US Government Ban on Kaspersky Formalized

Data Breach Today

Final Rule Includes Ban on Government Contractors Using Russian Firm's Products A final rule published in the Federal Register Tuesday officially bans U.S. government agencies and their contractors from buying or supporting Kaspersky security products

Enhancing Security Governance

Data Breach Today

Longtime CISO Vito Sardanopoli on Building an Effective Security Program A formal security program that spells out precise governance components is critical to protecting sensitive data, says Vito Sardanopoli, who served on the U.S.

Texas Says 22 Local Government Agencies Hit by Ransomware

Data Breach Today

Single Threat Actor' Suspected; Government Coalition Urges Greater Prevention Ransomware-wielding attackers continue to target not just big businesses and large government agencies, but increasingly their smaller counterparts too.

Huawei Accuses US Government of Hack Attacks

Data Breach Today

White House 'Using Every Tool At Its Disposal' to Disrupt Business, Firm Claims The battle between Huawei Technologies and the White House continues to intensify, with the Chinese manufacturing giant accusing the U.S.

Recent DNS Hijacking Campaigns Trigger Government Action

Data Breach Today

governments to issues warnings and policy updates to improve security

Government Agencies Field More Cybersecurity Maturity Models

Data Breach Today

Pentagon and DOE Pitch Security Frameworks - But Should They Defer to NIST? The Pentagon and the Department of Energy are pitching new or revised cybersecurity capability maturity models to help their sectors prioritize cybersecurity investments and refine processes and controls.

Government Shutdown Hampers Cybersecurity

Adam Levin

Government has impacted federal cybersecurity according to several reports. Faced with little respect, low and uncertain pay, arbitrary disruption, and an inability to accomplish the mission they love, people leave government, and in the future, never work for it in the first place.”.

Ransomware Increasingly Hits State and Local Governments

Data Breach Today

Yet These Victims Are Less Likely to Pay Any Ransom, Recorded Future Finds Over the past two years, the number of ransomware attacks against state and local government agencies has increased.

Deal to Reopen U.S. Government Approved

Data Breach Today

President Trump Signs Measure to Fund Government for Three Weeks President Donald Trump late Friday signed a short-term funding bill to temporarily end the 35-day federal government partial shutdown.

City of Albany Latest Local Government Hit With Ransomware

Data Breach Today

Attack Comes After Others That Targeted Counties Albany, New York, is the latest unit of local government hit with ransomware in recent weeks, following similar attacks reported in Georgia and North Carolina that crippled government IT systems and disrupted service for local residents

Texas Government Agencies Hit by Ransomware

Adam Levin

The local governments and agencies from twenty-three Texas towns were hit by a coordinated ransomware campaign last week. . local governments have increasingly been targeted by ransomware campaigns, including Baltimore, Atlanta and several Florida cities.

Governance?

InfoGovNuggets

Who governs access to the White House? In the absence of a written rule, who governs what behavior is permitted in a press briefing within the White House? Access Controls Culture Duty Governance Government Internal controls Third parties Who is in charge The Executive or the Judiciary? “Judge Grants CNN’s Press-Pass Motion,” The Wall Street Journal , November 17, 2018 A3.

Deal to Reopen U.S. Government Announced

Data Breach Today

Business Process Can Make or Break Data Governance

erwin

Data governance isn’t a one-off project with a defined endpoint. Data governance, today, comes back to the ability to understand critical enterprise data within a business context, track its physical existence and lineage, and maximize its value while ensuring quality and security.

Coordinated Ransomware Attack Hits 23 Texas Government Agencies

Threatpost

Government Malware cyberattack malware ransom ransomware state and government ransomware Texas government ransomware

Cybersecurity or Information Governance Failure???

Getting Information Done

This past weekend the world was overwhelmed by the cyberattack that spread around the globe hitting businesses, hospitals, and government agencies in over 150 countries. I point to the lack of effective information governance as a root cause.

Are You Ever Finished With Information Governance?

Weissman's World

The post Are You Ever Finished With Information Governance? governance maturity infogov information governance information management

Kazakhstan Government Intercepting All Secured Internet Traffic

Adam Levin

The Kazakhstan government is intercepting all HTTPS-encrypted internet traffic within its borders. Once installed, this certificate allows the government to decrypt and analyze all incoming internet traffic. . Data Security Government Cybersecurity Technology featured kazakhstan https

Why Information Architecture is VITAL to Information Governance

Weissman's World

Our very own Kevin Parker has written another stellar piece on the importance of information architecture to information governance. The post Why Information Architecture is VITAL to Information Governance appeared first on Holly Group.

