You are here
Home > News

The ICIC adopts Johannesburg Charter

T he ICIC is the   International Conference of Information Commissioners. The Conference was first held in 2003 when Information Commissioners and Ombudsmen met for the first time in Berlin to adopt a declaration for further cooperation and experience sharing among regulatory authorities charged with overseeing the access to public information.

What you need to know about the DPA 2018 and the GDPR

Our friends over at IT Governance have a good intro to the basics. Worth a look...: The data protection landscape was dramatically reshaped with the introduction of the EU GDPR (General Data Protection Regulation) on 25 May 2018, but it wasn't the only law that took effect that day. The UK DPA (Data Protection Act) 2018 also came into force, and although it arrived with much less fanfare than the EU GDPR, it's just as important. In this blog, we explain why the DPA 201

Avoiding the California Privacy and Security Litigation Tsunami: CCPA FAQ: Is a service provider permitted to disclose personal information if it receives a civil subpoena or a discovery request?

My advice (Disclaimer: I'm not a lawyer) is to use GDPR as your baseline privacy framework then manage the gaps for tricksy places like California...: Companies that do business in California know that it is a magnet for class action litigation.  The California Consumer Privacy Act ("CCPA"), a new privacy law that applies to data collected about California residents, will provide even more incentive to plaintiff’s attorneys to bring suit in California. The CCPA was enacte

China may miss out on $5.5 trillion in growth if it doesn’t take data privacy more seriously

When Porter wrote about the Competitive Advantage of Nations, GDPR et al weren't even a twinkle in the eye of regulators. There's good reason for nations and organisations to take privacy seriously...: If China doesn't step up its efforts on issues such as data privacy and intellectual property protection, the country could lose out on a 37 trillion yuan ($5.5 trillion) growth opportunity in the decade ahead, according to new analysis. Based on research from economics con

Cyber crooks feared to have stolen personal details of 120000 cops

Red Top reporting on this years' ironic hack...: EXTORTIONISTS are feared to have stolen the personal details of 120,000 cops in a malware attack on a computer system. The Police Federation staff association was targeted earlier this month. The crooks deleted databases with members’ names and ranks, email addresses and national insurance numbers. Bank details were also hit, along with confidential information on officers involved in complaints. Credit card details o...

What Security Threats of the Past Can Tell Us About the Future of Cybersecurity

My observation is that, currently, there's always a human behind the attack and humans tend to act the same way even when using new capabilities. Cyber defence is more about psychology than clever tech. Once the AI takes over, that's another matter...: [...] We’ve come a long way since the Love Bug when it comes to improving overall security efforts and addressing cyberthreats. Attackers have also come a long way over the past two decades as their tactics become more sophist

Metal firm Hydro plans recovery from ransomware that could be wiper malware

Norsk Hydro seem to be handling this attack is a calm, professional manner...: Aluminium manufacturer Norsk Hydro claims to have found the “root cause” of the global IT outage due to a cyberattack believed to have been caused by LockerGoga, a strain of ransomware that displays some very unusual behaviours, according to Cisco’s Talos Intelligence researchers. Hydro’s worldwide IT network was paralyzed on Tuesday by the attack that started in one of its US operations and fo

Researchers Seek Out Ways to Search IPv6 Space

This puts the challenges for security researchers in perspective as the planet shifts to IPv6...: [...] Time for a little math. The IPv6 Internet has 2^128 addresses, or 3.4 times 10^38 — an astronomical number. (For comparison, astronomers estimate that there are 2 times 10^23 stars in the universe, which means there are a million billion times more IPv6 addresses than stars.) If it took a single second to scan the entire IPv4 address space, it would take 25 billion bill...

Cyber criminals are targeting HR departments to steal your salary

Payroll accounts for the largest chunk of money that moves out of most businesses. Unfortunately, the protections rely on vigilant managers rather than security controls...: The human resources manager tried to be calm and reassuring, but there still was a brief moment of panic: someone, somewhere, had tried to steal Robert’s salary. As anybody with a mortgage knows, missing pay day by just one or two days could cause a lot trouble. The manager had received an email that ...

More than half of EU firms report cyber attack losses

Notice how the language has changed. It's now about losses, not whether you've been attacked (we all have, even if you don't know it)...: [...] One in five IT decision-makers claimed cyber attackers left no clue to their identity, while 54% said they had faced at least one attack in the past two years that resulted in some sort of disruption, a survey has revealed. This disruption was in the form of service disruption (31%), data integrity issues (18%) and data loss (15%)

Top