article thumbnail

Privacy and Cybersecurity September 2019 Events

HL Chronicle of Data Protection

Please join us for our September events. Data and Privacy in the Autonomous Car. Tim Tobin will speak on the webinar, “Data and Privacy in the Autonomous Car, What New Questions Might We Face?” ” presented by the Privacy + Security Forum. September 11. To register, please click here. Location : Webinar.

Privacy 40
article thumbnail

Bring-Your-Own-Device Programs: A Balance Between Privacy and Cybersecurity

Data Protection Report

1] While the BYOD approach may offer certain advantages, such as greater flexibility and cost savings, employers should be mindful of the cybersecurity and privacy risks when leaving employees to their own devices. In this article, we explore some of these risks along with best practices employers can implement to mitigate these concerns.

Privacy 125
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FTC Recaps Connected Cars Privacy and Security Workshop

Hunton Privacy

On January 9, 2018, the FTC issued a paper recapping the key takeaways from the FTC’s and National Highway Traffic Safety Administration’s June 2017 workshop on privacy and security issues involving connected cars. The workshop featured representatives from consumer groups, industry, government and academia.

Privacy 48
article thumbnail

Recent Tesla Hacks Highlight Importance of Protecting Connected Devices

eSecurity Planet

Rapid7’s Zero Day Initiative hosts an event called Pwn2Own, and at the 2023 event, computer security firm Synactiv hacked a Tesla computer within two minutes. This year, electric cars were a major focal point of the 2024 event, called Pwn2Own Automotive. You can unsubscribe at any time.

IoT 125
article thumbnail

The IoT Cybersecurity Act of 2020: Implications for Devices

eSecurity Planet

For any IoT device vendors currently contracted by the government, this is what we know so far from the National Institute of Standards and Technology (NIST): Required reading for IoT manufacturers: foundational guidelines about IoT vulnerabilities ( 8259 ) and a core baseline of necessary cybersecurity components ( 8259A ). Data protection.

IoT 145
article thumbnail

How to Prepare for the Metaverse

AIIM

From the Australian Open offering fans art ball NFTs with real-time match data to JPMorgan Chase’s tiger-friendly lounge in the blockchain-based world Decentraland, metaverse events are exploding into 2022 as powerful new weapons to engage with people. Create or facilitate the internal dynamics of a “metalab.”. The Metaverse is Coming.

article thumbnail

Biden Cybersecurity Strategy: Big Ambitions, Big Obstacles

eSecurity Planet

The initiatives that stand out the most — critical infrastructure security standards, a national data privacy and security law, and liability for security failures — will likely take time and the support of Congress to implement. ” Those fundamental shifts are focused on two core priorities. .”