Remove Computer and Electronics Remove Examples Remove Industry Remove Insurance
article thumbnail

The U.S. Office of the Comptroller of the Currency Seeks Comment on Digital Innovation by Banks

Data Matters

The ANPR offers industry participants an opportunity to shape future guidance and remove regulatory burdens to offering innovative new products, partnering with technology companies and enhancing operations through deployment of new technologies. After recounting some of the ways in which past guidance has addressed innovation (e.g.,

article thumbnail

Podcast Episode 119: EFF on Expanding Researchers Rights and AT&T talks IoT Security Fails

The Security Ledger

In this episode of the podcast, #119: Electronic Frontier Foundation General Counsel Kurt Opsahl joins us to talk about the Coders’ Rights Project. In this episode of the podcast, #119: Electronic Frontier Foundation General Counsel Kurt Opsahl joins us to talk about the Coders’ Rights Project. Read the whole entry. »

IoT 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Extending intranets to hard-to-reach staff: Controlled documents kiosk example

ChiefTech

The IBF list the following examples of hard-to-reach staff: factory workers retail staff field engineers building inspectors consultants sales teams flight and rail workers catering staff building inspectors call centre representatives insurance assessors.

article thumbnail

Fund Managers Targeted in Sophisticated Cyberattacks

Data Matters

For remote access to emails, trading systems and other electronic data containing confidential information, the authentication mechanism should utilize at least two of the following factors: what a person knows (e.g., Insurance: The firm should communicate with its insurance company and review policy coverage. biometrics).

article thumbnail

Fund Managers Targeted in Sophisticated Cyberattacks

Data Matters

For remote access to emails, trading systems and other electronic data containing confidential information, the authentication mechanism should utilize at least two of the following factors: what a person knows (e.g., Insurance: The firm should communicate with its insurance company and review policy coverage. biometrics).

article thumbnail

Who Is Infosource? An Interview With Johann Hoepfner About Printing, Capture, and More

Info Source

, I had a conversation with Johann Hoepfner, Managing Director, about the combination of Infosource, DIR, and Harvey Spencer Associates ; the industry; and a few other items snuck in too. Q: Why did they decide to cover the printing industry? Q: Why did they decide to cover the printing industry? Q: Who Is Infosource?

Paper 52
article thumbnail

Me on the Equifax Breach

Schneier on Security

I am a board member of the Electronic Frontier Foundation, AccessNow, and the Tor Project; and an advisory board member of Electronic Privacy Information Center and VerifiedVoting.org. This was not a minor vulnerability; the computer press at the time called it "critical." It confessed to another data leak in January 2017.