article thumbnail

Estonia sues Gemalto for 152M euros over flaws in citizen ID cards issued by the company

Security Affairs

“The vulnerabilities to hacker attacks found in government- issued ID cards supplied by the Franco-Dutch company marked an embarrassing setback for Estonia, which has billed itself as the world’s most digitalised “e-government”.” ” reported the Reuters. At the time, Estonia had issued 1.3

article thumbnail

President Biden Signs Two Bills Aimed at Enhancing Government Cybersecurity

Hunton Privacy

On June 21, 2022, President Biden signed into law, the State and Local Government Cybersecurity Act of 2021 (S. 1097) (the “Cyber Workforce Program Act”), two bipartisan bills aimed at enhancing the cybersecurity postures of the federal, state and local governments.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

VMware Flaw a Vector in SolarWinds Breach?

Krebs on Security

government cybersecurity agencies warned this week that the attackers behind the widespread hacking spree stemming from the compromise at network software firm SolarWinds used weaknesses in other, non-SolarWinds products to attack high-value targets. However, the SolarWinds compromise would have provided that internal access nicely.

article thumbnail

Congressional Movement on Cybersecurity in a Bill to Reauthorize the Homeland Security Act of 2002

Data Matters

Senate’s Homeland Security and Governmental Affairs Committee ­approved a bill ( SB 2825 ) reauthorizing the Homeland Security Act of 2002 and including key cybersecurity provisions affecting the Department of Homeland Security (DHS). On March 7, 2018, the U.S. to incentivize more cybersecurity training activities.

article thumbnail

NationalPublicData.com Hack Exposes a Nation’s Data

Krebs on Security

1, 2002 (with very few exceptions). ANALYSIS Data brokers like National Public Data typically get their information by scouring federal, state and local government records. Atlas found most records have a name, SSN, and home address, and that approximately 26 percent of those records included a phone number.

article thumbnail

Not Proof, but Another Lead: WikiLeaks' Latest Includes Google/China Tip

John Battelle's Searchblog

The Google hacking was part of a coordinated campaign of computer sabotage carried out by government operatives, private security experts and Internet outlaws recruited by the Chinese government. It says one source told another that it was the government. No, guys, it does not confirm it. Re-read that paragraph.

article thumbnail

Why you should keep data observability separate from data cleansing

Collibra

For financial services, data governance found its roots in risk. Basel II lists seven risk categories with clear reference to data governance given “data entry” and “data maintenance” (Event Type 7). As you build your data governance program, you may find yourself under the advice of some great partners in data governance.