Tag Archives for " security "

EU to force tech firms to hand over terror suspects’ messages

The European commission is seeking to force technology companies wherever they are based in the EU to hand over emails, text messages and app communications of terror suspects within hours of a court order.

Under the plans, judges in one member state will be able to seize electronic evidence held on a service provider in another European country through a transnational European production order.

Source: EU to force tech firms to hand over terror suspects’ messages | World news | The Guardian

Advisory group releases IoT safety and design risk toolkit

Hundreds of initiatives have been launched over the past several years to tackle the issue of internet-of-things security in the design phase for devices. AgeLight Advisory Group Managing Director Craig Spiezle spent the time to review more than 1,500 documents to see what those initiatives hoped to achieve.

AgeLight has released the fruits of Spiezle’s work in the form of the IoT Safety and Trust Design Architecture and Risk Toolkit. The toolkit seeks to achieve three primary goals: to guide and drive industry into self-regulation, to promote high-value privacy and security practices, and to deliver trustworthy devices to the marketplace.

Source: Advisory group releases IoT safety and design risk toolkit

Take Action to Close the Largest Cause of Data Security Incidents – Your Employees

If you work at a typical company, employee actions and inadvertent present the greatest threat to the security of your data.

Therefore, providing proper training and technical safeguards is one of the most important means to enhance your company’s security profile.

Source: Deeper Dive: Take Action to Close the Largest Cause of Data Security Incidents – Your Employees

Healthcare Industry Worst in Stopping Insider Data Breaches

The healthcare industry is the worst when it comes to stopping insider data breaches, according to Verizon’s 2018 Data Breach Investigations Report released April 10.

The report found that the healthcare industry was the only sector that had more internal actors (56 percent) behind data breaches than external actors (43 percent).

Source: Healthcare Industry Worst in Stopping Insider Data Breaches

Subaru will use facial recognition technology to detect driver fatigue

The new Subaru Forester, one of the brand’s best-sellers in the US, made its debut at the New York International Auto Show today.

With it comes EyeSight, Subaru’s driver-assist technology, and an interesting new safety feature that is totally new to the automaker’s lineup: facial recognition.

Source: Subaru will use facial recognition technology to detect driver fatigue – The Verge

‘Big Brother’ in India Requires Fingerprint Scans for Food, Phones and Finances

The government requires its people to submit finger, eye and facial images. The ID is mandatory for many services, but opponents say it infringes privacy.

Seeking to build an identification system of unprecedented scope, India is scanning the fingerprints, eyes and faces of its 1.3 billion residents and connecting the data to everything from welfare benefits to mobile phones.

Source: ‘Big Brother’ in India Requires Fingerprint Scans for Food, Phones and Finances – The New York Times

Is France misusing secretive database in hunt for security threats?

France has flagged more than 78,000 people as security threats in a database intended to let European police share information on the continent’s most dangerous residents — more than all other European countries put together — according to an analysis by The Associated Press.

A German parliamentarian, Andrej Hunko, was the first to raise the alarm about potential misuse of the Schengen Information System database in a question to his country’s Interior Ministry about “discreet checks” — secret international checks on people considered a threat to national security or public safety. He questioned whether and why different countries seemed to apply very different criteria.

Source: ‘Discreet checks’: Is France misusing secretive database in hunt for security threats? | CTV News

What is a privacy engineer?

In recent years, the term “privacy engineering” has entered the professional lexicon. It’s a term that’s bandied about, usually with high regard -€” heck, it even has a Wikipedia page -” but it’s not always clear what a privacy engineer is or does, at least generally speaking.

Is a privacy engineer someone who has a PhD in computer science and codes notions of privacy (whatever that is) into IT systems, services and products? Or is the work of a privacy engineer more broad in scope than that?

Source: What is a privacy engineer?

Companies still struggle to hire security pro

One-third of organizations report experiencing a security breach, and 68% are not confident that they can protect against an advanced attack.

The war for qualified cybersecurity talent wages on, as two out of three organizations report that finding such professionals is a challenge, according to a Thursday report from open source cyber training platform Cybrary and Cyentia Institute. With more than 285,000 open positions in the cyber field, businesses often must turn to training their own employees to take on these tasks and protect their company’s assets.

Source: Companies still struggle to hire security pros; use in-house training to fill the gaps – TechRepublic

Benchmarking data reveals importance of paper incidents across industries

In a world where ransomware and hacking attacks have become increasingly commonplace, it can be easy to assume that your electronic data is most at risk of unauthorized access and disclosure resulting in a data breach. In reality, paper incidents are far more common and more likely to result in a data breach.

Source: Looking good on paper: benchmarking data reveals importance of paper incidents across industries

1 2 3 20
>