of Elections

Adam Levin

The grants came in the form of a special allocation from the Help America Vote Act (HAVA) of 2002. One of the most discussed topics of this year’s election cycle is how best to protect the elections themselves from hackers and other outside influence. Following the multitude of hacks , leaked emails , data breaches , and disinformation campaigns that marred the 2016 elections, Congress has allocated $380 million to states requesting cybersecurity assistance.

What is ArchiMate?

erwin

Originally based on IEEE 1471 , ArchiMate was developed in the Netherlands as a joint venture between private industry and the Dutch Government between 2002 and 2004.

BOOK REVIEW: ‘Security Yearbook’ preserves cybersecurity history — highlights tectonic shift

The Last Watchdog

Related: The role of PKI is securing digital transformation That was in 2002. Along with Richard Stiennon , I belong to a small circle of journalists and tech industry analysts who’ve been paying close attention to cybersecurity since Bill Gates curtailed commercial work on Windows to rivet Microsoft’s attention on defending its software code.

Sarbanes-Oxley Act and Record Retention Best Practices

Armstrong Archives

The Sarbanes-Oxley Act (SOX) is a law passed in 2002 that sets forth standards for the recording and reporting of financial activities. A key part of that law involves record retention.

3.4 Million user records from LiveAuctioneers hack available for sale

Security Affairs

LiveAuctioneers is one of the world’s largest art, antiques & collectibles online marketplace that was founded in 2002. Auctions platform LiveAuctioneers admitted to have suffered a data breach that likely impacted approximately 3.4 million users.

Sales 92

Citrix Workspace flaw can allow remote hack of devices running vulnerable app

Security Affairs

This vulnerability affects the following supported versions of Citrix Workspace app for Windows: Citrix Workspace app for Windows 1912 LTSR Citrix Workspace app for Windows 2002.

Organizational Accountability in U.S. Law and Its Relevance to a Federal Data Privacy Law: A CIPL Study

Hunton Privacy

Department of Justice and the Securities and Exchange Commission; The Sarbanes-Oxley Act of 2002 and Chapter Eight of the U.S. The Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP recently published a white paper on Organizational Accountability’s Existence in U.S. Regulatory Compliance and its Relevance for a Federal Data Privacy Law (the “White Paper”). The White Paper looks at the origins and applications of organizational accountability in U.S.

Paper 57

Webinar on the SAFETY Act and Cybersecurity: Protecting Your Reputation and Reducing Liability Risk

Hunton Privacy

In 2002, Congress enacted the Supporting Anti-Terrorism by Fostering Effective Technologies Act (“the SAFETY Act”) to limit the liabilities that energy, financial, manufacturing and other critical infrastructure companies face in the event of a serious cyber or physical security attack.

MY TAKE: New ‘cyberthreat index’ shows SMBs cognizant of big risks, ill-prepared to deal with them

The Last Watchdog

The company got its start in 2002 in Gulf Breeze, Florida, as a two-man operation that set out to help small firms filter the early waves of email spam. Small and midsize businesses — so-called SMBs — face an acute risk of sustaining a crippling cyberattack. This appears to be even more true today than it was when I began writing about business cyber risks at USA TODAY more than a decade ago.

Risk 152

Belgium: ePrivacy proposal in progress: Council agrees on its position to start off ‘trilogue’ negotiations

DLA Piper Privacy Matters

Authors: Heidi Waem , Alizée Stappers and Simon Verschaeve.

Silent Night Zeus botnet available for sale in underground forums

Security Affairs

The name “Silent Night” Zbot is likely a reference to a weapon mentioned in the 2002 movie xXx, it was first spotted in November 2019 when a seller named “Axe” started offering it on the Russian underground forum forum.exploit[.]in.

Sales 110

Microsoft announces the launch of a bug bounty program for Xbox

Security Affairs

Since launching in 2002, the Xbox network has enabled millions of users to share their common love of gaming on a safe and secure service. Microsoft announced the launch of an Xbox bug bounty program with rewards of up to $20,000 for critical remote code execution flaws.

