Remove 2002 Remove Government Remove Risk
article thumbnail

Estonia sues Gemalto for 152M euros over flaws in citizen ID cards issued by the company

Security Affairs

“The vulnerabilities to hacker attacks found in government- issued ID cards supplied by the Franco-Dutch company marked an embarrassing setback for Estonia, which has billed itself as the world’s most digitalised “e-government”.” ” reported the Reuters. At the time, Estonia had issued 1.3

article thumbnail

MY TAKE: New ‘cyberthreat index’ shows SMBs cognizant of big risks, ill-prepared to deal with them

The Last Watchdog

Small and midsize businesses — so-called SMBs — face an acute risk of sustaining a crippling cyberattack. This appears to be even more true today than it was when I began writing about business cyber risks at USA TODAY more than a decade ago. You can give a listen to the entire interview at this accompanying podcast.

Risk 182
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Congressional Movement on Cybersecurity in a Bill to Reauthorize the Homeland Security Act of 2002

Data Matters

Senate’s Homeland Security and Governmental Affairs Committee ­approved a bill ( SB 2825 ) reauthorizing the Homeland Security Act of 2002 and including key cybersecurity provisions affecting the Department of Homeland Security (DHS). SB 2825 requires that DHS routinely conduct cyber-risk assessments and issue risk reports to Congress.

article thumbnail

Why you should keep data observability separate from data cleansing

Collibra

Consider the examples from our peer industries: Operational Risk. For financial services, data governance found its roots in risk. As CROs prioritized Operational Risk post the 2007 financial crisis, those leaders also looked to centralized thought like the Basel Accords. Cyber Security. Audit & Professional Services.

article thumbnail

2024 Cybersecurity Laws & Regulations

eSecurity Planet

The landscape of cybersecurity laws and regulations today is set to undergo significant changes, impacting businesses, government entities, and individuals alike. Let’s explore what to expect from the upcoming regulations, provide insights into critical federal and state laws, and offer practical compliance and risk management strategies.

article thumbnail

FTC Announces Significant Updates to GLB Safeguards Rule

Hunton Privacy

Promulgated in 2002 pursuant to the Gramm-Leach-Bliley Act, the Safeguards Rule obligates covered financial institutions to develop, implement and maintain a comprehensive information security program that complies with the Rule’s requirements. Security Programs. Accountability. Small Businesses.

article thumbnail

Guest Post - How important is digital document consistency?

AIIM

Obviously digital document accuracy is particularly important for government and regulated industries. However, human error puts both consistency and accuracy at risk. Prior to working with Y Soft, Mr. Koelewijn founded X-Solutions in late 2002 which was later acquired by Nuance in 2009. He enjoys skiing, swimming and sailing.