Remove Article Remove Course Remove Financial Services Remove Government
article thumbnail

Data Protection and the Draft EU-UK Withdrawal Agreement: Ten Initial Conclusions

HL Chronicle of Data Protection

The draft text of the EU-UK withdrawal agreement was published by the UK Government and the European Union yesterday, providing some of the first concrete indicators of the possible direction of travel in the area of data protection. Analysis of the text has barely started, but some of our initial conclusions are outlined below.

GDPR 40
article thumbnail

CyberheistNews Vol 13 #13 [Eye Opener] How to Outsmart Sneaky AI-Based Phishing Attacks

KnowBe4

Per the Ecuadorian government, these attacks were fueled by attempts to intimidate the media. That, of course, is the opposite of what will happen." In a statement by Xavier Chango, the National Head of Forensic Science, "It's a military-type explosive, but very small capsules." This is where social engineering starts.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 8 – 14 January 2024

IT Governance

GB Rebekah Children’s Services Source (New) Non-profit USA Yes 2,805 Butte School District Source 1 ; source 2 (Update) Education USA Yes 2,658 Dignity Health Nevada St. Source (New) Real estate USA Yes 10 GB Unitex Source (New) Manufacturing USA Yes 9.5

article thumbnail

European Commission publishes long-awaited draft Regulation on Artificial Intelligence

DLA Piper Privacy Matters

The list of high risk AI systems (which may be expanded by the European Commission in due course), covers a wide range of applications including AI systems deployed in relation to credit scoring; essential public infrastructure; social welfare and justice; medical and other regulated devices; transportation systems.

article thumbnail

The Hacker Mind Podcast: Going Passwordless

ForAllSecure

Of course, there were some guesses and backward steps there too, as well. There's a caveat to this of course because they essentially elongate the use of passwords still. But the flipside, of course, is it allows this ecosystem to have usernames and passwords to still exist essentially and proliferate. That's a great use case.

article thumbnail

Nation-State-Sponsored Attacks: Not Your Grandfather’s Cyber Attacks

Data Matters

Attorney General described a recent takedown of a Russian government-sponsored botnet called Cyclops Blink before it was weaponized and caused damage. and foreign government agencies. government reported a significant rise in hacks perpetrated against private companies by nation-state-sponsored threat actors.

article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

And by de I'm an analyst at Javelin strategy and research where I do security risk and fraud for the financial services industry. It started because we we would go to conferences and where we read articles and you know magazines or newspapers or whatever. I went on to speak at DEF CON 18 When it was held in the Riviera.