CISA's Krebs: 2016 US Elections Were Cyber 'Sputnik' Moment

Data Breach Today

Cybersecurity Agency Ranks Election Security and Ransomware as Biggest Threats The 2016 U.S.

Ransomware Hit a Florida Voting System in 2016

Data Breach Today

County Officials Reveal Details of the Attack Election officials in Palm Beach County, Florida, revealed this week that its voter registration system was hit by ransomware in the weeks leading up to the 2016 presidential election

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Predictions 2016: Apple, Tesla, Google, Medium, Adtech, Microsoft, IoT, and Business on a Mission

John Battelle's Searchblog

The post Predictions 2016: Apple, Tesla, Google, Medium, Adtech, Microsoft, IoT, and Business on a Mission appeared first on John Battelle's Search Blog. it was really you who’ve encouraged me to have at it again for 2016. Have a great 2016, everyone!

IoT 81

Report: U.S. Struggled to Counter 2016 Election Interference

Data Breach Today

Senate Intelligence Committee released its third report on Russian interference during the 2016 presidential election, finding that the Obama administration struggled to respond and more needs to be done to avoid disruption this year

IT 160

Predictions 2016: How’d I Do?

John Battelle's Searchblog

The post Predictions 2016: How’d I Do? Here’s a short report card for each of my twelve 2016 predictions. #1 1 – 2016 will be the year that “business on a mission” goes mainstream. Related: Predictions 2016 . The post Predictions 2016: How’d I Do?

IoT 52

Russia Targeted All 50 States During 2016 Election: Report

Data Breach Today

Senate Intelligence Committee finds that Russia targeted election systems and infrastructure in all 50 states during the run-up to the 2016 Presidential elections. Senate Intelligence Committee Report Finds Extensive Interference A report from the U.S.

189
189

2016 InfoGov Expert of the Year Award

JKevinParker

See also: My Reflections on the 2016 InfoGovCon. I was honored at the 2016 Information Governance Conference to be named InfoGov Expert of the Year. This award is for "an Information Governance leader who has demonstrated leading expertise in 2016."

Speaking at InfoGovCon 2016

JKevinParker

I'm very excited to be speaking at this year's InfoGovCon in Providence, RI. The conference is October 11-12. The lineup of speakers is excellent. This is the first year I get to go to InfoGovCon and I have the honor of presenting. Make plans to attend. You won't be disappointed.

Post Brexit, what options are available for a GDPR-light Data Protection Act?

Data Protector

Let’s think the unthinkable. Lets assume that, post Brexit, the British Government has an opportunity to decide how its data protection legislation should reflect the requirements of an aspiring British economy.

GDPR 170

My 7 top security publications from the ICO

Data Protector

Encryption (Mar 2016) This 35-page guide highlights, through a range of practical scenarios, when different encryption strategies can help provide a greater level of protection. A practical guide to IT security (Jan 2016).

DHS report – Voting systems in North Carolina county in 2016 were not hacked

Security Affairs

Computer faults that disrupted voting in a North Carolina county in 2016 were not caused by cyber attacks, a federal investigation states. The analysis of laptops used in some Durham County precincts on Election Day in November 2016 showed inaccurate data to poll workers.

My (somewhat unreliable) data protection predictions for 2017

Data Protector

I’ve recently had a quiet year on the blogging front – my professional duties have prevented me from playing a more active role on the Internet during this year than I would have liked, but that is set to change in 2017.

GDPR 156

Apollo – they can’t still be up to their old tricks?

Data Protector

Two years ago I blogged about an unsettling experience I had with Apollo, a firm that had confused me as to what they were really all about. Since then, I’ve had a number of emails from people who have had similar experiences.

IT 156

Reflections on the 2016 AIIM Conference

JKevinParker

I loved being an attendee, I enjoyed speaking, and I was honored to receive the 2016 AIIM Leadership Award for Social Buzz. Read my full reflections on LinkedIn Pulse: Reflections on the 2016 AIIM Conference. AIIM16 in New Orleans is over, and I must say it was a fantastic experience.

