Remove category privacy
article thumbnail

Colorado Privacy Act – Blog Series (Part III)

TrustArc

This is part III in a four-part series on the Colorado Privacy Act.

article thumbnail

Quick Threat Model Links October 2019

Adam Shostack

Continuum has a blog and a spreadsheet on threat modeling lambdas (as a category, not specific to Amazon Lambda), and also a post on threat modeling with CAPEC. There’s some context from Aaron Small, who made the project happen. What else have you seen? I’m hoping to find time to write more deeply on several of these.

189
189
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mozilla Releases Annual Privacy Guide to Holiday Shopping

Adam Levin

The Mozilla Foundation has released the second installation of *Privacy Not included, the organization’s annual privacy guide to internet-connected gifts. The list was started to promote the idea that privacy and security by design can and should be a major selling point. At the very bottom of the “Not Creepy” list?

Internet 187
article thumbnail

FISMA Compliance: A Complete Guide to Navigating Low, Moderate, and High Levels

Centraleyes

NIST Special Publication 800-53, “Security and Privacy Controls for Federal Information Systems and Organizations,” complements FIPS-199 by providing a catalog of FISMA controls for different impact levels. The idea is that the security category should reflect the most significant potential impact.

Risk 52
article thumbnail

Data Privacy in the United States: A Recap of 2023 Developments

Centraleyes

2023 marked a surge in comprehensive state data privacy laws. At the beginning of the year, only five states—California, Colorado, Virginia, Utah, and Connecticut—had comprehensive data privacy legislation. By the end of the year, the number of states with privacy laws more than doubled.

article thumbnail

GUEST ESSAY: A breakout of how Google, Facebook, Instagram enable third-party snooping

The Last Watchdog

To provide even further insight into the data safety and privacy practices of app developers, researchers at Incogni conducted a study of the top 500 paid and top 500 free Google Play Store apps. Among the app categories, shopping, business, and food & drink were found to be sharing the most user data. Greediest data harvesters.

article thumbnail

DoD Adds Two More (ISC)² Certifications to Requirements for Cybersecurity Staff

CyberSecurity Insiders

This means that the entire roster of (ISC)² certifications are now required for different security workforce categories within the Department, depending on the functional area the role covers. The HCISPP has been approved for the following categories: Information Assurance Manager Level 1 (IAM 1). IAM Level II (IAM II).