article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

It foreshadowed how encryption would come to be used as a foundation for Internet commerce – by companies and criminals. It was unleashed on the internet at the Massachusetts Institute of Technology (MIT) and began infecting computers at various universities. The ILOVEYOU Worm (2000). The Creeper Virus (1971).

article thumbnail

Canada’s Privacy Commissioner Pursues a Stronger Consent Framework and More Proactive Enforcement

Privacy and Cybersecurity Law

Alternatives to Consent: The Commissioner outlined three potential solutions for enhancing privacy protection where traditional consent models conflict with advances in technology, including: De-identification: In some circumstances, like big data, de-identification protocols may be the right solution. and Europe.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Critical Event Management (CEM) Leader Everbridge Completes Acquisition of xMatters to Accelerate Digital Transformation for Enterprise IT and Cyber Resilience

CyberSecurity Insiders

xMatters’ strong position within many of the Fortune 1000 and Global 2000 adds even greater value to our CIO and C-suite customers and prospects across large enterprises.

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Through acquisitions in the 2000s, SAP launched their database platform, HANA, in 2010. SAP HANA offers a database, data processing, and a framework for application development and big data sources. With data anonymization and dynamic data masking, organizations can feel confident knowing their data is secure.

Firewall 117