Remove category
Remove Cybersecurity Remove Education Remove Energy and Utilities Remove IT Remove Security
article thumbnail

Hidden Biases in Cybersecurity Reviews – And How to Use Them

eSecurity Planet

Technology reviews can be a temptingly easy way to gain insight into the often impenetrable world of enterprise cybersecurity products, but you need to know how to use them. For example, when surveying the market for email security, survey results should include respondents from each category that might represent different needs.

article thumbnail

China Publishes Draft Regulations on Protecting the Security of Key Information Infrastructure

Hunton Privacy

On July 10, 2017, the Cyberspace Administration of China published a new draft of its Regulations on Protecting the Security of Key Information Infrastructure (the “Draft Regulations”), and invited comment from the general public.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

Can criminal hackers shut down a city’s electrical grid? Well, nothing’s impossible. But how might it actually happen? And how might we defend ourselves? Here’s the CBS evening news : CBS: Nearly a quarter of a million people lost power in this small Ukrainian city when it was targeted by a suspected Russian attack last December.

article thumbnail

Infosource Global Capture & IDP Vertical Market Analysis 2022-2023 Update

Info Source

Demand in the Public Sector In the Public Sector category, we track two sub-segments in the respective geographies: sales to the Central (aka Federal) Government and sales to State and Local Government agencies, where we also include grade schools. All business inputs are interpreted to understand the content, and where and why it is needed.

article thumbnail

The Week in Cyber Security and Data Privacy: 11 – 18 December 2023

IT Governance

We’re also introducing two new categories this week: ‘AI’ and ‘Key dates’. An investigation determined that personal data, including names, addresses, phone numbers, Social Security numbers, dates of birth and bank account numbers, belonging to nearly 15 million people was obtained by an unauthorised party between 30 October and 1 November.