article thumbnail

President Biden Signs Two Bills Aimed at Enhancing Government Cybersecurity

Hunton Privacy

The Cybersecurity Act amends certain provisions of the Homeland Security Act of 2002. On June 21, 2022, President Biden signed into law, the State and Local Government Cybersecurity Act of 2021 (S. 2520) (the “Cybersecurity Act”) and the Federal Rotational Cyber Workforce Program Act (S.

article thumbnail

Episode 229: BugCrowd’s Casey Ellis On What’s Hot In Bug Hunting

The Security Ledger

Programs like iDefense Labs Vulnerability Contributor Program (VCP) (launched in 2002) and TippingPoint’s Zero Day Initiative (2005) were accused -at the time- of incentivizing the work of criminals and bad actors. . When the first bugs for cash programs emerged almost two decades ago, they were controversial.

IoT 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

HHS updates online tracker guidance

Data Protection Report

Our readers may recall that HHS had originally issued the Bulletin in December of 2002, which we summarized here. HHS’ changes are generally clarifications and additional examples. This post will focus on the changes to the original guidance. like a standard analytics cookie).

article thumbnail

EU Council Presidency Releases Proposed Amendments to Draft ePrivacy Regulation

Hunton Privacy

The EU Council Presidency also proposes a number of revisions to the recitals of the Draft ePrivacy Regulation, in which it gives some examples of situations where the legitimate interest ground can be relied upon for the use of cookies or similar technologies.

Metadata 107
article thumbnail

Guest Post - How important is digital document consistency?

AIIM

Finally, automated scan workflows can define the document destination for example, a third party repository, an on-premise shared folder or line of business application. For example, the workflow may prompt the user to select from a menu the type of document which becomes part of the filename along with the date the scan is made.

article thumbnail

The history of ESG: A journey towards sustainable investing

IBM Big Data Hub

This helped normalize the practice of ESG reporting and by 2002, 245 companies had responded to the 35 investors who asked for climate disclosures. Some prominent examples include the Principles for Responsible Investment (PRI), the Climate Disclosure Standards Board (CDSB) and the Sustainability Accounting Standards Board (SASB).

article thumbnail

MY TAKE: New ‘cyberthreat index’ shows SMBs cognizant of big risks, ill-prepared to deal with them

The Last Watchdog

The company got its start in 2002 in Gulf Breeze, Florida, as a two-man operation that set out to help small firms filter the early waves of email spam. For example, Gill pointed to the Eternal Blue exploit that was infamously stolen from NSA, and then posted publicly, free for anyone to use, by the Shadowbrokers’ crew.

Risk 182