Remove about
article thumbnail

Expeditionary Cyberspace Operations

Schneier on Security

Cyberspace operations now officially has a physical dimension, meaning that the United States has official military doctrine about cyberattacks that also involve an actual human gaining physical access to a piece of computing infrastructure.

article thumbnail

Stark Industries Solutions: An Iron Hammer in the Cloud

Krebs on Security

” This graphic comes from a recent report from Arbor NETSCOUT about DDoS attacks from Russian hacktivist groups. Bulletproof providers are so named when they earn or cultivate a reputation for ignoring any abuse complaints or police reports about activity on their networks. ” DomainTools.com finds Ivan V. . PEACE HOSTING?

Cloud 271
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Vermont’s Amendments to Data Breach Law and New Student Privacy Law Effective July 1, 2020

Hunton Privacy

The amendments to Vermont’s Security Breach Notice Act include expanding the definition of Personally Identifiable Information (“PII”), expanding the definition of a breach to include login credentials and narrowing the permissible circumstances under which substitute notice may be used.

article thumbnail

EU bodies agree on new EU export rules for dual-use technology

Security Affairs

The term “ dual-use ” refers to technology that can be used for both peaceful and military aims. EU authorities also request countries more transparency about the export licenses they grant. “EU countries will also have to be more transparent by publicly disclosing details about the export licenses they grant.

Sales 99
article thumbnail

Washington Amends Data Breach Notification Law

Hunton Privacy

The new requirements include the following: Expanded Definition of Personal Information. HB 1071 expands the definition of “personal information.” As reported by Bloomberg Law , on May 7, 2019, Washington State Governor Jay Inslee signed a bill ( HB 1071 ) amending Washington’s data breach notification law.

article thumbnail

Colorado Amends Data Breach Notification Law and Enacts Data Security Requirements

Hunton Privacy

Applicability: The information security and disposal provisions of the Bill apply to “covered entities,” defined as persons that maintain, own or license personal identifying information in the course of the person’s business, vocation or occupation.

article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. I didn’t know either of them, but I have been writing about cryptography, security, and privacy for decades. I thought about it a lot before agreeing. It definitely had an effect on me.