Remove 11
Remove 2020 Remove Article Remove Insurance Remove IT
article thumbnail

A Serial Tech Investment Scammer Takes Up Coding?

Krebs on Security

Several articles here have delved into the history of John Bernard , the pseudonym used by a fake billionaire technology investor who tricked dozens of startups into giving him tens of millions of dollars. The scam artist John Bernard a.k.a. ” The team from CodesToYou. Official incorporation documents from the U.K.’s

article thumbnail

Cybersecurity Standards for the Insurance Sector – A New Patchwork Quilt in the US?

HL Chronicle of Data Protection

In the past two years, multiple state bills that have been introduced in the US to provide for cybersecurity requirements and standards to the insurance sector, with recent legislative activity taking place in particular within the States of Ohio, South Carolina, and Michigan. NYDFS: Setting a new bar for state cybersecurity regulation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Impact of Data Protection Laws on Your Records Retention Schedule

ARMA International

The purpose of this article is to remove the fear and intimidation of domestic and global data protection laws and show how these laws and requirements are consistent with the existing objectives of your records retention schedule and information governance policy. Definition and Purpose of a Records Retention Schedule.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

The previous article –Part 2 of this 3-part series – discussed DT by imagining how the “art of the possible” can help define the end state of the DT journey. This includes defining the product scope of the DT journey and the digital products and services that will deliver transformative change for a new future. Introduction.

article thumbnail

UK: Supreme Court judgment in Morrisons – employer not vicariously liable for data breach

DLA Piper Privacy Matters

In applying this test, the courts must consider: what function or “field” of activities” the employer has entrusted to the employee; then. whether there was sufficient connection between the position in which he was employed and his wrongful conduct to make it right for the employer to be held liable under the principle of social justice.

article thumbnail

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

This article looks at the top digital forensic software tools of 2021 and what customers should consider when buying or acquiring a DSF tool. While several open-source tools exist for disk and data capture, network analysis, and specific device forensics, a growing number of vendors are building off what’s publicly available.

article thumbnail

CyberheistNews Vol 13 #11 [Heads Up] Employees Are Feeding Sensitive Biz Data to ChatGPT, Raising Security Fears

KnowBe4

CyberheistNews Vol 13 #11 | March 14th, 2023 [Heads Up] Employees Are Feeding Sensitive Biz Data to ChatGPT, Raising Security Fears Robert Lemos at DARKReading just reported on a worrying trend. I'm giving you a short extract of the story and the link to the whole article is below.