Congressional Movement on Cybersecurity in a Bill to Reauthorize the Homeland Security Act of 2002

Data Matters

Senate’s Homeland Security and Governmental Affairs Committee ­approved a bill ( SB 2825 ) reauthorizing the Homeland Security Act of 2002 and including key cybersecurity provisions affecting the Department of Homeland Security (DHS). SB 2825 also clarifies liability protections for cyber-risk mitigation through DHS’s implementation of the SAFETY Act (“Support Anti-Terrorism by Fostering Effective Technologies Act of 2002.”) On March 7, 2018, the U.S.

Risk 60

Women in Security: Assessing the Progress

Data Breach Today

Cybersecurity challenges and solutions have evolved greatly since 2002. And so has the Executive Women's Forum, which was founded that year to advance female leaders in the profession. Founder Joyce Brocaglia reflects on the forum's accomplishments and challenges

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

ServiceNow??????????????!?

DXC

2002??????????????????IT??????????????????????????????????????????????????????????2015???ServiceNow????????????????????????????????????IT????????????????????????. ????????????????????????????IT???????????ITSM?????????ServiceNow????????????IT??????????????????????????????????????????????????????????????2020?3??ServiceNow??Emergency

IT 89

NIST proposes Secure Software Development Framework

DXC

Ever since Bill Gates fired off his famous Trustworthy Computing memo in January 2002, developing secure software has been a hot topic of discussion. It was important before then, for sure, but it was often overlooked. It took a series of high-profile worms such as Code Red and Nimda and a series of breaches to […]. Security app security application security application security testing software development

Top 10 reasons to upgrade Documentum

OpenText Information Management

was released in 2002, version 6.0 Software upgrades are vital for organizations to improve performance. To maintain a competitive advantage, internal resource efficiency and service levels, organizations must ensure they are running the most up-to-date versions of their enterprise software portfolio. OpenText™ Documentum™ is a mature product with a long release history. Documentum 5.0 followed … The post Top 10 reasons to upgrade Documentum appeared first on OpenText Blogs.

Sox Management Review Controls

Cllax

The Sarbanes-Oxley Act of 2002 (SOX) regards management review controls (MRCs) as one of the most pertinent internal controls. MRCs are the evaluations done on the critical financial information systems. Sponsored

21

Estonia sues Gemalto for 152M euros over flaws in citizen ID cards issued by the company

Security Affairs

Estonia replaced Gemalto and its predecessor for the supply of ID cards since 2002, with the company Idemia. Estonia had used Gemalto and its predecessor for its ID cards since 2002, but replaced the manufacturer with Idemia after it found serious security flaws last year. Estonian sues Gemalto for 152 million euros following the security flaws in the citizen ID cards issued by the company that caused their recall in 2017.

Better Late than Never? U.S. Bolsters Cybersecurity Ahead of Elections

Adam Levin

The grants came in the form of a special allocation from the Help America Vote Act (HAVA) of 2002. One of the most discussed topics of this year’s election cycle is how best to protect the elections themselves from hackers and other outside influence. Following the multitude of hacks , leaked emails , data breaches , and disinformation campaigns that marred the 2016 elections, Congress has allocated $380 million to states requesting cybersecurity assistance.

Sarbanes-Oxley Act and Record Retention Best Practices

Armstrong Archives

The Sarbanes-Oxley Act (SOX) is a law passed in 2002 that sets forth standards for the recording and reporting of financial activities. A key part of that law involves record retention.

BOOK REVIEW: ‘Security Yearbook’ preserves cybersecurity history — highlights tectonic shift

The Last Watchdog

Related: The role of PKI is securing digital transformation That was in 2002. Along with Richard Stiennon , I belong to a small circle of journalists and tech industry analysts who’ve been paying close attention to cybersecurity since Bill Gates curtailed commercial work on Windows to rivet Microsoft’s attention on defending its software code.

What is ArchiMate?

erwin

Originally based on IEEE 1471 , ArchiMate was developed in the Netherlands as a joint venture between private industry and the Dutch Government between 2002 and 2004.

