article thumbnail

Australia passes new data privacy bill for criminals

CyberSecurity Insiders

Titled the Surveillance Legislation Amendment (Identity and Disrupt) bill, it will allow the Australian Federal Police (AFP) and Australian Criminal Intelligence Commission to get data disruption warrants to change, copy, add or delete data related to cyber criminals and suspects.

article thumbnail

2020 Predictions: New Challenges for Data Privacy and the 5G Hackathon

Thales Cloud Protection & Licensing

At the same time, consumers are deeply concerned with how their data is collected and used. So what’s in store for data privacy and the rollout of of 5G technology? Consumer Rights and Privacy Fines. 2018 was a breakthrough year for consumer rights and data privacy regulations with the introduction of GDPR.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Is a Vulnerability Assessment? Types, Steps & Benefits

eSecurity Planet

Physical security vulnerability assessment: This form of assessment focuses on finding weaknesses in physical security, including perimeter security, access controls, and surveillance systems. Achieve compliance with data privacy laws and other regulations. How Much Do Vulnerability Assessments Cost?

article thumbnail

SHARED INTEL: How NTA/NDR systems get to ‘ground truth’ of cyber attacks, unauthorized traffic

The Last Watchdog

In one case, ExtraHop tracked a made-in-China surveillance cam sending UDP traffic logs , every 30 minutes, to a known malicious IP address with ties to China. In another case, a device management tool was deployed in a hospital and used the WiFi network to insure data privacy, as it provisioned connected devices.

article thumbnail

Data Localisation – The Magic Bullet?

McAfee

They are effectively three degrees of a single concept: how data privacy impacts cross-border data flows. Data residency refers to the country where an organisation specifies that its data is stored, usually for regulatory or policy reasons. 8] Let’s take for instance the use of a VPN to protect privacy.

article thumbnail

Cybersecurity & Artificial Intelligence (AI) – a view from the EU Rear Window, Part II

McAfee

The European Parliament highlights that “AI can both be a threat to cybersecurity and the main tool against cyber-attacks.”