Remove 11
Remove 2020 Remove Document Remove Examples Remove Manufacturing Remove Security
article thumbnail

Cyber-Criminal espionage Operation insists on Italian Manufacturing

Security Affairs

ZLab researchers spotted a new malicious espionage activity targeting Italian companies operating worldwide in the manufacturing sector. The group behind this activity is the same we identified in the past malicious operations described in Roma225 (12/2018), Hagga (08/2019), Mana (09/2019), YAKKA (01/2020). Introduction.

article thumbnail

Thermal cameras and COVID-19 – The German DPAs have spoken

Data Protection Report

On September 11, 2020, the German Datenschutzkonferenz (DSK), the joint body of the German data protection authorities, published its position on the use of thermal cameras and electronic temperature checks in the context of the COVID-19 pandemic. 25 GDPR and security of data processing in to Art. 32 GDPR are complied with.

GDPR 110
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How blockchain, CRM and trade finance are transforming supply chain management

CGI

To me, this is a literal example as to how blockchain technology is hitting the transportation and logistics industry like a Mack truck – but in a good way. We decided to tackle supply chain processing from the perspective of large manufacturing customers who interact with banks using CGI Trade360 software as a service.

article thumbnail

2019 end-of-year review part 1: January to June

IT Governance

IT Governance is closing out the year by rounding up 2019’s biggest information security stories. Countless office workers were forced to get back to their jobs after Reddit suspended a host of accounts in light of security concerns. Facebook said that the breach was discovered in January 2019 as part of an internal security review.

article thumbnail

Nmap Ultimate Guide: Pentest Product Review and Analysis

eSecurity Planet

The open source security tool, Nmap, originally focused on port scanning, but a robust community continues to add features and capabilities to make Nmap a formidable penetration testing tool. Almost all cybersecurity professionals have familiarity with Nmap and most use it frequently — it is the hammer of the pentesting toolbox.