article thumbnail

The ePrivacy Regulation

BH Consulting

It is an update that takes account of the many changes in technology since its predecessor, the ePrivacy Directive, was passed in 2002. Once it comes into force, the new regulation aims to ensure privacy in all electronic communications.

article thumbnail

The Origins and History of the Dark Web

Identity IQ

You probably use the deep web all the time — examples may include bank accounts, your email, and login-restricted content such as news or streaming entertainment. The Future of the Dark Web The future of the dark web is uncertain as it continues to evolve and adapt to new technologies and law enforcement methods.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CSO's ultimate guide to security and privacy laws, regulations, and compliance

CSO Magazine

Health Insurance Portability and Accountability Act (HIPAA). The Health Information Technology for Economic and Clinical Health Act (HITECH). Purpose: Enacted in 2002, the Sarbanes-Oxley Act is designed to protect investors and the public by increasing the accuracy and reliability of corporate disclosures. NERC) standards.

CSO 128
article thumbnail

Citrix Workspace flaw can allow remote hack of devices running vulnerable app

Security Affairs

The advisory published by the vendor confirmes that the issue only impact the Windows version of the Workspace app and only exists if the application was installed using a local or domain admin account. “ Citrix Workspace is vulnerable to a remote command execution attack running under the context of the SYSTEM account.

Hacking 86
article thumbnail

Should the CISO Report to the CIO?

Cisco Security

The Chief Information Security Officer (CISO) is the organization’s senior executive in charge of the cybersecurity and the information technology risk management posture of the enterprise. A growing consensus among information technology and C-level executives is that the CISO’s priorities should not be subsumed under the CIO’s priorities.

CISO 110
article thumbnail

To the Black Axe: #GardaWillGetYou

Security Boulevard

The pair were in communication with someone who they referred to as "the Chairman" where they discussed laundering funds, partly via bank accounts located in Germany. The story is expertly conveyed by Liam Heylin of the Irish Examiner, which I summarize below: From Cork to Nigeria: Gang of cybercriminals caught out by their own technology .

Banking 62
article thumbnail

How the FTC’s Amendments to the Safeguards Rule Affects Auto Dealerships

Duo's Security Blog

And one of the few security technologies that is specifically called out by the FTC is multi-factor authentication (MFA). In 1999, Congress passed the Gramm-Leach-Bliley Act (GBLA) that established the 2002 Safeguards Rule. For companies that are new to this technology, it can seem intimidating.