Security Experts:

Privacy & Compliance
long dotted

NEWS & INDUSTRY UPDATES

The PCI Council has announced updates to the Point-to-Point Encryption (P2PE) and device security standards.
Nine US privacy groups have dropped out of talks on voluntary standards for facial recognition technology, after failing to agree on a code on how it could be deployed.
Amazon publishes its first transparency report. The e-commerce giant received nearly 1,000 customers data requests from government agencies in the first half of 2015.
The Australian Privacy Commissioner says Adobe breached the Privacy Act, but it's satisfied with the way the company handled the 2013 data breach.
The Payment Application Data Security Standard (PA-DSS) has been updated to reflect new guidance on the security of the SSL protocol.
Scrambl3 was launched as a stand-alone app for Android devices by startup USMobile, which describes it as a way to create "trusted connections on untrusted networks."
The US Senate failed Sunday to reach a deal that would prevent key counterterror provisions from expiring at midnight, after Senator Rand Paul blocked the chamber from advancing a solution.
At midnight Sunday, barring any last-minute deal in Congress, a key section of the US Patriot Act which has been used as a legal basis for much of the vast surveillance carried out by the NSA will expire or "sunset."
The Wassenaar Arrangement proposal published by BIS doesn't address previously raised concerns. Experts are worried about the negative impact on the industry.
The United States expressed concern Friday over reports China has used a powerful censorship tool dubbed "Great Cannon" to attack websites around the world.

FEATURES, INSIGHTS // Privacy & Compliance

rss icon

Torsten George's picture
To achieve continuous compliance and monitoring, organizations are forced to automate many otherwise manual, labor-intensive tasks.
Torsten George's picture
The NIST Cybersecurity Framework is an important building block, but still just the first step towards implementing operationalized defenses against cyber security risks.
James McFarlin's picture
U.S tech giants are playing a game of high-stakes global brinksmanship around who has rights to control their data, which impacts their European growth prospects, business models, and ultimately stock valuations.
Marcus Ranum's picture
To communicate about our metrics, we need ways that we can ground our experience in terms of “normal” for us; Otherwise, we really can't communicate our metrics effectively with anyone who isn't in a similar environment.
Adam Firestone's picture
The misconception that Internet privacy equals anonymity must be dispelled if cyberspace is to be a secure and safe place. At the same time, mechanisms must be incorporated to ensure that communications remain confidential and resistant to unauthorized alteration by third parties.
Mark Hatton's picture
The oversight for the protection of healthcare information is only getting tighter, and it is incumbent upon the security teams to ensure healthcare professionals have all the tools necessary to improve patient outcomes, while we worry about keeping the bad guys away.
Torsten George's picture
The NIST Cybersecurity Framework is a good first step towards creating a standardized approach to cyber security, but requires many substantial updates before really improving our nation’s cyber resilience.
Tal Be'ery's picture
The Google-backed "Certificate Transparency" initiative has gained much momentum and may have a real chance to amend the battered Public-Key Infrastructure (PKI).
Nimmy Reichenberg's picture
With the release of PCI-DSS 3.0, organizations have a framework for payment security as part of their business-as-usual activities by introducing more flexibility, and an increased focus on education, awareness and security as a shared responsibility.
Mark Hatton's picture
Complacency is never a good thing, but in security it can have devastating effects. While it’s good to acknowledge progress, that should never stand in the way of staying ahead of the next potential threat.