Details on Uzbekistan Government Malware: SandCat

Schneier on Security

Kaspersky has uncovered an Uzbeki hacking operation, mostly due to incompetence on the part of the government hackers.

Large-Scale Government Hacks Hit Russia, Bulgaria

Threatpost

Breach Government Hacks Privacy Bulgaria Cyberattacks FSB russian security agency secret projects tax informationThe Bulgarian attack impacted almost all tax information for the entire country.

Government Shutdown: Impact on Health Data Security, Privacy

Data Breach Today

HIPAA Enforcement Agency Open, But Regulatory Activity Slows Down Some regulatory activity related to health data privacy and security is on hold as a result of the partial government shutdown.

Governance Automation Will Propel the Big Winners in Digital Transformation

InfoGoTo

Governance automation can unleash the power of digital transformation, enabling organizations to make data central to all of their decision-making. But that requires overhauling the governance practices that are still woefully immature in many organizations.

Using Strategic Data Governance to Manage GDPR/CCPA Complexity

erwin

In light of recent, high-profile data breaches, it’s past-time we re-examined strategic data governance and its role in managing regulatory requirements. Govern PII “at rest”. Govern PII “in motion”.

GDPR 92

Government Spending on Cybersecurity: An Analysis

Data Breach Today

Around the world, many CIOs at various levels of governments expect an increase in cybersecurity spending in 2019, according to new research from Gartner. Alia Mendonsa, co-author of the report, analyzes the results of a global survey

Initiating a Data Governance Program in Financial Services

Perficient Data & Analytics

Previously, I discussed the components needed to design a data governance strategy. This post will describe in detail, how to initiate the data governance program. The basis for any data governance program will be a thorough analysis of reference and transaction-level data.

Reimagining Information Governance with Blockchain

Weissman's World

The post Reimagining Information Governance with Blockchain appeared first on Holly Group. Blockchain information governance

Government Websites Deliver Cryptocurrency Mining Code

Data Breach Today

and Australian governments, have been turning their visitors' computers into mining machines to harvest the virtual currency Monero. Security of Code Pushed by Content Delivery Networks Remains Ongoing Concern More than 4,200 websites, some belonging to the U.S.,

Mining 173

Data Governance Framework: Three Steps to Successful & Sustainable Implementation

erwin

A strong data governance framework is central to the success of any data-driven organization because it ensures this valuable asset is properly maintained, protected and maximized. When implementing or maturing a data governance framework, an accurate assessment of the ‘here and now’ is key.

Welcoming the Irish Government to Have I Been Pwned

Troy Hunt

Over the last year and a bit I've been working to make more data in HIBP freely available to governments around the world that want to monitor their own exposure in data breaches. domains and a handful of other government ones on different TLDs.

Government surveying further education providers before Brexit

IT Governance

Among the uncertainty surrounding GDPR (General Data Protection Regulation) compliance – particularly with Brexit complicating things – the UK government has been a reliable source for advice.

5 Steps to Information Governance Success

Weissman's World

To hear some people tell it, the future of information governance is a complex, frightening place to ponder. The post 5 Steps to Information Governance Success appeared first on Holly Group. governance infogov information governance information management

The Building Blocks of Information Governance

Information Governance Perspectives

Information Governance (IG) is quite the buzzword these days, yet too many organizations still find themselves struggling with implementing a practical roadmap for success.

Data Governance Best Practices in the GDPR Era

Data Breach Today

Matt Lock of Varonis on the Need to Have a Baseline for Data Access Behavior GDPR requires organizations to "have a governance model in terms of access and control and accountability," says Matt Lock of Varonis, who describes essential steps

Dutch and British Governments Slam Russia for Cyberattacks

Data Breach Today

Government Shutdown Leaves Americans More Vulnerable to Identity Theft, Scams

Adam Levin

citizens are more vulnerable to the effects of identity theft and scams as a result of the ongoing government shutdown. Government websites will also become a more attractive avenue for scams and phishing. Data Security Government Consumer Protection Identity Theft featured shutdown

Is Your Information Governance Mostly Sound and Fury?

Weissman's World

” Shakespeare penned these words as a metaphor for life (Macbeth, Act V, Scene V), but they relate equally well to information governance in that organizations often spend more time arguing over the particulars than actually doing much about them.