Remove category general
article thumbnail

Congress Agrees – 72 Hour Cyber Incident Reporting Requirement to Take Effect

Data Protection Report

The relevant portions of the law, titled the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (“Act”) proposes reporting requirements for incidents, establishes new programs to curtail ransomware attacks and encourages information sharing between government agencies. Reporting Requirements.

article thumbnail

ICYMI – Late December in privacy and cybersecurity

Data Protection Report

The other four requirements were already present in New York’s General Business Law § 399-z. Late December and early January tend to be a busy time for everyone, so you may have missed a privacy update or two during that time. We have set out some updates in the form of questions, with some links where you can find more information.

Privacy 115
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

President Biden Issues Executive Order on Digital Assets

Hunton Privacy

In June 2021, the House Committee on Financial Services also organized a Digital Assets Working Group. On March 9, 2022, the Biden Administration released its much-anticipated “ Executive Order on Ensuring Responsible Development of Digital Assets ” (“Executive Order”). Background. Pat Toomey to guide future legislation on stablecoins.

Risk 86
article thumbnail

CPRA Becomes the New Standard. Are You Ready?

Thales Cloud Protection & Licensing

There are a lot of questions about CPRA and while I won’t be able to address all of them here, I will provide some general information and food for thought. The National Law Review notes “Under the CPRA, certain new rights and compliance burdens will attach to a new category of personal information called ‘sensitive personal information.’”

Privacy 62
article thumbnail

6 Best Threat Intelligence Feeds to Use in 2023

eSecurity Planet

OTX prides itself on being a completely open community for threat intelligence, extending access to threat research and shared expertise from security professionals to any and all users. Dashboards clearly state the quantity and types of indicators of compromise (IoCs) and also provide Pulses to quickly summarize threats and their impact.

article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

APIs are vital in our mobile digital world, but the consequences of API security flaws have yet to be seen. So how hard is it to hack APIs? Not very hard. They're on all your devices, [Peloton commercial]. And in May of 2021 Researchers disclosed that the Peloton API authentication was broken. I play an adversarial role with our clients.

article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

APIs are vital in our mobile digital world, but the consequences of API security flaws have yet to be seen. So how hard is it to hack APIs? Not very hard. They're on all your devices, [Peloton commercial]. And in May of 2021 Researchers disclosed that the Peloton API authentication was broken. I play an adversarial role with our clients.