Remove category
Remove Computer and Electronics Remove Cybersecurity Remove Definition Remove Encryption
article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

On 16 December 2020, the European Commission adopted a proposal for a Directive on measures for a high common level of cybersecurity across the Union (“NIS II Directive”) that revises the current Directive on Security of Network and Information Systems (“NIS Directive”). see also our previous blogpost on the NIS Directive).

article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

Earlier this month I spoke at a cybersecurity conference in Albany, N.Y. BK: But certainly there are some areas of computer hardware and network design where you absolutely must have far greater integrity assurance? BK: So is supply chain security more of a physical security or cybersecurity problem? National Security Agency.

Security 210
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China’s PIPL has finally arrived, and brings helpful clarification (rather than substantial change) to China’s data privacy framework

DLA Piper Privacy Matters

Definition of Personal information and Sensitive Personal information “Personal information” means any kind of information relating to an identified or identifiable natural person, either electronically or otherwise recorded, but excluding information that has been de-identified or anonymised.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Electronic Things. As I got older, I started to play around with computers. By then there were computer games, and at that time it wasn’t the single shooter games. Hammond: I tend to explain Capture the Flag is sort of gamified cybersecurity education. Really bored. So I would take things apart. Mechanical things.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Electronic Things. As I got older, I started to play around with computers. By then there were computer games, and at that time it wasn’t the single shooter games. Hammond: I tend to explain Capture the Flag is sort of gamified cybersecurity education. Really bored. So I would take things apart. Mechanical things.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

When we do the weekly supermarket shop online, we should be able to move our shopping list electronically. The Bill says that manual unstructured files come within that category. If you think that your data has been anonymised, according to the computational privacy group at Imperial College, you will be wrong.

GDPR 120
article thumbnail

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

Krebs on Security

From time to time, there emerge cybersecurity stories of such potential impact that they have the effect of making all other security concerns seem minuscule and trifling by comparison. based tech firm to secretly embed tiny computer chips into electronic devices purchased and used by almost 30 different companies.