Cybersecurity

 
 
  • 12 Years For Possessing Cell Phone In Jail

    The Mississippi Supreme Court has affirmed the 12-year sentence for a black man who brought a cell phone into jail after being booked for a misdemeanor. Authorities discovered he had the phone when he asked a jailer...

    • Posted 2 days ago
    • 0
  • An Unlikely Industry That Could Be Snared By The CCPA

    Just how wide is the reach of the California Consumer Protection Act? Could it apply to companies that only incidentally collect and process personal information in the course of operating drones? Does advanced facial recognition software mean...

    • Posted 5 days ago
    • 0
  • Ongoing Entitlement Reviews Crucial for Cybersecurity

    Internal breaches, often inadvertent, are now the greatest threat to cybersecurity. According to a study by Verizon, the number of insider related breaches is rising annually. In the first half of 2019, 4.1 billion records were exposed...

    • Posted 6 days ago
    • 0
  • Biometrics Is Litigation Flashpoint In Illinois

    Biometric technology is just “a natural outgrowth of how humans have always told each other apart,” according to one attorney cited in this post from trade publication BiometricUpdate.com, as he casts a skeptical eye on Illinois’s Biometric...

    • Posted 1 week ago
    • 0
  • Big Data Breach at Fuel and Convenience Store Chain

    Wawa, Inc., a chain of convenience and fuel stores in Pennsylvania, New Jersey, Delaware, Maryland, Virginia, Washington D.C. and Florida, tells customers that they have been victimized by a “data security incident.” An open letter from the...

    • Posted 2 weeks ago
    • 0
  • Four Questions To Answer About New Privacy Regulations

    Many companies, and not just in California, as of January 1 became subject to The California Consumer Privacy Act. Those that didn’t should assume this law is almost certainly the first of a coming generation of privacy...

    • Posted 2 weeks ago
    • 0
  • Strengthen Digital Strategy in the Public Sector

    Data protection regulation such as the GDPR has exploded, while at the same time data protection has suffered. The abundance of data protection lulls people into a false sense of security. Governments’ digital capabilities make overcoming their...

    • Posted 3 weeks ago
    • 0
  • Creating a Healthy Cybersecurity Framework

    Cybersecurity in its simplest form is the protection of digital information from compromise through use of electronic systems and protocols to prevent loss or theft. It requires a close working relationship between C-suite, legal and IT personnel...

    • Posted 3 weeks ago
    • 0
  • Cybersecurity and Trade Secret Protection

    Cybersecurity is a major concern for multiple functions of a company, as well as for compliance with regulatory requirements. IT groups take the lead in crafting and detailing security policies, but involvement by the legal team is...

    • Posted 3 weeks ago
    • 0
  • New Ransomware Threat: We’ll Broadcast Data You Won’t Buy Back

    Purveyors of a strain of malware called Maze Ransomware have added another term to their extortion deal. Not only will they freeze your computers if you don’t pay up, they will start publishing your data. This ploy...

    • Posted 3 weeks ago
    • 0
Do NOT follow this link or you will be banned from the site!