Citrix Workspace flaw can allow remote hack of devices running vulnerable app

Security Affairs

This vulnerability affects the following supported versions of Citrix Workspace app for Windows: Citrix Workspace app for Windows 1912 LTSR Citrix Workspace app for Windows 2002.

Organizational Accountability in U.S. Law and Its Relevance to a Federal Data Privacy Law: A CIPL Study

Hunton Privacy

Department of Justice and the Securities and Exchange Commission; The Sarbanes-Oxley Act of 2002 and Chapter Eight of the U.S. The Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP recently published a white paper on Organizational Accountability’s Existence in U.S. Regulatory Compliance and its Relevance for a Federal Data Privacy Law (the “White Paper”). The White Paper looks at the origins and applications of organizational accountability in U.S.

Paper 58

Webinar on the SAFETY Act and Cybersecurity: Protecting Your Reputation and Reducing Liability Risk

Hunton Privacy

In 2002, Congress enacted the Supporting Anti-Terrorism by Fostering Effective Technologies Act (“the SAFETY Act”) to limit the liabilities that energy, financial, manufacturing and other critical infrastructure companies face in the event of a serious cyber or physical security attack.

MY TAKE: New ‘cyberthreat index’ shows SMBs cognizant of big risks, ill-prepared to deal with them

The Last Watchdog

The company got its start in 2002 in Gulf Breeze, Florida, as a two-man operation that set out to help small firms filter the early waves of email spam. Small and midsize businesses — so-called SMBs — face an acute risk of sustaining a crippling cyberattack. This appears to be even more true today than it was when I began writing about business cyber risks at USA TODAY more than a decade ago.

Risk 151

3.4 Million user records from LiveAuctioneers hack available for sale

Security Affairs

LiveAuctioneers is one of the world’s largest art, antiques & collectibles online marketplace that was founded in 2002. Auctions platform LiveAuctioneers admitted to have suffered a data breach that likely impacted approximately 3.4 million users. Auctions platform LiveAuctioneers disclosed a a data breach that might have impacted approximately 3.4 million users.

Sales 67

Silent Night Zeus botnet available for sale in underground forums

Security Affairs

The name “Silent Night” Zbot is likely a reference to a weapon mentioned in the 2002 movie xXx, it was first spotted in November 2019 when a seller named “Axe” started offering it on the Russian underground forum forum.exploit[.]in. Experts reported the existence of a botnet, tracked as Silent Night based on the Zeus banking Trojan that is available for sale in several underground forums.

Sales 81

Sharp Appoints Mike Marusic To The Position Of President And CEO, Sharp Imaging And Information Company Of America

Document Imaging Report

Mike Marusic joined Sharp in 2002 as Associate Vice President of Marketing for SIICA. Prior to joining Sharp in 2002, he headed up the marketing group for Panasonic’s copier and computer peripheral division and has over 25 years’ experience in the office technology sector.

Richard Thomas Selected as Chair for Guernsey’s New Data Protection Authority

Hunton Privacy

Thomas served as UK Information Commissioner from 2002 to 2009. Hunton & Williams LLP is pleased to announce that Richard Thomas , Global Strategy Advisor to the Centre for Information Policy Leadership (“CIPL”), has been selected as Chair for the Bailiwick of Guernsey’s new data protection authority.

Microsoft announces the launch of a bug bounty program for Xbox

Security Affairs

Since launching in 2002, the Xbox network has enabled millions of users to share their common love of gaming on a safe and secure service. Microsoft announced the launch of an Xbox bug bounty program with rewards of up to $20,000 for critical remote code execution flaws. Microsoft is going to launch an Xbox bug bounty p rogram that will pay rewards of up to $20,000 for critical remote code execution vulnerabilities.

Privacy and Innovation Combined in Information Governance

Everteam

Europe has cultivated a culture that values privacy above all, with long-standing laws that dictate how private information can be gathered and used (including the Privacy and Electronic Communications Directive 2002). Today’s biggest US tech companies – historically known for their innovation, pragmatism, and willingness to adapt – are by and large failing to comply with privacy laws forth by GDPR.

