article thumbnail

NSA and ODNI analyze potential risks to 5G networks

Security Affairs

National Security Agency (NSA), along with the DHS Cybersecurity and Infrastructure Security Agency (CISA), and the Office of the Director of National Intelligence (ODNI) have analyzed the risks and vulnerabilities associated with the implementation of 5G networks. ” concludes the report.”As Pierluigi Paganini.

Risk 86
article thumbnail

The proposed EU Cyber Resilience Act: what it is and how it may impact the supply chain

Data Protection Report

The CRA introduces common cybersecurity rules for manufacturers, developers and distributors of products with digital elements, covering both hardware and software. Manufacturers of products must also comply with various requirements relating to the handling of vulnerabilities which are set out in section 2 of Annex I of the CRA.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

Accounting for third-party risks is now mandated by regulations — with teeth. Allen is a widely respected thought leader on this topic, having launched Shared Assessments in 2005 as an intel-sharing and training consortium focused on third-party risks. That out of the way, business can proceed with less risk.

Risk 120
article thumbnail

Autonomous Vehicles – Canada’s Current Legal Framework: Privacy (Part 4)

Data Protection Report

Across the globe, the race is already underway among vehicle manufacturers to develop fully autonomous vehicles (AVs). In this post, we will describe some of the risks introduced by personal information collection, and some of the legal obligations of vehicle manufacturers in protecting their customers’ privacy.

Privacy 85
article thumbnail

U.S. Commerce Department Proposes Expansion of Information and Communications Technology and Services Review Process

Data Matters

The amendment would also include risk factors related to connected software applications as part of Commerce’s evaluation as to whether a transaction involving connected software applications poses an undue or unacceptable risk to U.S. First, the Proposed Rule would add “connected software applications” to the definition of ICTS.

article thumbnail

Don’t trust links with known domains: BMW affected by redirect vulnerability

Security Affairs

BMW is a German manufacturer of luxury vehicles headquartered in Munich. This type of vulnerability, which affected BMW websites and other SAP systems, was first identified in 2012 but still poses risks to organizations even after applying security updates.

Phishing 122
article thumbnail

A component in Huawei network appliances could be used to take down Germany’s telecoms networks

Security Affairs

government officials as well as European security authorities, which have warned of the risks associated with Chinese telecoms equipment.” Over the last few years, multiple Western governments warned about the risks of cyber espionage conducted by the Chinese government on networks using Huawei and ZTE network appliance.