article thumbnail

The GDPR: Requirements for encryption

IT Governance

Six months since the GDPR (General Data Protection Regulation) came into force, pseudonymisation and data encryption remain the only technology measures specifically mentioned in the famously technology-agnostic Regulation. But what exactly is meant by ‘pseudonymisation’ and ‘encryption’? To further protect data, we look to encryption.

article thumbnail

The European Space Agency Launches Hackable Satellite

Schneier on Security

Of course this is hackable: A sophisticated telecommunications satellite that can be completely repurposed while in space has launched. […]. We can assume strong encryption, and good key management. Still, seems like a juicy target for other governments.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BEST PRACTICES: Why pursuing sound ‘data governance’ can be a cybersecurity multiplier

The Last Watchdog

Related: What we’ve learned from the massive breach of Capitol At RSA 2020 , I learned about how one of the routine daily chores all large organizations perform — data governance — has started to emerge as something of a cybersecurity multiplier. A robust data archiving strategy puts data into tiers, Lahiri says.

article thumbnail

Navigating China, Episode 7: New China encryption law passed

DLA Piper Privacy Matters

The new PRC Encryption Law will come into force on 1 January 2020. It will bring fundamental changes to the sale, import and use of encryption technologies in China by foreign and domestic organizations. This contrasts with the previous regulatory focus just on encryption products.

article thumbnail

Expert Insight: Leon Teale

IT Governance

Secure remote working tips and VPN insights from our senior penetration tester Leon Teale is a senior penetration tester at IT Governance. Actually, it’ll be at its most secure if it’s set to use AES (Advanced Encryption Standard) encryption instead of the weaker Blowfish encryption.

article thumbnail

What is Cyber Extortion and How Can It Be Prevented?

IT Governance

The malicious software encrypts victims’ systems and forces them to pay money in return for the safe return of the data. Ransomware is a type of cyber attack in which criminal hackers plant malicious code on the victim’s systems, which cripples services and encrypts files. Then came the rise in ransomware.

IT 130
article thumbnail

Information Security vs Cyber Security: The Difference

IT Governance

This can include; Data encryption; Passwords; VPNs; Spam filters; Multi-factor authentication; Secure code review; and Anti-malware software. Any digital records must be protected appropriately, such as with access controls or data encryption. Examples of cyber security. Where do cyber security and information security overlap?