Remove 2017 Remove Government Remove Healthcare
article thumbnail

China-linked APT10 leverages ZeroLogon exploits in recent attacks

Security Affairs

The group, also known as Cicada, Stone Panda , and Cloud Hopper , has been active at least since 2009, in April 2017 experts from PwC UK and BAE Systems uncovered a widespread hacking campaign, tracked as Operation Cloud Hopper , targeting managed service providers (MSPs) in multiple countries worldwide.

article thumbnail

US DoJ indicts Chinese hackers over state-sponsored cyber espionage

Security Affairs

The US Department of Justice charged two Chinese hackers for hacking numerous companies and government agencies in a dozen countries, US Indicts Two Chinese Government Hackers Over Global Hacking Campaign. Department of Energy’s Lawrence Berkeley National Laboratory. ” continues the DoJ’s Press release.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BEST PRACTICES: Rising complexities of provisioning identities has pushed ‘IGA’ to the fore

The Last Watchdog

Identity governance and administration, or IGA , has suddenly become a front-burner matter at many enterprises. Related: Identity governance issues in the age of digital transformation. SailPoint, which went public in November 2017, has grown to more than 1000 employees in 30 locations. Compliance matters.

article thumbnail

Cambridgeshire crowned the UK’s cyber crime capital

IT Governance

In 2017, Cambridge became the fastest-growing city in the UK , with businesses attracted to its proximity to London and the North, as well as its highly educated workforce. For example, the pharmaceutical giant AstraZeneca, which is based in Cambridge, was last year imitated in a sophisticated phishing scam targeting job seekers.

article thumbnail

The Applications of Blockchain in Data Management

AIIM

It is also unique in that it is decentralized, so there is no single authority governing its use. In 2017, an attack on the consumer credit reporting agency, Equifax, leaked the personal details of around 150 million individuals. They are stored on blockchain and distributed on a private government network. Data Sharing.

article thumbnail

Privacy and Cybersecurity Top 10 for 2018

Data Matters

In November 2017, the Supreme Court heard oral arguments in Carpenter v. In Carpenter , the government obtained months’ worth of a suspect’s cell phone location records pursuant to the Stored Communications Act (SCA). Robins will certainly be back in play. Supreme Court Developments. The Internet of Bodies.

Privacy 67
article thumbnail

FINLAND: PARLIAMENT APPROVES NEW ACT ON THE SECONDARY USE OF SOCIAL AND HEALTH CARE PERSONAL DATA

DLA Piper Privacy Matters

The Finnish Parliament has approved the new general Act on the Secondary Use of Social Welfare and Health Care Data (Laki sosiaali- ja terveystietojen toissijaisesta käytöstä, based on government proposal HE 159/2017) in March 2019. The Act shall become effective within the following weeks.