OLAP and Hadoop: The 4 Differences You Should Know

Perficient Data & Analytics

Around since 2002. OLAP and Hadoop are not the same. OLAP is a technology to perform multi-dimensional analytics like reporting and data mining. It has been around since 1970. Hadoop is a technology to perform massive computation on large data. They can be used together but there are differences when choosing between using Hadoop/MapReduce data processing versus classic OLAP. For this chat, let’s avoid the concern of price and also assume the business needs have been thought through.

Identity-based Cryptography

Thales eSecurity

In Advances in Cryptology – ASIACRYPT 2002, pages 548–566. Springer Verlag, 2002. Public key infrastructure (PKI) requires key distribution and has been long criticised for its usability issues [13,14,15]. In an experiment [15] conducted for analysing the usability of Mailvelop, a modern PGP tool rated 4.4 out of 5 stars on Chrome web store, 9 out of 10 pairs of participants failed to complete the assigned task of exchanging encrypted emails, i.e. 90% failure rate.

ABBYY Reports 25% Revenue Growth in 2017

Document Imaging Report

Ulf Persson became the CEO in January 2017, after serving as a member and the Chairman of ABBYY’s Board since 2002. MILPITAS, Calif., – Feb. 13, 2018 – ABBYY ® , a global provider of intelligent capture solutions to improve business outcomes, today announced the results of 2017. The company achieved a total revenue growth of 25%, the highest rate in five years.

Here’s a Story Where Picking the Right Font Was Never More Important: eDiscovery Trends

eDiscovery Daily

Per Ars Technica , Cambria was designed no earlier than 2004, while Calibri was designed between 2002 and 2004; both only became widely available in 2007. This is a story that a word geek like me can really appreciate. We talk a lot on this blog about the importance of metadata to provide additional useful information in discovery productions and help minimize the risk of fraud.

Recommended reading for Next Generation KM, Collaboration and Intranet 2.0

ChiefTech

2002, 'The Multi-faceted Nature of Virtual Teams' , Cahier du GreSI, no 02-11, November 2002. 2002, 'Collaborative Infrastructure Formation in Virtual Projects' , Journal of Global Information Technology Management, Vol. 2, 2002, pp.29-47. 2002, Emergence: The Connected Lives of Ants, Brains, Cities , Scribner, New York. This following is a combined list of recommended reading ( in addition to mine own work !)

Interview With Mark Myers on the Texas Digital Archive

The Texas Record

1] ATF104, 2002, Photographs, Texas Governor Rick Perry Press Office Files for First Lady Anita Perry. Devices used by Governor Rick Perry to create electronic records [1] This is the first in a two-part series exploring the Texas Digital Archive (TDA) with Electronic Records Specialist Mark Myers of the Archives and Information Services (ARIS) division at TSLAC. Mark is responsible for ingesting electronic records into the TDA.

New CMSWire article: A Brief History of Social Intranets

ChiefTech

Using 2002 (the date of Clay Shirky's social software summit) as my line in the sand, I explore the origins of social software before that time and what happened in the enterprise after that date

IT 40

Not Proof, but Another Lead: WikiLeaks' Latest Includes Google/China Tip

John Battelle's Searchblog

They have broken into American government computers and those of Western allies, the Dalai Lama and American businesses since 2002, cables said. According the the NYT's coverage of today's WikiLeaks trove (only a small percentage have been released publicly, the rest have been reviewed by the Times): China’s Politburo directed the intrusion into Google’s computer systems in that country, a Chinese contact told the American Embassy in Beijing in January, one cable reported.

Space and Beyond: Locating NASA Photographs Using Online Indexes

Unwritten Record

255-CC: Color Photograph Files, 1965 – 2002. Photograph of Gordon Cooper during Simulated Mercury Redstone Rocket Flight. Local Identifier: 255-G-61-MR3-61; National Archives Identifier: 17409778.

