Remove category
Remove Computer and Electronics Remove Encryption Remove Marketing Remove Security Remove Training
article thumbnail

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

Krebs on Security

From time to time, there emerge cybersecurity stories of such potential impact that they have the effect of making all other security concerns seem minuscule and trifling by comparison. based tech firm to secretly embed tiny computer chips into electronic devices purchased and used by almost 30 different companies.

article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

On 16 December 2020, the European Commission adopted a proposal for a Directive on measures for a high common level of cybersecurity across the Union (“NIS II Directive”) that revises the current Directive on Security of Network and Information Systems (“NIS Directive”). see also our previous blogpost on the NIS Directive).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China’s PIPL has finally arrived, and brings helpful clarification (rather than substantial change) to China’s data privacy framework

DLA Piper Privacy Matters

Definition of Personal information and Sensitive Personal information “Personal information” means any kind of information relating to an identified or identifiable natural person, either electronically or otherwise recorded, but excluding information that has been de-identified or anonymised.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Electronic Things. As I got older, I started to play around with computers. By then there were computer games, and at that time it wasn’t the single shooter games. Vamosi: Today, John has taken his juvenile curiosity in breaking things down to become a security researcher with Huntress Labs. Really bored.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Electronic Things. As I got older, I started to play around with computers. By then there were computer games, and at that time it wasn’t the single shooter games. Vamosi: Today, John has taken his juvenile curiosity in breaking things down to become a security researcher with Huntress Labs. Really bored.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

Data is not just a resource for better marketing, better service and delivery. When we do the weekly supermarket shop online, we should be able to move our shopping list electronically. How then will we secure adequacy without adhering to the charter? Data is used to build products themselves.

GDPR 120