IT 52

2016 AIIM Leadership Award for Social Buzz

JKevinParker

I was honored at the 2016 AIIM Conference to receive the 2016 AIIM Leadership Award for Social Buzz. This award "recognizes individuals whose outstanding leadership within our community goes above and beyond to benefit the advancement of the information management industry and AIIM".

IT 52

750 days to go before the new data protection rules bite

Data Protector

How often do organisations get 750 days’ notice of new rules that may require them to make huge changes to comply? Well, it’s happened.

A (light hearted and) handy guide to privacy activists for the under 10s

Data Protector

Privacy activists in the olden days There weren’t many privacy activists in the olden days. This was because there was no Internet, and very few people had heard of the Data Protection Commissioner.

TeamViewer Admits Breach from 2016

Dark Reading

The company says it stopped the attack launched by a Chinese hacking group

IT 76

Hackers penetrated NEC defense business division in 2016

Security Affairs

Japanese electronics and IT giant NEC confirmed a security breach suffered by its defense business division in December 2016. The IT giant NEC confirmed that the company defense business division has suffered a security breach back in December 2016.

IAPP Europe Data Protection Congress 2016

Hunton Privacy

Join us at the International Association of Privacy Professionals (“IAPP”) Data Protection Congress in Brussels, November 9-10, 2016. Hunton & Williams privacy professionals will be featured speakers in the following sessions: Addressing Risky Processing Under the GDPR: A Practical Approach. Thursday, November 10, 1:30 p.m.

GDPR 40

Roughtime

Imperial Violet

Security protocols often assume an accurate, local clock (e.g. TLS, Kerberos, DNSSEC and more). It's a widely accepted assumption when designing protocols but, for a lot of people, it just isn't true. We find good evidence that at least 25% of all certificate errors in Chrome are due to a bad local clock. Even when the local clock is being synchronised, it's very likely to be using unauthenticated NTP.

DrupalCon Europe 2016 – Building a Security Framework for Your Websites

PerezBox

Last week I spent a few days in beautiful Dublin, Ireland for DrupalCon Europe 2016. The post DrupalCon Europe 2016 – Building a Security Framework for Your Websites appeared first on PerezBox. I had the opportunity to present a new presentation in which I try to introduce. Read More. Security Web And Information Security

Scrutinizing the draft Investigatory Powers Bill

Data Protector

Is there really sufficient time to consider other elements – such as overhauling the bulk data and equipment interference provisions in 2016? Looking at the 2016 Parliamentary holidays for the House of Commons (the House of Lords will set slightly different dates), the February recess is from today (11 February) until 22 February. The point about pre-legislative scrutiny is that a parliamentary bill gets a good prod before it begins its usual passage through Parliament.

Chinese state-sponsored hackers breached TeamViewer in 2016

Security Affairs

The German newspaper Der Spiegel revealed that the software company behind TeamViewer was compromised in 2016 by Chinese hackers. China-linked hackers breached German software company behind TeamViewer in 2016, this news was reported by the German newspaper Der Spiegel.

InfoGov 2016: The State of Enterprise Information

JKevinParker

The information experts at Optismo and InfoGovCon have published a new report called " Information Governance 2016: The State of Enterprise Information (Part 1) ". This important research paints a bleak picture of Information Governance maturity in today's enterprises. I was excited to see one of my responses quoted in this research: InfoGovCon: "Do you believe the term 'Enterprise Content Management' is still helpful or still has meaning?".

ECM 40

Google Capitulates to Facebook’s Identity Machine: Is This Good News For The Open Web?

John Battelle's Searchblog

The post Google Capitulates to Facebook’s Identity Machine: Is This Good News For The Open Web? appeared first on John Battelle's Search Blog. Long time readers of this site know that once a year I make predictions, and revisit those I made the year before. But it’s not often I look back farther than one year to see if perhaps I was just a tad too early. It appears in the case of Google and personal data, I was.

I feel terrible about this site.

John Battelle's Searchblog

The post I feel terrible about this site. appeared first on John Battelle's Search Blog. I don’t write here anymore. I write almost entirely on Medium now. It’s not a choice I made to NOT write here, it’s a choice I made to edit NewCo Shift , our new publication.

