Remove category
Remove Computer and Electronics Remove Definition Remove Encryption Remove Marketing
article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

Annex II includes entities in the following sectors: energy, transport, banking, financial market infrastructures, health, drinking water supply and distribution and digital infrastructure. A DSP is an information society service that is an online marketplace, an online search engine or a cloud computing service.

article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

BK: But certainly there are some areas of computer hardware and network design where you absolutely must have far greater integrity assurance? Once I know I can trace back the construction of a computer board to a certain place, you’ve built a different kind of security challenge for the attacker. It’s a hard problem category.

Security 208
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China’s PIPL has finally arrived, and brings helpful clarification (rather than substantial change) to China’s data privacy framework

DLA Piper Privacy Matters

Definition of Personal information and Sensitive Personal information “Personal information” means any kind of information relating to an identified or identifiable natural person, either electronically or otherwise recorded, but excluding information that has been de-identified or anonymised.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

Data is not just a resource for better marketing, better service and delivery. When we do the weekly supermarket shop online, we should be able to move our shopping list electronically. The Bill says that manual unstructured files come within that category. Data is used to build products themselves.

GDPR 120
article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Electronic Things. As I got older, I started to play around with computers. By then there were computer games, and at that time it wasn’t the single shooter games. I mean, what curious kid hasn’t taken apart something electronic to try and figure it out on their own? Okay a few more definitions up front.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Electronic Things. As I got older, I started to play around with computers. By then there were computer games, and at that time it wasn’t the single shooter games. I mean, what curious kid hasn’t taken apart something electronic to try and figure it out on their own? Okay a few more definitions up front.

article thumbnail

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

Krebs on Security

-based tech firm to secretly embed tiny computer chips into electronic devices purchased and used by almost 30 different companies. It also dominates the $1 billion market for boards used in special-purpose computers, from MRI machines to weapons systems. In a nutshell, the Bloomberg story claims that San Jose, Calif.