Remove 10
Remove 2015 Remove Cybersecurity Remove Exercises Remove Security
article thumbnail

Vladimir Putin ‘s computers still run Windows XP, Media reports

Security Affairs

The news is curious and it probably has little real if not the fact that Vladimir Putin is not a super cyber security expert, although he knows its importance very well. Nowadays it is a suicide to use a computer running Windows XP because the OS doesn’t receive security updates and it is quite easy to find working exploits online.

article thumbnail

Singapore proposes changes to cybersecurity and data protection regimes

Data Protection Report

In a bid to keep pace with advancements in the technological landscape, the Singapore Government has in recent months embarked on public consultations on its draft Cybersecurity Bill (the Cyber Bill) and its proposed amendments to Singapore’s Personal Data Protection Act (PDPA) to update the country’s data protection regime. Healthcare.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to prioritize your resources from a risk management perspective

CGI

Thu, 10/08/2015 - 08:00. As published in the new CGI-Governing Institute “Guide to Cybersecurity as Risk Management ,” too often, a compliance-based approach to cybersecurity planning is unable to evolve with a public or private organization’s changing needs. Re-evaluate constantly.

Risk 40
article thumbnail

A Decade of Have I Been Pwned

Troy Hunt

” Anyone can type in an email address into the site to check if their personal data has been compromised in a security breach. He’s just “a dude on the web”, but Troy Hunt has ended up playing an oddly central role in global cybersecurity. You could call it. So, what stands out?

article thumbnail

The Hacker Mind Podcast: How To Become A 1337 Hacker

ForAllSecure

Hammond: I tend to, I guess, try and explain capture the flag is sort of gamified cybersecurity education. It’s sponsored by the NYU Center for Cybersecurity. It bills itself as the most comprehensive student-run cyber security event in the world, featuring nine individual hacking competitions, including CTFs.

article thumbnail

Jamaica’s New Privacy Protection Bill

Data Matters

On 10 October 2017, Jamaica introduced into its House of Parliament a comprehensive Bill for privacy and data protection, entitled “An Act to Protect the Privacy of Certain Data and for Connected Matters.” The new law would cover personal data, including data in an “accessible record” such as a health record or an educational record.

Privacy 68
article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

Vamosi: Today, John has taken his juvenile curiosity in breaking things down to become a security researcher with Huntress Labs. Hammond: As a security researcher, I am hierarchically in their Threat OPs department. Hammond: I tend to explain Capture the Flag is sort of gamified cybersecurity education.