Remove 2002 Remove Encryption Remove Government Remove Security
article thumbnail

FTC Announces Significant Updates to GLB Safeguards Rule

Hunton Privacy

Promulgated in 2002 pursuant to the Gramm-Leach-Bliley Act, the Safeguards Rule obligates covered financial institutions to develop, implement and maintain a comprehensive information security program that complies with the Rule’s requirements. Security Programs.

article thumbnail

MY TAKE: New ‘cyberthreat index’ shows SMBs cognizant of big risks, ill-prepared to deal with them

The Last Watchdog

I often see a sizable gap between perceptions and reality among many SMB leaders,” Troy Gill a senior security analyst at AppRiver told me. I had the chance at RSA 2019 to discuss the SMB security landscape at length with Gill. Last February, Dallas-based email encryption vendor Zix Corp. That need is sizeable. Talk more soon.

Risk 182
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Judging Facebook's Privacy Shift

Schneier on Security

In security and privacy, the devil is always in the details -- and Zuckerberg's post provides none. Better security for collected user data. Facebook has a large and skilled product security team that says some of the right things. Shutting down a feature based on internal security analysis would be a clear message.

Privacy 86
article thumbnail

A Cyber Insurance Backstop

Schneier on Security

After Merck filed its $700 million claim, the pharmaceutical giant’s insurers argued that they were not required to cover the malware’s damage because the cyberattack was widely attributed to the Russian government and therefore was excluded from standard property and casualty insurance coverage as a “hostile or warlike act.”

article thumbnail

Identity-based Cryptography

Thales Cloud Protection & Licensing

out of 5 stars on Chrome web store, 9 out of 10 pairs of participants failed to complete the assigned task of exchanging encrypted emails, i.e. 90% failure rate. The most common mistake that repeatedly occurred in all of these studies [13,14,15] was to encrypt a message with the sender’s public key. This type of scheme (e.g., [8,9])

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Naturally, database vendors are leading providers of database security tools, and a growing number of cloud-based database providers are moving deeper into the data security space. Security is paramount. Starting our list of the top database security vendors is the multinational cloud computing company, Alibaba Cloud.

Security 114
article thumbnail

Public cloud vs. private cloud vs. hybrid cloud: What’s the difference?

IBM Big Data Hub

Internet companies like Amazon led the charge with the introduction of Amazon Web Services (AWS) in 2002, which offered businesses cloud-based storage and computing services, and the launch of Elastic Compute Cloud (EC2) in 2006, which allowed users to rent virtual computers to run their own applications.

Cloud 107