Last week, Didier Reynders, European Commissioner for Justice, and Dr. Andrea Jelinek, Chair of the European Data Protection Board (EDPB), appeared at a hearing conducted by the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs, and updated committee members on their work since the Schrems II decision.
In his remarks, Mr. Reynders identified three main areas on which the Commission is focusing.
There are currently a multitude of different standards and regulations to address the urgent need to secure our connected world, yet it's time to create a unified global conformance assessment.
COVID-19 has slowed the adoption of many technologies, as budgets require organizations to reconsider business priorities. However, a new poll from Deloitte shows that for organizations shifting to a security-centric business model, zero trust may be even more of a priority than before.
The 2020 Penetration Risk Report also says cloud environments are most vulnerable to two types of attacks and medium-sized enterprises are the slowest to improve network security.
As some U.S. states relax their shelter-in rules, businesses prepare for a slow recovery due to the uncertainty of COVID-19’s almost certain resurgence. The questions arise for those physical businesses in need of unarmed or armed guards: what precautions are to be taken by guards, and what kind of interaction is there going to be with their customers?
The pandemic has redefined what it means to be a resilient business, especially when it comes to retail. “Essential” businesses that have remained open, such as supermarkets or pharmacies, have had to figure out how to operate safely in this new world. No matter the type of retailer, the importance of cybersecurity hasn’t gone away. If anything, it becomes more important as a cyber disruption could be the fatal final straw for a business looking for a smooth return to operations and maintain its brand image and reputation.
We talk to David “moose” Wolpoff, Chief Technology Officer (CTO) and co-founder of Randori, about Black Hats’ processes for finding and exploiting weaknesses in software.
Claroty researchers have uncovered six critical vulnerabilities in third-party license management components, which could expose operational technology (OT) environments (hardware and software components) across numerous industries to exploits via cyberattacks.
As businesses and schools seek to bring people back to brick and mortar establishments, it’s going to be important to make customers, students and teachers feel comfortable, in addition to simply following guidelines. Customers are going to have to feel that it’s worth going out, versus shopping on-line. For retailers, that comfort might in part be derived from visible occupancy monitoring efforts and automated voice-down messages when people aren’t wearing masks or keeping their distance.
In late February 2020, news broke in the United States that the once faraway threat of a “novel coronavirus” had spread to U.S. soil. As COVID-19 case numbers in major cities grew, stay-at-home orders were put in place, businesses closed, restaurants shifted to take-out only, and retailers adopted curbside service. All of this took place to slow the spread of COVID-19. Meanwhile, however, hospitals remained open — accepting new patients at the direction of the U.S. Center for Disease Control and Prevention (CDC) and working diligently to adhere to new safety guidelines. During virus, or any pandemic outbreaks, we are acutely reminded of our essential frontline healthcare workers, the critical need to enhance their overall safety, security, and to be as efficient as possible when communicating vital information.