Remove category general
article thumbnail

China Issues Draft Data Security Law

Hunton Privacy

China has lacked a comprehensive data protection and data security law that regulates in detail requirements and procedures relating to the collection, processing, control and storage of personal data. In recent years, China has seen developments on data protection both in legislation and in practice.

Security 140
article thumbnail

Nation-state malware could become a commodity on dark web soon, Interpol warns

Security Affairs

Interpol Secretary General Jurgen Stock declared that nation-state malwre will become available on the darknet in a couple of years. Threat actors could perform reverse engineering of military-made malicious code and use their own versions in attacks in the wild. “We need your [cyber breach] reports.

Military 106
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nine States Pass New And Expanded Data Breach Notification Laws

Data Protection Report

State Laws Round Up: Illinois ( SB 1624 ) – Illinois proposes notification requirements to the Attorney General. The Governor is expected to sign an amendment to the Personal Information Protection Act, requiring businesses to notify the Attorney General of breaches involving at least 500 Illinois residents. New Jersey ( S.

article thumbnail

Amended Colorado Bill Aims to Enhance Data Privacy Laws

Data Protection Report

As Data Protection Report posted on January 29, 2018 , lawmakers in Colorado are considering legislation that, if enacted, would significantly strengthen Colorado’s data privacy protections. On Wednesday, February 14, 2018, an amended bill passed unanimously in Colorado’s House Committee on State, Veterans and Military Affairs.

article thumbnail

China Issues Draft Rule on Cybersecurity Review for Certain CII Operators

Hunton Privacy

In general, the Cybersecurity Review Measures apply only to critical information infrastructure operators (“CII Operators”), provided that the laws and regulations do not provide otherwise. other conditions that may endanger CII security and national security. The deadline for public comment is June 24, 2019.

article thumbnail

Network Security Architecture: Best Practices & Tools

eSecurity Planet

Network security architecture is a strategy that provides formal processes to design robust and secure networks. Effective implementation improves data throughput, system reliability, and overall security for any organization. or segregated as cloud or network attached storage (NAS).

Security 120