NEW TECH: DataLocker introduces encrypted flash drive — with key pad

The Last Watchdog

DataLocker honed its patented approach to manufacturing encrypted portable drives and landed some key military and government clients early on; the company has continued branching out ever since. This could be in high security areas, relating to the government or military, or you might be in different countries, where secure Internet connections are not available. DataLocker actually got traction, early on, selling to the military.

ROUNDTABLE: Experts react to President Biden’s exec order in the aftermath of Colonial Pipeline hack

The Last Watchdog

This very high-profile caper is part of an extended surge of ransomware attacks, which quintupled globally between the first quarter of 2018 and the fourth quarter of 2020, and is expected to rise 20 percent to 40 percent this year, according to insurance giant Aon. Not only will it educate and inform the cybersecurity experts regarding the cyberattacks. As wake up calls go, the Colonial Pipeline ransomware hack was piercing. Related: DHS embarks on 60-day cybersecurity sprints.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Vermont’s Amendments to Data Breach Law and New Student Privacy Law Effective July 1, 2020

Hunton Privacy

heath records or records of a wellness program or similar program of health promotion or disease prevention, a health care professional’s medical diagnosis or treatment of the consumer or a health insurance policy number.

What is personal information under the CCPA?

Collibra

Characteristics of protected classifications under California or federal law such as race, ancestry, national origin, religion, age, mental and physical disability, sex, sexual orientation, gender identity, medical condition, genetic information, marital status, or military status.

List of data breaches and cyber attacks in August 2020 – 36.6 million records breached

IT Governance

Author of FastPOS malware revealed, pleads guilty Cyber insurance: The moral quandary of paying criminals who stole your data For six months, security researchers have secretly distributed an Emotet vaccine Please stop hard-wiring AWS credentials in your code.

Watch out! Malware Analysis Sandboxes could expose sensitive data of your organization

Security Affairs

The experts also discovered a large number of insurance certificates that expose various personally identifiable information (PII), such as names, phone numbers, postal and email addresses. CENTCOM requisition form for use of military aircraft. We predict that this problem is likely to get worse as more companies add sandboxing to their security pipeline, underscoring the importance of educating employees now.”

2019 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

DiGiusti granted the “Children” defendants’ Motion to Compel against non-party City of Oklahoma City Police Department (“OCPD”) to comply with the Children’s subpoena of records related to the murder of their father in a civil case with the insurance company.

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Board-management discussions about cyber risk should include identification of which risks to avoid, which to accept, and which to mitigate or transfer through insurance, as well as specific plans associated with each approach. The NACD Handbook, in this respect, suggests steps such as nominating a cyber-expert to the board itself, creating a cross-departmental cyber committee that reports directly to the board, or implementing formal director-education training.