article thumbnail

What is Cyber Threat Hunting? Definition, Techniques & Steps

eSecurity Planet

Spreadsheets : The simplest threat hunting tool is the humble spreadsheet, which many threat hunters use to help them when carrying out a stack counting exercise to manage the numbers and sort them so that outliers can easily be spotted. Definition, Techniques & Steps appeared first on eSecurityPlanet.

article thumbnail

California Privacy Protection Agency Publishes Draft Regulations on Automated Decisionmaking Technology

Hunton Privacy

Under the proposed regulations, individuals also can exercise a right to access information about a business’s use of ADMT. On November 27, 2023, the California Privacy Protection Agency (“CPPA”) published its draft regulations on automated decisionmaking technology (“ADMT”).

Privacy 121
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CPPA Board Holds Meeting on Revised Draft Regulations for Risk Assessment and Automated Decisionmaking Technology

Hunton Privacy

ADMT Definition of Automated Decisionmaking Technology Clarify that a technology is an ADMT if it processes personal information and uses computation to execute a decision, replace human decisionmaking or substantially facilitate human decisionmaking. Streamline what must be included in an abridged risk assessment.

Risk 61
article thumbnail

Phish Leads to Breach at Calif. State Controller

Krebs on Security

Then in October 2020, the California Department of Technology (CDT) issued a new set of guidelines that effectively require all executives, managers and supervisors to know all of the details of a phishing exercise before it occurs. “Meaning, such people will be tested ever again,” the state agency source said.

Phishing 270
article thumbnail

New Jersey Becomes 14th State to Enact a Comprehensive State Privacy Law

Hunton Privacy

Data Protection Assessment – Like Colorado, the law will require controllers not to conduct processing that presents a “heightened risk of harm” to consumers without conducting and documenting a data protection assessment.

Privacy 97
article thumbnail

NYDFS Proposes Updated Second Amendment to Its Cybersecurity Regulation

Hunton Privacy

As a result of the initial 60-day comment period, the updated Amendment incorporates a number of changes, including the following: Definitions NYDFS clarified the thresholds for calculating when covered entities qualify as “Class A Companies,” which would be subject to heightened requirements.

article thumbnail

Ransomware – To Pay, or Not to Pay?

Thales Cloud Protection & Licensing

And when thinking about criminal innovation, ransomware attacks clearly fall into that definition of “disruptive”, especially for any business on the receiving end of that “innovation”. And perhaps most importantly, ensure that all those plans are exercised and tested on a regular basis. These are all positive developments.