Please turn on your JavaScript for this page to function normally.
escalator
How well protected is NHS data?

A new study carried out by Vanson Bourne reveals a gap between the perceived strength of IT security measures in the NHS and the actual level of IT security built into NHS …

Red door
Most IT pros oppose government backdoor access

Close to two-thirds of global IT professionals oppose giving governments backdoor access to encrypted information systems, and 59% feel that privacy is being compromised in an …

Glass
BlackEnergy APT is back, deleting files and killing computer systems

The BlackEnergy APT – or SandWorm group, as some researchers call it – has been active since 2007 (at least). Its past exploits include cyber-espionage campaigns …

bald eagle
Is the Cybersecurity Act of 2015 effective?

While many are decrying the newly signed Cybersecurity Act of 2015 for its privacy issues, DB Networks is taking the Act to task for an equally troublesome reason: It is based …

Washington state sues iYogi tech support firm for scamming users

Washington State Attorney General Bob Ferguson announced a lawsuit against one of the biggest independent tech support providers in the world, iYogi, and its President, Vishal …

EU flag
New EU rules on data protection put the citizen back in the driving seat

New EU data protection legislation, informally agreed on Tuesday and backed by Civil Liberties MEPs on Thursday morning, will create a uniform set of rules across the EU fit …

First ever EU rules on cybersecurity

Transport and energy companies will have to ensure that the digital infrastructure that they use to deliver essential services, such as traffic control or electricity grid …

Revealed: What info the FBI can collect with a National Security Letter

After winning an eleven-year legal battle, Nicholas Merrill can finally tell the public how the FBI has secretly construed its authority to issue National Security Letters …

The current wave of data protection regulations and how it will affect the infosec industry

In 2016, the EU is set to review the next draft of The Network and Information Security (NIS) ‘cybersecurity’ directive which will bring new compliance requirements into …

FTC amends telemarketing rule to ban payment methods used by scammers

The Federal Trade Commission has approved final amendments to its Telemarketing Sales Rule (TSR), including a change that will help protect consumers from fraud by prohibiting …

The future of information security in the government

A new report from Intel Security and the Digital Government Security Forum (DGSF) looks at the fast changing digital world, which promises to transform how our government and …

Video: General Data Protection Regulation, Safe Harbor Agreement, Copyright reform and the Google case

After having been ruled invalid by the ECJ, the Safe Habor Agreement is now back in the spotlight as the Commission has finally issued a communication on the Trans-Atlantic …

Don't miss

Cybersecurity news