IT 72

The NewCo-BigCo Shift or, These Nine Things Will Change Business Forever

John Battelle's Searchblog

The post The NewCo-BigCo Shift or, These Nine Things Will Change Business Forever appeared first on John Battelle's Search Blog. Addressing the crowd at Dollar Shave before interviewing CEO Michael Dubin during NewCo LA last November. cross posted from NewCo ).

Why can’t we be briefed like the President?

Attensa

It started with a simple question posed by a senior marketing exec during a staff meeting.

Cryptographic Agility

Imperial Violet

( These are notes that I wrote up from a talk that I gave at the National Academies Forum on Cyber Resilience. You can tell that it was in Washington, DC because of the “cyber”. I wasn't quite sure how technical to pitch this talk so it's relatively introductory; regular readers probably know all this. This isn't a transcript of what I said, but I try to hit the main points in my notes. ). Firstly I'd like to separate extensibility from agility.

Revealed: 2016 Russian Troll Activity More Lucrative and Widespread

Adam Levin

Online activity by Russian trolls in the lead-up to the 2016 election was significantly more widespread than initially estimated, cybersecurity firm Symantec concluded. The post Revealed: 2016 Russian Troll Activity More Lucrative and Widespread appeared first on Adam Levin.

IT 97

Information Governance Must Change

PHIGs

Information governance (IG) is all the rules, regulations, legislation, standards, and policies with which organizations need to comply when they create, share, and use information. Governance is mandated internally and externally. PHIGs IMC Inc – 2014 ).

How to Work Beyond the Corporate Firewall Safely

JKevinParker

Today's workforce is increasingly distributed, increasingly mobile, and increasingly expecting telework options. This equates to more people working beyond the corporate walls and beyond the corporate IT firewall.

Paper 97

memcpy (and friends) with NULL pointers

Imperial Violet

The C standard (ISO/IEC 9899:2011) has a sane-seeming definition of memcpy (section 7.24.2.1): The memcpy function copies n characters from the object pointed to by s2 into the object pointed to by s1. Apart from a prohibition on passing overlapping objects, I think every C programmer understands that.

European Data Protection Supervisor Publishes Priorities for 2016

Hunton Privacy

On January 7, 2016, the European Data Protection Supervisor (the “EDPS”) published his Priorities for 2016. The EDPS Priorities consists of a cover note listing the strategic priorities of the EDPS in 2016 and a color-coded table listing the European Commission’s proposals that require the EDPS’ attention, per level of priority. Initiatives Related to the European Commission’s Work Programme for 2016.

Privacy Blog Nominated for Best AmLaw Blog of 2016 – Please Vote To Help Us Win!

Hunton Privacy

Hunton & Williams LLP is proud to announce our Privacy & Information Security Law Blog has been nominated in The Expert Institute’s 2016 Best Legal Blog Contest for Best AmLaw Blog of 2016. From all of the editors, lawyers and contributors that make our blog a success, we appreciate your continued support and readership, and ask that you please take a moment to vote for our blog!

Taps ‘n’ Apps: Craft Beer Meets the Cloud

PHIGs

Note : this post contains links to every craft brewery in British Columbia and Alberta that I could find. Sadly, I have yet to sample all of their wares.

Cloud 64

The Waze Effect: Flocking, AI, and Private Regulatory Capture

John Battelle's Searchblog

The post The Waze Effect: Flocking, AI, and Private Regulatory Capture appeared first on John Battelle's Search Blog. image). A couple of weeks ago my wife and I were heading across the San Rafael bridge to downtown Oakland for a show at the Fox Theatre.

Risk 70

On Tech Leadership

John Battelle's Searchblog

The post On Tech Leadership appeared first on John Battelle's Search Blog. I’ve written a piece over on NewCo that I wanted to also post it here.

Healthcare Ransomware Damage Passes $157M Since 2016

Dark Reading

Researchers found the total cost far exceeded the amount of ransom paid to attackers