article thumbnail

iPhone isn’t secureable enough for the South Korea military – but Android is via Apple Insider

IG Guru

The post iPhone isn’t secureable enough for the South Korea military – but Android is via Apple Insider first appeared on IG GURU. Check out the article here.

article thumbnail

China Issues Draft Data Security Law

Hunton Privacy

China has lacked a comprehensive data protection and data security law that regulates in detail requirements and procedures relating to the collection, processing, control and storage of personal data. Recently, another significant draft law on data security was issued by the Chinese legislative authority.

Security 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2022 Cyber Security Review of the Year

IT Governance

Although there have still been a few surprises, with the death of Queen Elizabeth II and blazing heatwaves across the UK to name but two, it was a familiar year in the cyber security landscape. Google , Clearview AI , and Meta all receives hefty penalties in 2022, demonstrating the continued important of effective information security.

Security 132
article thumbnail

Kodak Alaris and IDT Develop Smart Scanning Solution to Help DMVs Achieve Real ID Compliance

Info Source

The REAL ID Act establishes minimum security standards for license issuance and production and prohibits federal agencies from accepting for certain purposes driver’s licenses and identification cards from states not meeting the Act’s minimum standards. ROCHESTER, N.Y., Beginning October 1, 2021, the U.S.

article thumbnail

MY TAKE: DigiCert and Oracle partner to extend digital trust and scalable infrastructure globally

The Last Watchdog

Cavanagh As a latecomer to the hyperscale data center market , Oracle focused on its heritage of helping large enterprise customers securely and efficiently run their mission critical systems and applications, Cavanagh told me. “We They’re all becoming increasingly dependent on hyperconnectivity. I’ll keep watch and keep reporting.

Cloud 195
article thumbnail

European Union Implements Changes to Export Control Rules

Data Matters

Dual-use items have both military and civil applications. Systems, equipment, and components for defeating, weakening, or bypassing information security. Information security system. Enhanced due diligence and reporting obligations for businesses to show compliance with applicable export controls. Simulation software.

article thumbnail

Strengthen information protection with a Zero Trust Information Governance program

OpenText Information Management

“If you know the enemy and know yourself, you need not fear the result of a hundred battles.” – Sun Tzu, The Art of War A critical element of any security plan is to assert command and control of every route through your defenses.