Remove 2011 Remove Examples Remove Retail Remove Security
article thumbnail

GUEST ESSAY: Here’s why penetration testing has become a ‘must-have’ security practice

The Last Watchdog

Yes, and that is what Sony exactly lost when they were hacked and the personal info of every one of its customers leaked in 2011. Now, let me give you a few reasons, why pen testing has emerged as a “must-have” security practice. For example, your website security may prove strong, applications not so much.

Security 233
article thumbnail

Cybersecurity Identified as an SEC OCIE Examination Priority for 2018

Data Matters

For example, in September 2015, the SEC announced a $75,000 fine (among other things) against R.T. For an in-depth discussion regarding the entirety of the 2018 Exam Priorities, see Sidley’s previous analysis here. . safeguards for the protection of customer records and information.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ireland: New DPC Guidance Sets Regulatory Expectations around Use of Website Cookies

DLA Piper Privacy Matters

In its report, the DPC noted that the ad-tech industry is subject to separate inquiries – this report is more broadly focussed on organisations across a range of sectors, including retail, entertainment, insurance, banking, public sector, media and publishing. This could be through plugins, widgets, or social media sharing tools, for example.

GDPR 59
article thumbnail

FTC Issues Landmark Privacy Report

Hunton Privacy

In the offline context, this could include, for example, having a cashier in a retail store “ask the customer whether he would like to receive marketing offers from other companies.”. The FTC report is expected to be followed by a separate privacy report from the Department of Commerce.

Privacy 40
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

For example, in March of 2016, two researchers, Mike Ahmadi and Billy Rios independently reported an astounding fourteen hundred vulnerabilities to CareFusion's Pyxis SupplyStation, an automated, networked, supply cabinet used to store and dispense supplies. Especially in the world of security standards. He’s well known.

IT 52
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

For example, in March of 2016, two researchers, Mike Ahmadi and Billy Rios independently reported an astounding fourteen hundred vulnerabilities to CareFusion's Pyxis SupplyStation, an automated, networked, supply cabinet used to store and dispense supplies. Especially in the world of security standards. He’s well known.

IT 52
article thumbnail

EUROPE: Article 29 Working Party publish draft Guidelines on Consent

DLA Piper Privacy Matters

The guidelines expand on the WP29’s ‘ Opinion on the definition of consent’ (July 2011), addressing the concept of consent in the context of the enhanced regulatory regime under the GDPR. The GDPR Recitals and ICO guidance both mention that unambiguous consent may be secured by, e.g. , ticking a box. Demonstrating consent.

GDPR 40