In a recent article from CSO Online, analyst Jon Oltsik wrote that many security professionals are unclear about the true meaning of software defined perimeter because of its confusing nomenclature.
After several years in the making and a tidal wave of press coverage, the long-awaited EU General Data Protection Regulation (GDPR) finally came into force on May 25. And we’re all still here. But even if you still haven’t got your compliance house in order, it’s not too late.
Last week the biggest change to Europe’s privacy laws in almost a generation came into force. Depending on your organization it very well might require a major new approach to data protection — even if you’re located outside the EU.
At the time of this writing, the GDPR is about two weeks away. That’s a very short time when it comes to preparing for a new compliance regime, and we hope that most of you reading this have completed your preparations already. If not… well, there’s still time to prepare.
Dig into a law firm, and you’ll find secrets. Sometimes these secrets are mundane, like who’s getting divorced, or who’s getting cut out of the will. Sometimes, however, these secrets can shake nations and economies.
Over the last few months, we’ve talked extensively about the GDPR – but the GDPR isn’t the only data protection regime on the planet. In Japan, legislators have just enacted changes to the nation’s flagship data privacy regime. Let’s look at how these changes will affect those hoping to do business there.
Imagine having to put rubber boots on to fix the damage from a cyberattack. This act was a reality for researchers at a simulated coal plant in Sweden, where a paid penetration tester proved the vulnerability of the plant’s physical systems by tampering with its cooling system.
As of this writing, we’re just a month into 2018, and it’s already looking like an interesting year in the realm of information security. Here, interesting means fraught. The first few days of the year ushered in devastating news in the form of the Specter and Meltdown vulnerabilities.
Another year has gone by – another year that seems to have been a single all-consuming cyber-disaster. 2017 has been so bad for information security that it’s hard to even visualize separate security incidents.