Remove Course Remove Insurance Remove Manufacturing Remove Meeting
article thumbnail

The Week in Cyber Security and Data Privacy: 20 – 26 November 2023

IT Governance

9 million records breached through decade-long data leak A former temporary employee of a subsidiary of NTT West (Nippon Telegraph and Telephone West Corp) illegally accessed about 9 million personal data records over the course of a decade (2013 to 2023). Breached records: more than 56 million. That’s it for this week’s round-up.

article thumbnail

62% of organisations unaware of the GDPR

IT Governance

Almost two thirds (62%) of respondents hadn’t heard of the Regulation, and only about 10% had taken steps to meet its compliance requirements. The finance and insurance (79%), information or communications (67%) and education (52%) sectors have the highest awareness of the GDPR. Preparing for the GDPR.

GDPR 63
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsegmentation Is Catching On as Key to Zero Trust

eSecurity Planet

Microsegmentation is needed, Katz said, because traditional security measures simply aren’t sufficient to meet many of today’s challenges. ” And while real-time threat management is of course a key consideration for network security, Katz said, that’s also achievable from countless other security vendors and tools.

article thumbnail

MY TAKE: Can Hollywood’s highly effective ‘source-code’ security tools help make IoT safe?

The Last Watchdog

Related: HBO hack spurs cyber insurance market. I recently had the chance to meet with Mark Hearn and John O’Connor, of Irdeto, a 50-year-old software security and media technology company based in Amsterdam that has been a leading supplier of source code tracking and fingerprinting systems for big media companies. Makes sense, though.

IoT 133
article thumbnail

The Hacker Mind Podcast: Hacking High-Tech Cars

ForAllSecure

And there'd be no way to set the phone to vibrate during a meeting except by powering it off. As more and more automotive manufacturers start incorporating computer technology into their expensive BMWs, Mercedes Ferraris and Porsches. This streetwise criminal realized he could defeat the manufacturers' anti theft software with his own.

article thumbnail

Who Is Infosource? An Interview With Johann Hoepfner About Printing, Capture, and More

Info Source

And of course there is a strong relationship nowaday between capture software and the hardware. Frequently in the past we have had hardware manufacturers ask us about software, not just capture and imaging but also document management software and solutions. All of the printer, copier manufacturers were there.

Paper 52
article thumbnail

The Week in Cyber Security and Data Privacy: 11 – 18 December 2023

IT Governance

According to Delta Dental’s breach notification, affected personal data included addresses, Social Security numbers, driver’s license numbers or other state identification numbers, passport numbers, financial account information, tax identification numbers, individual health insurance policy numbers and health information.