article thumbnail

Privacy and Security of Data at Universities

Schneier on Security

The boundaries between research and grey data are blurring, making it more difficult to assess the risks and responsibilities associated with any data collection. Many sets of data, both research and grey, fall outside privacy regulations such as HIPAA, FERPA, and PII.

Privacy 82
article thumbnail

NEW TECH: LogicHub introduces ‘virtualized’ security analysts to help elevate SOAR

The Last Watchdog

Security orchestration, automation and response, or SOAR, is a fledgling security technology stack that first entered the cybersecurity lexicon about six years ago. Saurabh told me he developed a passion for helping organizations improve the efficiencies of their security operations. billion, and later co-founded SumoLogic.

Security 160
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

Now for the big challenge - security. The "s" in IoT is for Security Ok, so the joke is a stupid oldie, but a hard truth lies within it: there have been some shocking instances of security lapses in IoT devices. Yeah, me either, because most of mine are probably like yours: the simplest electrical devices in the house.

IoT 143
article thumbnail

China Issues Draft of Data Security Administrative Measures

Hunton Privacy

On May 28, 2019, the Cyberspace Administration of China (“CAC”) released draft Data Security Administrative Measures (the “Measures”) for public comment. The Measures cover 40 articles in total, divided among four chapters, that address data collection, processing and use and data security.

article thumbnail

Interview with the Head of the NSA’s Research Directorate

Schneier on Security

NSA views the kind of “vast access and collection” that it talks about internally as both an achievement and its own set of problems. The field of data science aims to solve them.

Big data 108
article thumbnail

Zero Trust Speeds Ransomware Response, Illumio-Bishop Fox Test Finds

eSecurity Planet

From mass production of cheap malware to ransomware as a service (RaaS) , cyber criminals have industrialized cybercrime, and a new HP Wolf Security report warns that cybercriminals are adapting advanced persistent threat (APT) tactics too. See the Best Zero Trust Security Solutions. Zero Trust Security Testing.

article thumbnail

Evolution of threat landscape for IoT devices – H1 2018

Security Affairs

Security experts from Kaspersky have published an interesting report on the new trends in the IoT threat landscape. The researchers set up a honeypot to collect data on infected IoT devices, the way threat actors infect IoT devices and what families of malware are involved. Security Affairs – IoT devices, hacking ).

IoT 81