Remove category
article thumbnail

Counting Down to the EU NIS2 Directive

Thales Cloud Protection & Licensing

On 17 October 2024, European Union Member States must adopt and publish the measures necessary to comply with the Network and Information Security Directive (NIS2). NIS2 adds digital service providers, waste management, pharmaceutical and labs, space, and public administration to the ‘Essential’ sectors category.

article thumbnail

Vulnerability Management Policy Template

eSecurity Planet

Our recommendations are independent of any commissions, and we only recommend solutions we have personally used or researched and meet our standards for inclusion. Overview Security vulnerabilities enable attackers to compromise a resource or data. Vulnerabilities consist of two categories: unplanned and planned.

Risk 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China Publishes Draft Regulations on Protecting the Security of Key Information Infrastructure

Hunton Privacy

On July 10, 2017, the Cyberspace Administration of China published a new draft of its Regulations on Protecting the Security of Key Information Infrastructure (the “Draft Regulations”), and invited comment from the general public.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences.

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

What if you are a woman in information security? I’m Robert Vamosi, and in the episode I’m talking about diversity, equality, and inclusion in information security with one of the industries' most successful examples. So I just don't know, statistically speaking, no, which category is better.

Cloud 40
article thumbnail

FTC Publishes Red Flags Rule Compliance Guide; Confirms Broad Interpretation of the Rule

Hunton Privacy

This definition of “creditor” may encompass any “invoice billing” arrangements, including those often utilized by law firms, doctors, manufacturers, utility companies and myriad other businesses that do not require immediate payment for their products or services.