article thumbnail

EU bodies agree on new EU export rules for dual-use technology

Security Affairs

European Parliament votes to tighten up rules for the sale and export of surveillance and encryption technology. The term “ dual-use ” refers to technology that can be used for both peaceful and military aims. The European Union this week agreed to tighten up rules for the sale and export of dual-use technology.

Sales 102
article thumbnail

Washington Amends Data Breach Notification Law

Hunton Privacy

The new requirements include the following: Expanded Definition of Personal Information. HB 1071 expands the definition of “personal information.” As reported by Bloomberg Law , on May 7, 2019, Washington State Governor Jay Inslee signed a bill ( HB 1071 ) amending Washington’s data breach notification law.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Vulnerabilities in US Weapons Systems

Schneier on Security

From the summary: Automation and connectivity are fundamental enablers of DOD's modern military capabilities. It is definitely easier, and cheaper, to ignore the problem or pretend it isn't a big deal. The upshot won't be a surprise to any of my regular readers: they're vulnerable. But that's probably a mistake in the long run.

article thumbnail

Snowden Ten Years Later

Schneier on Security

It definitely had an effect on me. Chatting with Snowden on an encrypted IM connection, I joked that the NSA cafeteria menu probably has code names for menu items. Transferring files electronically is what encryption is for. Can it break the encryption on my hard drive? Definitely. There were so many code names.

article thumbnail

New European Union Dual-Use Regulation Enters Into Force

Data Matters

Dual-use items are sensitive goods, services, software, and technology that can be used for both civil and military purposes. At an initial stage, businesses therefore need to self-assess whether their items may fall within the definition. Revised definitions of exporter and broker. New controls on technical assistance.

article thumbnail

A Cyber Insurance Backstop

Schneier on Security

Observers do, however, have a pretty good idea who was behind the NotPetya attack because several governments, including the United States and the United Kingdom, issued coordinated statements blaming the Russian military.

article thumbnail

The Hacker Mind Podcast: The Hunt for Ghost #1

ForAllSecure

There is of course a lot of security around these digital releases, for example, there's watermarks, digital certificates, and even keys at the code, the encrypted copies of the films in specific theaters for specific periods of time. Yet, somewhere in China. When digital production servers slipped through the cracks.