Remove category
Remove Education Remove Information Security Remove Insurance Remove Meeting Remove Training
article thumbnail

Network Security Architecture: Best Practices & Tools

eSecurity Planet

Internet of Things (IoT) security: Encompasses a variety of tools and techniques to secure IoT, operations technology (OT), and other similar categories of endpoints. Network Security Network security tools monitor and secure the connections between assets on the network and protect against specific network attacks.

Security 120
article thumbnail

ICO issue fine of £4.4 to Interserve for security failings

DLA Piper Privacy Matters

The databases also held special category personal data including ethnic origin; religion; details of disabilities; sexual orientation, and health information relevant to ill-heath retirement applications. On the face of it, this is a sizeable fine issued to a non household name controller for perceived failings in information security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China Publishes Draft Regulations on Protecting the Security of Key Information Infrastructure

Hunton Privacy

On July 10, 2017, the Cyberspace Administration of China published a new draft of its Regulations on Protecting the Security of Key Information Infrastructure (the “Draft Regulations”), and invited comment from the general public.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Information security is not yet a science; outside of the handful of issues falling under the field of cryptography, there is no formalized system of classification. The most prepared cybersecurity programs of today will not attempt to implement a static, “out-of-the-box” solution to cyber risk. Principle 3. Principle 4. Principle 5.