article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

We need policymakers who understand technology, but we also need cybersecurity technologists who understand -- ­and are involved in -- ­policy. When you broaden the definition of Internet security, many additional areas fall within the intersection of cybersecurity and policy. We need public-interest technologists.

article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

We need policymakers who understand technology, but we also need cybersecurity technologists who understand­ -- and are involved in -- ­policy. When you broaden the definition of Internet security, many additional areas fall within the intersection of cybersecurity and policy. We need public-interest technologists.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CYBERSECURITY AND GDPR: WHERE WE ARE HEADING

DLA Piper Privacy Matters

Below you will find the main takeaways of the data protection and cybersecurity seminar held with the GIOIN Open Innovation Network in Turin. Albeit it has not been devised for cybersecurity purposes, the GDPR is a great opportunity to properly address security (and data protection) at an earlier stage.

GDPR 53
article thumbnail

12 Data Loss Prevention Best Practices (+ Real Success Stories)

eSecurity Planet

If you or your business handles sensitive data, operates in regulated industries, or suffers from repeated cybersecurity threats, it’s time to evaluate the need for DLP strategies. Initiate Awareness & Governance Efforts Communicate data practices, benefits, and consequences to all stakeholders.

article thumbnail

How an Alaskan borough (roughly the size of West Virginia) was impacted by a Ransomware attack

IG Guru

by, Andrew Ysasi, MS I had the pleasure of listening to Eric Wyatt speak at the ARMA Alaska Spring seminar earlier this month. Eric is the CIO for the Matanuska-Susitna (Mat-Su) Borough in Alaska. Their struggle to recover from a ransomware attack is well documented, but more people need to hear his story. Like many […].

article thumbnail

How to Prevent Malware: 15 Best Practices for Malware Prevention

eSecurity Planet

The stakes are even higher for businesses, government and other organizations, as successful attacks can be devastating to operations and sensitive data. It is critical to provide staff with a thorough grasp of cybersecurity risks in order to strengthen the company’s cyber defenses.

Passwords 120
article thumbnail

The Hacker Mind Podcast: The Right To Repair

ForAllSecure

Vamosi: I want to restate the verb “educate” With infosec, there’s a lot of Fear, Uncertainty, and Doubt or FUD within government. Roberts: They're using cybersecurity as a way to basically scare lawmakers away from retro pair laws, you know, cyber is kind of a four letter word and, you know, it most legislatures.