ac

Live Webinar | Best Practices for Securing Unmanaged and IoT Devices at Massive and Growing Scale




ac

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




ac

Digital Contact-Tracing Apps: Hype or Helpful?

Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn Against
Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.




ac

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




ac

Digital Contact-Tracing Apps Must Win Hearts and Minds

We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode Well
Despite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track?




ac

Analysis: COVID-19 Contact-Tracing Privacy Issues

The latest edition of the ISMG Security Report analyzes the privacy issues raised by COVID-19 contact-tracing apps. Also featured: An update on efforts to fight fraud tied to economic stimulus payments; John Kindervag on the origins of "zero trust."




ac

Analysis: Ransomware's Costly Impact

The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce.




ac

Analysis: The Contact-Tracing Conundrum

The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing.




ac

Your Phone and Your Face: Anchoring Users to Real Identities




ac

Digital Contact-Tracing Apps: Hype or Helpful?

Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn Against
Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.




ac

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




ac

Digital Contact-Tracing Apps Must Win Hearts and Minds

We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode Well
Despite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track?




ac

Analysis: Ransomware's Costly Impact

The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce.




ac

Analysis: The Contact-Tracing Conundrum

The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing.




ac

NIST FIPS PUB 201-2: Personal Identity Verification of Federal Employees and Contractors DRAFT

Specifying architecture and technical requirements for a common identification standard for federal employees and contractors.




ac

DoD: Notice of Proposed Rulemaking on Privacy Training

The Department of Defense and two other government agencies have issued a proposed rule designed to help ensure that government contractors provide adequate privacy training to their staff members.




ac

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




ac

Digital Contact-Tracing Apps: Hype or Helpful?

Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn Against
Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.




ac

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




ac

Digital Contact-Tracing Apps Must Win Hearts and Minds

We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode Well
Despite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track?




ac

Analysis: Ransomware's Costly Impact

The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce.




ac

Analysis: The Contact-Tracing Conundrum

The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing.




ac

Digital Contact-Tracing Apps: Hype or Helpful?

Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn Against
Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.




ac

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




ac

Digital Contact-Tracing Apps Must Win Hearts and Minds

We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode Well
Despite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track?




ac

Analysis: Ransomware's Costly Impact

The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce.




ac

Analysis: The Contact-Tracing Conundrum

The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing.




ac

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




ac

Digital Contact-Tracing Apps: Hype or Helpful?

Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn Against
Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.




ac

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




ac

Digital Contact-Tracing Apps Must Win Hearts and Minds

We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode Well
Despite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track?




ac

Analysis: The Contact-Tracing Conundrum

The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing.




ac

Live Webinar | Best Practices for Securing Unmanaged and IoT Devices at Massive and Growing Scale




ac

Annual Report to Congress on Breaches of Unsecured Protected Health Information

The Department of Health and Human Services' Office for Civil Rights provided a report to Congress on health information breaches from September 2009 through 2010, as required under the HITECH Act. Nearly 7.9 million Americans were affected by almost 30,800 health information breaches, according to the report.




ac

RBI: Security Issues and Risk Mitigation Measures Related to Card-Present Transactions

The Reserve Bank of India on Sept. 22, 2011 issued a notification on security issues and risk mitigation measures related to card-present transactions.




ac

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




ac

[Coronavirus] Vestager pushes tracing apps as key for summer holidays

The commissioner for the digital portfolio, Margrethe Vestager, warned that "without the technology, it will be very difficult to open [society] to the degree that we all want" - since new outbreaks might surge back until there is a vaccine.




ac

[Ticker] 'Significant weaknesses' on EU disinformation approach

A new report from the European Regulators Group for Audiovisual Media Services (ERGA) on the implementation of the EU Commission's 2018 code of practice on disinformation reveals "significant weaknesses" linked to the lack of transparency and voluntary approach. ERGA proposes shifting from the current flexible self-regulatory approach to co-regulatory. The code targeted companies such as Google, Facebook and Twitter.




