Remove category security-breach
article thumbnail

California Enacts Broad Privacy Laws Modeled on GDPR

Data Matters

It was also the first to enact data breach notification legislation, which all other states have now followed. Specific categories defined as personal information include. Additionally, there is a category of personal information that includes profiles created from inferences derived from other types of personal information.

GDPR 79
article thumbnail

California Enacts Broad Privacy Protections Modeled on GDPR

Data Matters

It was also the first to enact data breach notification legislation, which all other states have now followed. Specific categories defined as personal information include. Additionally, there is a category of personal information that includes profiles created from inferences derived from other types of personal information.

GDPR 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

In this episode I talk about how Heartbleed (CVE 2014-0160) was found and also interview Rauli Kaksonen, someone who was at Codenomicon at the time of its discovery and is now a senior security specialist at the University of Oulu in Finland, about how new security tools are still needed to find the next big zero day. Apple Podcasts.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

In this episode I talk about how Heartbleed (CVE 2014-0160) was found and also interview Rauli Kaksonen, someone who was at Codenomicon at the time of its discovery and is now a senior security specialist at the University of Oulu in Finland, about how new security tools are still needed to find the next big zero day. Apple Podcasts.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

In this episode I talk about how Heartbleed (CVE 2014-0160) was found and also interview Rauli Kaksonen, someone who was at Codenomicon at the time of its discovery and is now a senior security specialist at the University of Oulu in Finland, about how new security tools are still needed to find the next big zero day. Apple Podcasts.

article thumbnail

The bleak picture of two-factor authentication adoption in the wild

Elie

This post looks at two-factor authentication adoption in the wild, highlights the disparity of support between the various categories of websites, and illuminates how fragmented the two factor ecosystem is in terms of standard adoption. reuse of passwords found in data breaches and phishing attacks. Support for various categories.

article thumbnail

Capture the Flag events and eSports

Adam Shostack

Capture the Flag Events (CTFs) and electronic Sports (eSports) are good examples of a relatively new trend. It was during a collective gathering of a StarCraft II tournament in 2011, called BarCraft Montreal. BarCraft Montreal 2011. This natural selection of attention can inspire an evolution of methods and practices.