There’s no mistake, we’re in a recessionary cycle. We can stay out of the politics and debate related to predicting the exact cause, effect, size, and timeline of the recession.
Continue Reading The Impact of Recession on Cybersecurity Programs: Beware of the Trap Gamecybersecurity
To Avoid Punitive Damages for a Data Breach in Connecticut, You Need to Try
In Connecticut, if you adopt and maintain and comply with written cybersecurity program that contains administrative, technical and physical safeguards for the protection of personal or restricted information and that…
Continue Reading To Avoid Punitive Damages for a Data Breach in Connecticut, You Need to Try
France’s CNIL Fines Data Processor and Data Controller Over Credential-Stuffing Attack
Data Processors beware.
France’s CNIL issued an enforcement action against both a data controller (150,000 EUR) and a data processor (75,000 EUR) for inadequate information security measures leading to a…
Identifying Supply Chain Cybersecurity Risks: Tips From Down Under
The Australian Cyber Security Center has published a guide on identifying cyber supply chain risks in suppliers, manufacturers, distributors and retailers.
A key area flagged is foreign control, influence and…
Continue Reading Identifying Supply Chain Cybersecurity Risks: Tips From Down Under
Cybersecurity, Privacy Mandates Included in New Federal Autonomous Vehicle Bill
U.S Rep. Bob Latta (R-Ohio), ranking member of the House Energy and Commerce Subcommittee on Communications and Technology. has re-introduced the “Safely Ensuring Lives Future Deployment and Research In Vehicle…
Continue Reading Cybersecurity, Privacy Mandates Included in New Federal Autonomous Vehicle Bill
NSA Issues White Paper on Location Data
The National Security Administration issued a white paper on location data:
- Using a mobile device — even powering it on — exposes location data.
- Cellular providers and commercially available rogue
New Zealand Issues Helpful Cybersecurity Incident Management Guide
New Zealand’s Government Cyber Security Centre has issued a guide on incident response, laying out key steps designed to help business leaders and cybersecurity professionals strengthen their organizations’ ability to…
Continue Reading New Zealand Issues Helpful Cybersecurity Incident Management Guide
New Jersey Issues Best Practices for Healthcare Industry to Combat COVID-19 Cyberattacks
The New Jersey Cybersecurity and Communications Integration Cell (NJCCIC) issued an advisory to hospitals and other healthcare organizations that cybercriminals are targeting them with phishing campaigns, ransomware, and other malicious…
Continue Reading New Jersey Issues Best Practices for Healthcare Industry to Combat COVID-19 Cyberattacks
CISO White Paper on CCPA Compliance Guides Cybersecurity Leaders in Retail and Hospitality
CISO members of the Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC) published a white paper to help cybersecurity leaders in retail and hospitality prepare for compliance with the…
Continue Reading CISO White Paper on CCPA Compliance Guides Cybersecurity Leaders in Retail and Hospitality
Survey: Data Privacy Investments Pay Dividends
Privacy compliance as a competitive differentiator: 97% of 3,200 companies surveyed say they are receiving auxiliary benefits today from their data privacy investments, beyond just meeting compliance requirements.
Benefits cited…
Continue Reading Survey: Data Privacy Investments Pay Dividends