article thumbnail

Managing technology risk

CyberSecurity Insiders

Numerous risks are inherent in the technologies that all organizations use. These risks have especially become apparent with recent ransomware attacks, which have crippled major infrastructure such as the Colonial Pipeline in the Eastern United States 1. The first part of GRC is governance. The final area of GRC is compliance.

article thumbnail

Apple Calls Out 'Mercenary Spyware' Vendors Enabling State Surveillance

SecureWorld News

Apple has escalated its fight against the commercial spyware industry enabling state actors to conduct highly-targeted cyberattacks against journalists, activists, politicians, and other high-risk individuals around the world. Apple also seems to have been giving notifications to that same high-risk group who they know have been targeted.

Spyware 91
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Predator Files: A Scathing Indictment of EU Surveillance Regulation

SecureWorld News

In a groundbreaking investigative report, the European Investigative Collaborations (EIC) media network, with technical assistance from Amnesty International's Security Lab, has exposed the shocking extent of the global surveillance crisis and the glaring inadequacies of EU regulation in curbing it. Chairman, Cedric Leighton Associates, LLC.

article thumbnail

Parents and teachers believe digital surveillance of kids outweighs risks

Malwarebytes

Schools in the US have been using surveillance software to keep an eye on their students, and such software has grown significantly in popularity since the COVD-19 pandemic closed campuses nationwide. In fact, they worry that such surveillance could backfire. Source: The CDT).

article thumbnail

On Surveillance in the Workplace

Schneier on Security

Touted as useful management tools, they can augment biased and discriminatory practices in workplace evaluations and segment workforces into risk categories based on patterns of behavior. These technologies are generally used first against people with diminished rights: prisoners, children, the mentally ill, and soldiers.

article thumbnail

Apple Guidance on Intimate Partner Surveillance

Adam Shostack

Apple has released (or I’ve just come across) a document Device and Data Access when Personal Safety is At Risk. They’re unreasonable because ever year in the United States, 1,000 to 1,600 women die at the hands of their male partners, and some fraction of those are enabled by technology-aided surveillance.

article thumbnail

What Is Integrated Risk Management? Definition & Implementation

eSecurity Planet

Integrated risk management (IRM) is a discipline designed to embed risk considerations for the use of technology throughout an organization. In other words, it links technology spending directly to the value of the resource protected and the associated risks controlled by that technology.

Risk 67