article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

OneRep provides a consumer service that scrubs your personal information from Google and dozens of privacy-breaching websites. Byron is the founder and editor-in-chief of The Last Watchdog on Privacy & Security. Here is Erin’s Q&A column, which originally went live on OneRep’s well-done blog.)

article thumbnail

CNIL Releases Guidance on Teleworking

Hunton Privacy

According to the Guidance, employers must implement the following measures to secure their information systems: Ensuring that they have an IT charter or information security policy in place covering teleworking, or, at the very least, a set of minimum rules that must be complied with by each teleworking employee.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

California Bulks Up Security Breach Notification Requirements

Hunton Privacy

On August 31, 2011, California Governor Jerry Brown signed into law amendments to that state’s security breach notification statute. California agencies using substitute notice will be required to notify the Office of Information Security within the California Technology Agency.

article thumbnail

The time for government blockchain proofs of concept is now

CGI

General Services Administration (GSA) and other federal agencies have issued contracts for proofs of concept (POCs); the Department of Homeland Security has issued more than $1 million in blockchain startup grants; and the Departments of Defense and State have issued requests for white papers and held industry forums.

article thumbnail

When Consumerisation and Cloud Services = Shadow IT

CGI

There are more cloud services available than ever before, and the number of cloud services used in the workplace continues to increase at a phenomenal rate, spanning both sanctioned cloud services (aka sanctioned IT) and shadow cloud services (aka shadow IT). sensitive data often being shared through public links etc.

Cloud 40
article thumbnail

What will be your decisive moment to secure your cloud applications in a Zero Trust world?

Thales Cloud Protection & Licensing

Secure and successful management of data access may still be an Achilles’ heel for many organizations, but if there’s a silver lining to cloud breaches, it’s that they highlight where changes need to be made. Investments in IT security are on the rise and policies are evolving for the better.

Cloud 114
article thumbnail

The Original APT: Advanced Persistent Teenagers

Krebs on Security

.” LAPSUS$ seems to have conjured some worst-case scenarios in the minds of many security experts, who worry what will happen when more organized cybercriminal groups start adopting these techniques. “They were calling up consumer service and tech support personnel, instructing them to reset their passwords.

Phishing 227