Sharp Appoints Mike Marusic To The Position Of President And CEO, Sharp Imaging And Information Company Of America

Document Imaging Report

Mike Marusic joined Sharp in 2002 as Associate Vice President of Marketing for SIICA. Prior to joining Sharp in 2002, he headed up the marketing group for Panasonic’s copier and computer peripheral division and has over 25 years’ experience in the office technology sector.

EU Council Agrees on Proposed ePrivacy Regulation

Data Matters

The ePrivacy Regulation is meant to replace the existing ePrivacy Directive 2002/58 (ePrivacy Directive), which dates to 2002 and was meant to address the requirements of new digital technologies and facilitate the advance of electronic communication services. These issues are still being addressed in the new ePrivacy Regulation — but technology has advanced significantly since 2002, and therefore a revisit of the ePrivacy legal framework was considered appropriate.

Richard Thomas Selected as Chair for Guernsey’s New Data Protection Authority

Hunton Privacy

Thomas served as UK Information Commissioner from 2002 to 2009. Hunton & Williams LLP is pleased to announce that Richard Thomas , Global Strategy Advisor to the Centre for Information Policy Leadership (“CIPL”), has been selected as Chair for the Bailiwick of Guernsey’s new data protection authority.

Privacy and Innovation Combined in Information Governance

Everteam

Europe has cultivated a culture that values privacy above all, with long-standing laws that dictate how private information can be gathered and used (including the Privacy and Electronic Communications Directive 2002). Today’s biggest US tech companies – historically known for their innovation, pragmatism, and willingness to adapt – are by and large failing to comply with privacy laws forth by GDPR.

OLAP and Hadoop: The 4 Differences You Should Know

Perficient Data & Analytics

Around since 2002. OLAP and Hadoop are not the same. OLAP is a technology to perform multi-dimensional analytics like reporting and data mining. It has been around since 1970. Hadoop is a technology to perform massive computation on large data. They can be used together but there are differences when choosing between using Hadoop/MapReduce data processing versus classic OLAP. For this chat, let’s avoid the concern of price and also assume the business needs have been thought through.

ABBYY Reports 25% Revenue Growth in 2017

Document Imaging Report

Ulf Persson became the CEO in January 2017, after serving as a member and the Chairman of ABBYY’s Board since 2002. MILPITAS, Calif., – Feb. 13, 2018 – ABBYY ® , a global provider of intelligent capture solutions to improve business outcomes, today announced the results of 2017. The company achieved a total revenue growth of 25%, the highest rate in five years.

Here’s a Story Where Picking the Right Font Was Never More Important: eDiscovery Trends

eDiscovery Daily

Per Ars Technica , Cambria was designed no earlier than 2004, while Calibri was designed between 2002 and 2004; both only became widely available in 2007. This is a story that a word geek like me can really appreciate. We talk a lot on this blog about the importance of metadata to provide additional useful information in discovery productions and help minimize the risk of fraud.

Recommended reading for Next Generation KM, Collaboration and Intranet 2.0

ChiefTech

2002, 'The Multi-faceted Nature of Virtual Teams' , Cahier du GreSI, no 02-11, November 2002. 2002, 'Collaborative Infrastructure Formation in Virtual Projects' , Journal of Global Information Technology Management, Vol. 2, 2002, pp.29-47. 2002, Emergence: The Connected Lives of Ants, Brains, Cities , Scribner, New York. This following is a combined list of recommended reading ( in addition to mine own work !)

New CMSWire article: A Brief History of Social Intranets

ChiefTech

Using 2002 (the date of Clay Shirky's social software summit) as my line in the sand, I explore the origins of social software before that time and what happened in the enterprise after that date

IT 40

Interview With Mark Myers on the Texas Digital Archive

The Texas Record

1] ATF104, 2002, Photographs, Texas Governor Rick Perry Press Office Files for First Lady Anita Perry. Devices used by Governor Rick Perry to create electronic records [1] This is the first in a two-part series exploring the Texas Digital Archive (TDA) with Electronic Records Specialist Mark Myers of the Archives and Information Services (ARIS) division at TSLAC. Mark is responsible for ingesting electronic records into the TDA.

