article thumbnail

Biden Cybersecurity Strategy: Big Ambitions, Big Obstacles

eSecurity Planet

The first is to rebalance responsibility for cybersecurity away from individuals, small businesses and local governments, and towards “the owners and operators of the systems that hold our data and make our society function, as well as of the technology providers that build and service these systems.” Strategic Objective 1.1

article thumbnail

Weapons

InfoGovNuggets

Tim Cook wants GDPR-style privacy protections in the US. Claims “[o]ur own information … is being weaponized against us with military efficiency.” ” He went on to suggest that the data collection practices of some online advertising companies are the equivalent of government surveillance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Podcast: Russian cyber crimes, Facebook breach and Tory conference app

IT Governance

Hello and welcome to the IT Governance podcast for Friday, 5 October. The NCSC (National Cyber Security Centre) has accused the Russian military intelligence service – the GRU – of a campaign of “cyber attacks targeting political institutions, businesses, media and sport”. Here are this week’s stories. Well, that’ll do for this week.

article thumbnail

2022 Cyber Security Review of the Year

IT Governance

Meanwhile, GDPR (General Data Protection Regulation) enforcement continues apace. Tensions rose throughout February as the Russian military amassed across the Ukrainian border. million) fine for twelve breaches of the GDPR. The post 2022 Cyber Security Review of the Year appeared first on IT Governance UK Blog.

Security 132
article thumbnail

Have We Become Apathetic About Breaches?

Thales Cloud Protection & Licensing

Affecting big companies and small in virtually every vertical and hitting government institutions at the local, state and federal level, sensitive data is routinely exfiltrated, stolen and leveraged with shocking regularity. It’s sarcastic, it’s comical, but it’s also real. Barely a day goes by where we don’t hear of a data breach.

IoT 89
article thumbnail

Archives Records 2019 RMS Annual Meeting

The Schedule

Hosted two online Hangouts: one in April on the General Data Protection Regulation (GDPR). Academic institutions are by far the largest employer of section members, and about a quarter of us work for some level of government. The people of Austin recovered the government archives and preserved Austin as the capital.

article thumbnail

5 Signs a Cyberattack Is Under Way and 5 Things You Need to Do Before It Happens

Adam Levin

drone attack that killed Iranian military commander Qassem Suleimani. Immediately following Iran’s counterstrike against American military posts in Iraq, a tweet circulated claiming that more than 20 American soldiers had been killed. Cyberwar could be a life disrupter as well as a business killer. Cyber fails are scary.

IT 98