Remove CSO Remove Data privacy Remove Hacking Remove Technology
article thumbnail

CSO's ultimate guide to security and privacy laws, regulations, and compliance

CSO Magazine

CSO's ultimate guide to security and privacy laws, regulations, and compliance Security and privacy laws, regulations, and compliance: The complete guide This directory includes laws, regulations and industry guidelines with significant security and privacy impact and requirements. NERC) standards. Massachusetts Bill H.4806

CSO 128
article thumbnail

Uber Breach Guilty Verdict, Mandatory Password Expiration, Fake Executive Profiles on LinkedIn

Security Boulevard

Former Uber CSO Joe Sullivan was found guilty of obstructing a federal investigation in connection with the attempted cover-up of a 2016 hack at Uber, NIST and Microsoft say that mandatory password expiration is no longer needed but many organizations are still doing it, and how fake executive profiles are becoming a huge problem for […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Wells Notice Against SolarWinds CISO Could Be First of Its Kind

SecureWorld News

While these Wells Notices are official investigations, they are a sign of a potential intent to investigate the CISO and CFO. It will be interesting to watch how the SEC navigates this next stage and its broader impact on the approach by executives in managing cyber risk."

CISO 92
article thumbnail

Why the modern CISO should plan for greater Cybersecurity Regulations in the Biden Era

SC Magazine

Achieve Compliance and Data Privacy Regulation Standardization at the Federal Level. Too many organizations are implementing just enough measures to “check the box” on their cybersecurity strategy, which dramatically reduces the value compliance is meant to drive and leads to breaches that compromise sensitive customer data.

CISO 96
article thumbnail

Episode 251: Kry10 CEO Boyd Multerer on building a secure OS for the IoT

The Security Ledger

In this conversation, I talk with Boyd about Kry10’s technology and the challenge of securing the modern IoT and how the challenges of managing modern, connected devices demands new tools and platforms for securing those devices. Related Stories Episode 250: Window Snyder of Thistle on Making IoT Security Easy Forget the IoT.

IoT 52
article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., According to thought leaders, the compromise of video data could result in intellectual property theft, physical security threats, privacy violations, extortion and perhaps regulatory punishment.