You are here
Home > Author: Peter Glock

The ICIC adopts Johannesburg Charter

T he ICIC is the   International Conference of Information Commissioners. The Conference was first held in 2003 when Information Commissioners and Ombudsmen met for the first time in Berlin to adopt a declaration for further cooperation and experience sharing among regulatory authorities charged with overseeing the access to public information.

Avoiding the California Privacy and Security Litigation Tsunami: CCPA FAQ: Is a service provider permitted to disclose personal information if it receives a civil subpoena or a discovery request?

My advice (Disclaimer: I'm not a lawyer) is to use GDPR as your baseline privacy framework then manage the gaps for tricksy places like California...: Companies that do business in California know that it is a magnet for class action litigation.  The California Consumer Privacy Act ("CCPA"), a new privacy law that applies to data collected about California residents, will provide even more incentive to plaintiff’s attorneys to bring suit in California. The CCPA was enacte

China may miss out on $5.5 trillion in growth if it doesn’t take data privacy more seriously

When Porter wrote about the Competitive Advantage of Nations, GDPR et al weren't even a twinkle in the eye of regulators. There's good reason for nations and organisations to take privacy seriously...: If China doesn't step up its efforts on issues such as data privacy and intellectual property protection, the country could lose out on a 37 trillion yuan ($5.5 trillion) growth opportunity in the decade ahead, according to new analysis. Based on research from economics con

Over 100,000 GitHub repos have leaked API or cryptographic keys

Think before you 'git commit && git push'...: A scan of billions of files from 13 percent of all GitHub public repositories over a period of six months has revealed that over 100,000 repos have leaked API tokens and cryptographic keys, with thousands of new repositories leaking new secrets on a daily basis. The scan was the object of academic research carried out by a team from the North Carolina State University (NCSU), and the study's results have been shared wi

Researchers Seek Out Ways to Search IPv6 Space

This puts the challenges for security researchers in perspective as the planet shifts to IPv6...: [...] Time for a little math. The IPv6 Internet has 2^128 addresses, or 3.4 times 10^38 — an astronomical number. (For comparison, astronomers estimate that there are 2 times 10^23 stars in the universe, which means there are a million billion times more IPv6 addresses than stars.) If it took a single second to scan the entire IPv4 address space, it would take 25 billion bill...

These are the top ten security vulnerabilities most exploited by hackers

We should all know by now that "Risk = likelihood x impact".  Given the likelihood that someone will attempt to exploit these vulnerabilities in your network it's worth checking if an attack against one of these top ten would work against you...: Security vulnerabilities in Microsoft software have become an even more popular means of attack by cyber criminals - but an Adobe Flash vulnerability still ranks as the second most used exploit by hacking groups. Analysis by rese

According to Survey, Difficulty Getting Budget is the Top Legal Tech Struggle for GCs: eDiscovery Trends

Professional services firms struggle to justify internal spend that can't be billed out to a client. I seems that GCs suffer from the same problem...: According a new survey from Clyde & Co and Winmark, the number one reason that General Counsel (GCs) struggle with legal tech adoption and implementation is "difficulty in getting budget". But, don't blame the board for that.... By: CloudNine

Top