article thumbnail

Cyber is Cyber is Cyber

Lenny Zeltser

Information security? Computer security, perhaps? If we examine the factors that influence our desire to use one security title over the other, we’ll better understand the nature of the industry and its driving forces. Are you in cybersecurity? Yet, the term cybersecurity is growing in popularity.

article thumbnail

University, Professional Certification or Direct Experience?

Security Affairs

So the knowledge is the focus and understanding what knowledge means could definitely help us to improve our teaching processes. In other words she knows that she doesn’t know some information for example who will be the victim. I am a computer security scientist with an intensive hacking background.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Snowden Ten Years Later

Schneier on Security

I fly a lot—a quarter of a million miles per year—and being put on a TSA list, or being detained at the US border and having my electronics confiscated, would be a major problem. So would the FBI breaking into my home and seizing my personal electronics. It definitely had an effect on me. Definitely.

article thumbnail

Massachusetts Revises Information Security Regulations and Extends Deadline for Compliance

Hunton Privacy

On August 17, 2009, Massachusetts announced revisions to its information security regulations and extended the deadline for compliance with those regulations. ” First and foremost, the revisions emphasize a more flexible, risk-based approach to developing an information security program. .”

article thumbnail

OilRig APT group: the evolution of attack techniques over time

Security Affairs

I am perfectly aware that such a division could just be indicative, as a matter of fact, is not a strict division between timing groups, it’s really hard to give a strong and strict attribution (at least in my personal point of view) and very often it’s definitely not “black and white”. group_a : from 2016 to August 2017 2.

article thumbnail

From Targeted Attack to Untargeted Attack

Security Affairs

For example a targeted attack might address Naval industry ( MartyMcFly example is definitely a great example) or USA companies ( Botnet Against USA, Canada and Italy is another great example) and are mainly built focusing specific target sectors. I am a computer security scientist with an intensive hacking background.

article thumbnail

GDPR and The Data Governance Imperative

AIIM

The Changing Nature of Personally Identifiable Information. The confluence of big data, cloud computing, social media, mobile devices collect and aggregate diverse data sets, which taken together, such as internet search habits and GPS tracking information may expose personally identifiable information.

GDPR 91