Remove Definition Remove Encryption Remove Military Remove Security
article thumbnail

Security Vulnerabilities in US Weapons Systems

Schneier on Security

The US Government Accounting Office just published a new report: " Weapons Systems Cyber Security: DOD Just Beginning to Grapple with Scale of Vulnerabilities " (summary here ). From the summary: Automation and connectivity are fundamental enablers of DOD's modern military capabilities. But that's probably a mistake in the long run.

article thumbnail

EU bodies agree on new EU export rules for dual-use technology

Security Affairs

European Parliament votes to tighten up rules for the sale and export of surveillance and encryption technology. The term “ dual-use ” refers to technology that can be used for both peaceful and military aims. The current update was urged by technological developments and growing security risks. Pierluigi Paganini.

Sales 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Washington Amends Data Breach Notification Law

Hunton Privacy

The new requirements include the following: Expanded Definition of Personal Information. HB 1071 expands the definition of “personal information.” The law provides that if the breach involves the login credentials of an account furnished by the entity, the entity may not provide notification to that email address.

article thumbnail

Snowden Ten Years Later

Schneier on Security

I didn’t know either of them, but I have been writing about cryptography, security, and privacy for decades. It definitely had an effect on me. Chatting with Snowden on an encrypted IM connection, I joked that the NSA cafeteria menu probably has code names for menu items. I started doubting my own security procedures.

article thumbnail

New European Union Dual-Use Regulation Enters Into Force

Data Matters

Dual-use items are sensitive goods, services, software, and technology that can be used for both civil and military purposes. At an initial stage, businesses therefore need to self-assess whether their items may fall within the definition. Strengthened public security and human rights controls.

article thumbnail

The Week in Cyber Security and Data Privacy: 4 – 10 March 2024

IT Governance

Glosbe dictionary exposes almost 7 million records The multilingual online dictionary Glosbe left a MongoDB instance unsecured last year, exposing nearly 7 million users’ information, including personal data, encrypted passwords and social media identifiers. Only 3 definitely haven’t had data breached.

article thumbnail

A Cyber Insurance Backstop

Schneier on Security

One possible solution, touted by former Department of Homeland Security Secretary Michael Chertoff on a recent podcast , would be for the federal government to step in and help pay for these sorts of attacks by providing a cyber insurance backstop.