Remove Authentication Remove GDPR Remove Government Remove Military
article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

Hello and welcome to the final IT Governance podcast of 2018. Even government and public bodies’ websites – including, ironically, the ICO – were found to be running cryptomining software after a third-party plug-in was compromised, but it transpired. And, of course, on 25 May the GDPR came into effect.

article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

So maybe the government steps in and makes it easier for that organization to get insurance? GRAY: One of the other questions that you know has been a big one in the last year, so is should the government come in and subsidize, subsidize and establish a base insurance capability? Yeah, we're all good. These are becoming.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Going Passwordless

ForAllSecure

For example, here’s Jerry Lewis in a scene from a 1950s film, where he’s trying to break into a Nazi German military base. But this method of authentication is flawed; either hashed or hashed and salted, usernames and passwords can still be stolen and reused. Fact is, we’ve long had passwords as a credential.

article thumbnail

Cyber Security at the heart of Fleet Fuelling

CGI

Promoting easy authentication without compromising the customer’s perception of security and protecting the enterprise risk should always be the ultimate objective. on military and intelligence. As we look across our engagements in different industry and government sectors, there are a number of crosscutting themes that are evident.

article thumbnail

The Week in Cyber Security and Data Privacy: 15 – 21 April 2024

IT Governance

million records from World-Check, a screening database used to screen potential customers for links to illegal activity and government sanctions. Significant changes have been made to sections covering remote access, privileged operations, user access levels and the use of multifactor authentication. of its Cyber Assessment Framework.

article thumbnail

Catches of the month: Phishing scams for February 2020

IT Governance

This could be as simple as getting another member of staff to check it for authenticity, or as complex as using a second means of communication to confirm the invoice with the organisation that sent it. Of course, the introduction of the GDPR (General Data Protection Regulation) has helped change their tune.