Remove category general
article thumbnail

SHARED INTEL: Mobile apps are riddled with security flaws, many of which go unremediated

The Last Watchdog

Some fresh evidence of this encouraging trend comes to us by way of shared intelligence from WhiteHat Security. Also, WhiteHat has been generating this report annually since 2006. The fact that more companies are participating in the hunt for security flaws in new apps is a good thing. Related: The tie between DevOps and SecOps.

Security 170
article thumbnail

2017 eDiscovery Case Law Year in Review, Part 1

eDiscovery Daily

years, let’s take a look back at 2017! Nonetheless, as always for the cases we did cover, we grouped them into common subject themes and will review them over the next few posts (a few of them could be categorized in more than one category, so we took our best shot). million in a settlement of a securities case against Bank of America.

Sales 44
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China Publishes Draft Regulations on Protecting the Security of Key Information Infrastructure

Hunton Privacy

On July 10, 2017, the Cyberspace Administration of China published a new draft of its Regulations on Protecting the Security of Key Information Infrastructure (the “Draft Regulations”), and invited comment from the general public. The Draft Regulations will remain open for comment through August 10, 2017.

article thumbnail

Struggling to find a DPO? Consider outsourcing

IT Governance

If your organisation is within the scope of the EU GDPR (General Data Protection Regulation) , you might be required to appoint a DPO (data protection officer). Process special categories of data on a large scale. This will be the case if you: Are a public authority or body; Regularly and systematically monitor data subjects; or.

GDPR 45
article thumbnail

GUEST ESSAY: The story behind how DataTribe is helping to seed ‘Cybersecurity Valley’ in Maryland

The Last Watchdog

GCIS was a Davos-level conference with no vendors and no selling, where scores of chief security information officers (CISOs), top CEO’s, industry and government thought leaders and leading innovators discussed the myriad challenges in and around cybersecurity and possible solutions in today’s environment. According to the U.S.

article thumbnail

What Is Encryption? Definition, How it Works, & Examples

eSecurity Planet

This guide will provide a high level overview of encryption and how it fits into IT through the following topics: How Encryption Works To understand how encryption works, we need to understand how it fits into the broader realm of cryptology, how it processes data, common categories, top algorithms, and how encryption fits into IT security.

article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

PPP wanted to give their past high school selves the infosec education they didn’t have. And if you're going for a certification like CISSP Computer Information Systems Security Professional, you'll need to have a breadth of experience across multiple domains. For example, when learning a new subject area.