Remove Encryption Remove Events Remove Government Remove Libraries
article thumbnail

GDPR Compliance Obligations: The relationship between Data Controllers and Third-Party Processors

AIIM

For example, under GDPR data subjects and/or regulators may now pursue direct remedies against data processors in the event of infringement of obligations, whereas such remedies did not exist under the prior data privacy regulation.

GDPR 83
article thumbnail

Gartner Security & Risk Management Summit 2018 Trip Report

Thales Cloud Protection & Licensing

This event is focused on the needs of senior IT and security professionals, such as CISOs, chief risk officers, architects, IAM and network security leaders. That buzz word is a very big deal in the industry now and was a hot topic throughout the event as well. called Gartner Security & Risk Management Summit. Back to basics.

Risk 59
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Fuzzing Crypto

ForAllSecure

Guido Vranken returns to The Hacker Mind to discuss his CryptoFuzz tool on GitHub, as well as his experience fuzzing and finding vulnerabilities in cryptographic libraries and also within cryptocurrencies such as Ethereum. That means it falls to you to protect your cryptocurrency. All of which speaks to the power of hacking.

article thumbnail

The Hacker Mind Podcast: Digital Forensics

ForAllSecure

Vamosi: I should also mention that forensics can be used in other ways, not just for incidents that have already happen but also for events you suspect might be happening in the moment. What would be valuable from their perspective to encrypt and then ask for the ransom. Januszkiewicz: Forensics you will bring to the organization.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

Hello and welcome to the final IT Governance podcast of 2018. As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events. February saw a surge in surreptitious cryptomining or ‘cryptojacking’.

article thumbnail

Adventures in Contacting the Russian FSB

Krebs on Security

In the process of doing so, I encountered a small snag: The FSB’s website said in order to communicate with them securely, I needed to download and install an encryption and virtual private networking (VPN) appliance that is flagged by at least 20 antivirus products as malware. government on multiple occasions over the past five years.

article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

Certainly no one uses 40 bit encryption anymore. The phone key then understands that message and encrypts it back to the sender to the vehicle with that secret key, the car and the phone have that challenge token and only then the car would unlock. It's using device encryption and it's pretty good protected. It's I like it.