article thumbnail

RSAC insights: Security Compass leverages automation to weave security deeper into SecOps

The Last Watchdog

In this heady environment, the idea of attempting to infuse a dollop of security into new software products — from inception — seems almost quaint. History of product security. As a nod to security, nominal static analysis and maybe a bit of penetration testing gets done just prior to meeting a tight deployment deadline.

Security 183
article thumbnail

Best beginner cyber security certifications

IT Governance

Are you considering a career in cyber security? CompTIA Security+. The CompTIA Security+ qualification is widely considered to be one of the best introductions to the cyber security industry. The CompTIA Security+ qualification is widely considered to be one of the best introductions to the cyber security industry.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

President Biden Signs Two Bills Aimed at Enhancing Government Cybersecurity

Hunton Privacy

The Cybersecurity Act amends certain provisions of the Homeland Security Act of 2002. Department of Homeland Security (“DHS”) and state, local, tribal and territorial governments, as well as corporations, associations and the general public.

article thumbnail

FTC Announces Significant Updates to GLB Safeguards Rule

Hunton Privacy

Promulgated in 2002 pursuant to the Gramm-Leach-Bliley Act, the Safeguards Rule obligates covered financial institutions to develop, implement and maintain a comprehensive information security program that complies with the Rule’s requirements. Security Programs.

article thumbnail

Episode 229: BugCrowd’s Casey Ellis On What’s Hot In Bug Hunting

The Security Ledger

The post Episode 229: BugCrowd’s Casey Ellis On What’s Hot In Bug Hunting appeared first on The Security Ledger with Paul F. Programs like iDefense Labs Vulnerability Contributor Program (VCP) (launched in 2002) and TippingPoint’s Zero Day Initiative (2005) were accused -at the time- of incentivizing the work of criminals and bad actors. .

IoT 98
article thumbnail

The Belgian Constitutional Court annuls Data Retention Act

DLA Piper Privacy Matters

According to the preparatory documents of the Data Retention Act, the legislator deemed a specific, differentiated retention obligation impossible and, hence, opted for a general, non-differentiated retention obligation with strict safeguards in respect of security and access.

article thumbnail

EU Council Presidency Releases Proposed Amendments to Draft ePrivacy Regulation

Hunton Privacy

The EU Council Presidency also proposes a number of revisions to the recitals of the Draft ePrivacy Regulation, in which it gives some examples of situations where the legitimate interest ground can be relied upon for the use of cookies or similar technologies.

Metadata 107