Remove Government Remove Risk Remove Surveillance Remove Technology
article thumbnail

Managing technology risk

CyberSecurity Insiders

Numerous risks are inherent in the technologies that all organizations use. These risks have especially become apparent with recent ransomware attacks, which have crippled major infrastructure such as the Colonial Pipeline in the Eastern United States 1. The first part of GRC is governance.

article thumbnail

Apple Calls Out 'Mercenary Spyware' Vendors Enabling State Surveillance

SecureWorld News

Apple has escalated its fight against the commercial spyware industry enabling state actors to conduct highly-targeted cyberattacks against journalists, activists, politicians, and other high-risk individuals around the world. Apple also seems to have been giving notifications to that same high-risk group who they know have been targeted.

Spyware 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Predator Files: A Scathing Indictment of EU Surveillance Regulation

SecureWorld News

In a groundbreaking investigative report, the European Investigative Collaborations (EIC) media network, with technical assistance from Amnesty International's Security Lab, has exposed the shocking extent of the global surveillance crisis and the glaring inadequacies of EU regulation in curbing it. Chairman, Cedric Leighton Associates, LLC.

article thumbnail

Parents and teachers believe digital surveillance of kids outweighs risks

Malwarebytes

Schools in the US have been using surveillance software to keep an eye on their students, and such software has grown significantly in popularity since the COVD-19 pandemic closed campuses nationwide. In fact, they worry that such surveillance could backfire. Source: The CDT).

article thumbnail

US Gov sanctioned Intellexa Consortium individuals and entities behind Predator spyware attacks

Security Affairs

government sanctioned two individuals and five entities linked to the development and distribution of the Predator spyware used to target Americans. The surveillance software was also used to spy on U.S. government officials, journalists, and policy experts. government officials, journalists, and policy experts. .

Spyware 100
article thumbnail

What Is Integrated Risk Management? Definition & Implementation

eSecurity Planet

Integrated risk management (IRM) is a discipline designed to embed risk considerations for the use of technology throughout an organization. In other words, it links technology spending directly to the value of the resource protected and the associated risks controlled by that technology.

Risk 67
article thumbnail

EU bodies agree on new EU export rules for dual-use technology

Security Affairs

The European Union this week agreed to tighten up rules for the sale and export of dual-use technology. European Parliament votes to tighten up rules for the sale and export of surveillance and encryption technology. The term “ dual-use ” refers to technology that can be used for both peaceful and military aims.