Not Proof, but Another Lead: WikiLeaks' Latest Includes Google/China Tip

John Battelle's Searchblog

They have broken into American government computers and those of Western allies, the Dalai Lama and American businesses since 2002, cables said. According the the NYT's coverage of today's WikiLeaks trove (only a small percentage have been released publicly, the rest have been reviewed by the Times): China’s Politburo directed the intrusion into Google’s computer systems in that country, a Chinese contact told the American Embassy in Beijing in January, one cable reported.

Transition to Electronic Government: Signs of the Time

Preservica

In 2002, I accepted the position of Statewide Records and Forms Coordinator for the Wisconsin Department of Electronic Government (DEG).

ELAR at SOAS to create new online archive to safeguard the world’s disappearing languages

Preservica

Founded in 2002 to preserve and make accessible endangered languages recordings as resources for linguists, social scientists and language communities, the Endangered Languages Archive documents and preserves humanities intangible cultural heritage encoded in endangered languages. ELAR at SOAS University of London, will use Preservica to protect and provide greater online access to over 16,000 hours of audio-visual recordings of endangered languages.

Nintex Acquires Process Management Leader Promapp

Document Imaging Report

Headquartered in Auckland, New Zealand, Promapp was founded in 2002 by Ivan Seselj and is co-owned by Richard Holmes. BELLEVUE, Wash.—July July 31, 2018—Nintex, the world’s leader in intelligent process automation (IPA), is pleased to announce it has acquired Promapp, a business process management software company which provides partners and customers new tools to better optimize business processes through a market leading visual process mapping solution.

Cloud 40

European Commission Plans to Upgrade e-Privacy Directive to a Regulation

Hunton Privacy

The e-Privacy Directive was enacted in 2002 and designed to protect the right to privacy and confidentiality of users of electronic communication services, such as Internet service and broadband providers. On December 12, 2016, Politico reported that the European Commission intends to replace the e-Privacy Directive with a Regulation.

GDPR 43

First Cyber Defence & Information Assurance courses to receive CILIP accreditation

CILIP

s Defence Academy, in 2002, Cranfield now offers a unique gateway for teaching, research and consultancy utilising a unique set of capabilities, expertise and facilities to deliver practical solutions that make a real difference to the lives of military personnel and civilians across the world. First Cyber Defence & Information Assurance courses to receive CILIP accreditation.

Space and Beyond: Locating NASA Photographs Using Online Indexes

Unwritten Record

255-CC: Color Photograph Files, 1965 – 2002. Photograph of Gordon Cooper during Simulated Mercury Redstone Rocket Flight. Local Identifier: 255-G-61-MR3-61; National Archives Identifier: 17409778.

Reflecting on Data Citizens ‘19: The Future of Data Intelligence Starts Now

Collibra

Since then we’ve seen the number of CDOs at large organizations skyrocket from one in 2002 to a projected 10,000 by the end of next year. Each year after we close our annual Data Citizens conference I feel energized – but this year was particularly significant. Last week we hosted the largest Data Citizens yet, with close to 700 attendees representing over 300 companies from industries spanning financial services, utilities, telco, technology, retail, healthcare, universities, and more.

Identity-based Cryptography

Thales Cloud Protection & Licensing

In Advances in Cryptology – ASIACRYPT 2002, pages 548–566. Springer Verlag, 2002. Public key infrastructure (PKI) requires key distribution and has been long criticised for its usability issues [13,14,15]. In an experiment [15] conducted for analysing the usability of Mailvelop, a modern PGP tool rated 4.4 out of 5 stars on Chrome web store, 9 out of 10 pairs of participants failed to complete the assigned task of exchanging encrypted emails, i.e. 90% failure rate.

Guest Post - How important is digital document consistency?

AIIM

Prior to working with Y Soft, Mr. Koelewijn founded X-Solutions in late 2002 which was later acquired by Nuance in 2009. A repository containing documents that were digitized inconsistently or inaccurately presents a new set of problems for an organization, problems that can hinder the productivity gains they had hoped to achieve. Obviously digital document accuracy is particularly important for government and regulated industries.