ac

[Ticker] UK becomes Europe's deadliest place for coronavirus

The number of coronavirus deaths in the UK reached 29,427 Tuesday, surpassing Italy (29,029), to become Europe's worst-struck country and the second-worst globally after the US, while prompting calls for a public enquiry into government handling of the crisis. "I really don't like this league table of who's top and who's not, but there's no denying that these are really serious numbers," Cambridge University expert David Spiegelhalter told The Guardian.




ac

[Ticker] Panama to be added to EU money-laundering blacklist

Panama, the Bahamas, and Mauritius are to be added to an EU blacklist of countries on Thursday that "pose significant threats to the financial system of the [European] Union" on money-laundering grounds due to lax legislation at home, Reuters reports, citing a draft EU document. Barbados, Botswana, Cambodia, Ghana, Jamaica, Mongolia, Myanmar, Nicaragua and Zimbabwe are also on the list, meaning EU banks must do enhanced due diligence on transactions.




ac

[Ticker] Commission: Eurozone will contract by record 7.75%

The eurozone will contract by a record 7.75 percent in 2020 but grow by 6.25 percent in 2021, the EU Commission said in its economic forecast on Wednesday. The EU-wide economy is to contract by 7.5 percent this year and grow by around six percent in 2021. The sharpest drop is estimated in Greece with 9.7 percent, in Italy with 9.5 percent and in Spain by 9.4 percent.




ac

[Ticker] Baltic states reopen their borders to each other

The three Baltic states of Estonia, Latvia and Lithuania plan to open their mutual borders on 15 May for their residents, prime ministers of the countries said on Wednesday. However, people arriving from any other country to the Baltic three will have to undergo a 14-day self-quarantine. Most member states within the EU's passport-free Schengen zone have closed their borders in an effort to stop the spread of the virus.




ac

[Opinion] The Dutch tracing app 'soap opera' - lessons for Europe

The app would need to be paired with more than 100,000 daily tests in order to have effect. And far more than 60 percent of the population will need to use the app in order for it to be effective.




ac

[Ticker] Berlin journalists attacked by lockdown protesters

For the second time in a week, journalists in Berlin have been attacked by anti-lockdown protesters, Deutsche Welle reports. Each time a TV crew with camera were attacked when they approached a group of people protesting against measures to contain the coronavirus. Germany's foreign minister Heiko Maas condemned the attacks, saying on Twitter "those who attack journalists also attack our democracy."




ac

[Interview] Kaczyński turning Poland into 'Franco's Spain'

Polish ruling party chairman Jarosław Kaczyński is trying to turn the country into a Roman Catholic dictatorship, Poland's former foreign minister has said.




ac

[Ticker] EU top court hits back after German ruling

The EU's top court, the European Court of Justice, warned Friday the bloc's legal order could unravel if national courts started to question the primacy of EU law and ECJ decisions. In an unprecedented statement, after the German Constitutional Court's ruling on the European Central Bank diverging from an earlier ECJ decision, the ECJ said it alone has the right to rule on EU institutions and interpret EU law.




ac

Renewables To Account for All New Power in Australia through 2020, Says AEMO

A new report from the Australian Energy Market Operator (AEMO) forecasts 100 percent of new power in Australia will be generated from renewable energy sources through 2020.




ac

Renewable Energy Provides 100% of All New US Electrical Generating Capacity in November 2013

According to the latest "Energy Infrastructure Update" report from the Federal Energy Regulatory Commission's Office of Energy Projects, solar, biomass, wind, geothermal, and hydropower "units" provided 394 MW — or 100 percent — of all new electrical generation placed in-service in November 2013. There was no new capacity during the month from natural gas, coal, oil, or nuclear power. Renewable energy sources also provided 99 percent of all new electrical generating capacity in October.




ac

Iberdrola-Backed AlgaEnergy May Build Mexico Biomass Plant

AlgaEnergy SA, part-owned by Spain’s Iberdrola SA and Repsol SA, is in talks with potential partners to set up a plant in Mexico to supply the American markets with biomass made from algae.




ac

Greenpeace Praises Apple's Increased Commitment to Renewable Energy

Greenpeace issued its annual report on the energy efficiency of Internet companies, praising Apple Inc., Facebook Inc. and other major providers of online services for improved use of energy resources.