article thumbnail

Snowden Ten Years Later

Schneier on Security

I paged through weekly reports, presentation slides from status meetings, and general briefings to educate visitors. Management is management, even inside the NSA Reading the documents, I felt as though I were sitting through some of those endless meetings. The meeting presenters try to spice things up. Definitely.

article thumbnail

The EU’s AI Act: the position is agreed

Data Protection Report

Definitions and scope The final text will define AI with reference to the OECD definition. It does not apply systems used for purely military or defence purposes. For general purpose AI models that meet a set of criteria indicating that they pose a ‘systemic’ risk, there will also be additional obligations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Engineering Secure Systems

Thales Cloud Protection & Licensing

Systems engineering is the interdisciplinary approach to realizing systems that meet desired goals. It was developed over the 20th century to enable the successful realization of more complex engineering projects; from telephony to military, space and automotive domains. Systems engineering and software.

article thumbnail

Serbian Commissioner Emphasizes Data Protection Awareness

Hunton Privacy

But, definitely we need to work hardest in the area of education. To educate both the widest circles of the citizens and, in particular, people who are working in institutions whose activities imply intense, robust or delicate personal data processing. I am convinced that the seminar will be a useful step forward on the road ahead of us.

article thumbnail

Executive Order on access to Americans’ bulk sensitive data and Attorney General proposed regulations – Part 2

Data Protection Report

The proposed definition of “listed identifier” is Full or truncated government identification or account number (such as a Social Security Number, driver’s license or state identification number, passport number, or Alien Registration Number) [Note that this definition apparently includes truncated Social Security Numbers.]

Access 59
article thumbnail

IoT - Haven’t we been here before?

CGI

Arguably, machine to machine (M2M) communication started in the 1950s in military projects , where IBM developed the real time operating system concepts required to handle a number of complex applications, including the first missile tracking systems. M2M – back to the beginning. The answer to this question is complex.

IoT 40
article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

In fact, I remember starting a new job by flying to Auburn Hills, Michigan for the very first meeting of the Featherstone Group, a collection of automotive OEM executive and security professionals. So I'd say it's definitely possible. So I definitely think it's possible. And that, too, doesn’t always work.