ELAR at SOAS to create new online archive to safeguard the world’s disappearing languages

Preservica

Founded in 2002 to preserve and make accessible endangered languages recordings as resources for linguists, social scientists and language communities, the Endangered Languages Archive documents and preserves humanities intangible cultural heritage encoded in endangered languages. ELAR at SOAS University of London, will use Preservica to protect and provide greater online access to over 16,000 hours of audio-visual recordings of endangered languages.

First Cyber Defence & Information Assurance courses to receive CILIP accreditation

CILIP

s Defence Academy, in 2002, Cranfield now offers a unique gateway for teaching, research and consultancy utilising a unique set of capabilities, expertise and facilities to deliver practical solutions that make a real difference to the lives of military personnel and civilians across the world. First Cyber Defence & Information Assurance courses to receive CILIP accreditation.

Nintex Acquires Process Management Leader Promapp

Document Imaging Report

Headquartered in Auckland, New Zealand, Promapp was founded in 2002 by Ivan Seselj and is co-owned by Richard Holmes. BELLEVUE, Wash.—July July 31, 2018—Nintex, the world’s leader in intelligent process automation (IPA), is pleased to announce it has acquired Promapp, a business process management software company which provides partners and customers new tools to better optimize business processes through a market leading visual process mapping solution.

Cloud 40

Reflecting on Data Citizens ‘19: The Future of Data Intelligence Starts Now

Collibra

Since then we’ve seen the number of CDOs at large organizations skyrocket from one in 2002 to a projected 10,000 by the end of next year. Each year after we close our annual Data Citizens conference I feel energized – but this year was particularly significant. Last week we hosted the largest Data Citizens yet, with close to 700 attendees representing over 300 companies from industries spanning financial services, utilities, telco, technology, retail, healthcare, universities, and more.

European Commission Plans to Upgrade e-Privacy Directive to a Regulation

Hunton Privacy

The e-Privacy Directive was enacted in 2002 and designed to protect the right to privacy and confidentiality of users of electronic communication services, such as Internet service and broadband providers. On December 12, 2016, Politico reported that the European Commission intends to replace the e-Privacy Directive with a Regulation.

GDPR 43

Guest Post - How important is digital document consistency?

AIIM

Prior to working with Y Soft, Mr. Koelewijn founded X-Solutions in late 2002 which was later acquired by Nuance in 2009. A repository containing documents that were digitized inconsistently or inaccurately presents a new set of problems for an organization, problems that can hinder the productivity gains they had hoped to achieve. Obviously digital document accuracy is particularly important for government and regulated industries.

Transition to Electronic Government: Signs of the Time

Preservica

In 2002, I accepted the position of Statewide Records and Forms Coordinator for the Wisconsin Department of Electronic Government (DEG). The department had been created in 2001 to increase state government's focus on the role of technology in state programs and to accelerate the provision of services electronically to its customers and business partners.

Judging Facebook's Privacy Shift

Schneier on Security

We wrote a similar essay in 2002 about judging Microsoft's then newfound commitment to security. Facebook is making a new and stronger commitment to privacy. Last month, the company hired three of its most vociferous critics and installed them in senior technical positions.

CloudNine Highlighted in G2 Crowd’s Spring 2018 Grid Report for eDiscovery

eDiscovery Daily

Founded in 2002, and based in Houston, Texas, CloudNine (www.eDiscovery.co) is a legal discovery technology company with expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Leading Business Solution Review Platform Recognizes CloudNine for eDiscovery Excellence.

IT 33

UK Supreme Court Rules Morrisons Not Vicariously Liable for Malicious Data Breach by Employee

Data Matters

2 [2002] UKHL 48. Case: WM Morrison Supermarkets plc v Various Claimants [2020] UKSC 12. In a decision that employers will welcome, the UK Supreme Court recently ruled that Morrison Supermarkets (Morrisons) was not vicariously liable for a data breach committed maliciously by a former employee who, acting to satisfy a personal vendetta against Morrisons, disclosed employee payroll data online.