Remove Data collection Remove Information Security Remove InfoSec
article thumbnail

Learning from Near Misses

Adam Shostack

First, in the nearly ten years since Andrew Stewart and I wrote The New School of Information Security, and called for more learning from breaches, we've seen a dramatic shift in how people talk about breaches. Second, last year marked 25 years of calls for an "NTSB for infosec."

InfoSec 130
article thumbnail

Hackers Could Cause ‘Fake Earthquakes’ by Exploiting Vulnerable Seismic Equipment, Researchers Warn

Hot for Security

Seismic monitoring devices linked to the internet are vulnerable to cyberattacks that could disrupt data collection and processing, according to Michael Samios of the National Observatory of Athens and his fellow colleagues who put together a new study published in Seismological Research Letters.

IoT 128
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top VAPT Testing Companies

Security Boulevard

Introduction By reducing information risks and vulnerabilities, a process called information security, also referred to as infosec, protects electronic data. Data collection, organization, processing, and deletion are all included in the definition of data management. InfoSec […].

article thumbnail

The Rise of Data Sovereignty and a Privacy Era

SecureWorld News

In addition, the risks of monetary and operational damage render it mission critical for enterprises to envision and enact the appropriate People, Process, and Technology safeguards to assure data protection and privacy. Information Security & Privacy are inextricably intertwined only when the data is about people.

IoT 109
article thumbnail

Unleashing the Power of a Security Data Lake

SecureWorld News

The concept of a Security Data Lake, a type of Data Lake explicitly designed for information security, has not received much attention yet. However, this is not your ordinary data storage solution. It can potentially bring a company's security to the next level.