article thumbnail

Emergency Surveillance During COVID-19 Crisis

Schneier on Security

With that in mind, the EFF has some good thinking on how to balance public safety with civil liberties: Thus, any data collection and digital monitoring of potential carriers of COVID-19 should take into consideration and commit to these principles: Privacy intrusions must be necessary and proportionate. Transparency. Due Process.

article thumbnail

GUEST ESSAY: California pioneers privacy law at state level; VA, VT, CO, NJ take steps to follow

The Last Watchdog

These regulations have certainly contributed to the movement towards consumerism and prompted businesses in the United States to rethink data collection and management, considering how violating these regulations could adversely affect their business and brand. For many, the answer is yes. If the U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Info-sharing pact will help electric companies comply with DOE’s 100-day plan

SC Magazine

One of the new tools that E-ISAC’s approximately 1,200 North American members can now use to protect their assets is Neighborhood Keeper – an opt-in, sensor-enabled data collection and information-sharing network from Dragos. And because the data is anonymized, it can be safely shared with government partners as well.

article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

Tony Sager (TS): The federal government has been worrying about this kind of problem for decades. In the 70s and 80s, the government was more dominant in the technology industry and didn’t have this massive internationalization of the technology supply chain. It’s too easy to hide. It’s a hard problem category.

article thumbnail

How to prepare for the California Consumer Privacy Act

Thales Cloud Protection & Licensing

For example, data collected by an entity may not be associated with an individual but could identify a household. Under the CCPA publicly available information is defined as “lawfully made available from federal, state, or local government records, if any conditions associated with such information.”. Where is a CISO to begin?

article thumbnail

The Hacker Mind Podcast: Incident Response in the Cloud

ForAllSecure

And then you go and help the customer on site because the data is on site and you need to actually kind of get hands on to the point we used to do imaging in big data centers and stuff and it take hours because terabytes of data and you'd have people sleeping in the data center, like which is crazy.

article thumbnail

Top Threat Intelligence Platforms for 2021

eSecurity Planet

LookingGlass Cyber Solutions is an open source-based threat intelligence platform that delivers unified threat protection against sophisticated cyberattacks to global enterprises and government agencies by operationalizing threat intelligence. It’s augmented by a worldwide team of security analysts who enrich the data feeds.