Lawmakers of the state of New York have passed legislation to pause the use of facial recognition technology in schools until 2022. The moratorium was introduced by State Senator Brian Kavanagh (D-Manhattan and Brooklyn) and Assemblymember Monica Wallace (D-Lancaster).
Navy Vice Adm. Nancy A. Norton, the director of Defense Information Systems Agency (DISA) and commander of Joint Force Headquarters-Department of Defense Information Network, outlined the way ahead for a cybersecurity paradigm shift that will help the U.S. military maintain information superiority on the digital battlefield.
The Cybersecurity and Infrastructure Agency (CISA) and the National Security Agency (NSA) have issued an activity alert due to the recent malicious cyber activity against critical infrastructure (CI) by exploiting internet-accessible operational technology (OT) assets.
With telecommuting here to stay, now is the perfect time to re-examine just how much network access you are giving your users and machines. You might be shocked to see how open your network really is. Most organizations allow more access than their users or machines will ever need or should ever have – this excessive trust is what allows attackers who get into the network to spread and cause a lot of damage.
Despite intentions of returning to onsite operations in 2020, many employees remain concerned about their organization’s plans to ensure their health and safety. In June 2020, Traction Guest did a two-part survey consisting of 300 employees and 300 enterprise risk management, physical security and facilities management professionals in companies with at least 1,000 employees.
Brian W. Lynch, a former FBI and Vanguard executive with leadership experience in security, risk, law enforcement, and anti-terrorism, will become the new Executive Director of Safety and Security at RANE (Risk Assessment Network + Exchange).
Honeypots were the first form of deception technology. IT security researchers started using them in the 1990s, with the intent to deceive malicious actors who had made it onto the network into interacting with a false system. In this way, honeypots could gather and assess the behavior of the malicious actors. They were not created for threat detection. However, things have changed a great deal in the years since honeypots were created – including deception technology.
To limit the spread of the highly contagious COVID-19 virus, many businesses across the globe have deployed social distancing requirements, stringent cleaning protocols and capacity limitations as part of their plan to safely reopen. Even with these measures in place, retailers, office complexes and educational facilities are recognizing that technology will also play a critical role to help identify individuals who may have the virus even before that person enters the premises. This is where thermal imaging camera systems play a pivotal role.
The European Union’s top court ruled that an agreement that allows thousands of companies — from tech giants to small financial firms — to transfer data to the United States is invalid because the American government can snoop on people’s data, according to an AP News report. The ruling could impact how companies transfer European users’ data to the United States and other countries, such as the U.K, and could require regulators to vet any new data transfers to make sure Europeans’ personal information remains protected according to the EU’s stringent standards, says AP News.