Remove Data privacy Remove Hacking Remove InfoSec
article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

Regulatory compliance and data privacy issues have long been an IT security nightmare. And since the EU’s General Data Protection Regulation (GDPR) took effect May 25, 2018, IT compliance issues have been at the forefront of corporate concerns. GDPR-style data privacy laws came to the U.S. Location Matters.

article thumbnail

Missouri 'Hacking' Controversy: Here's How InfoSec Pros Are Responding

SecureWorld News

When it comes to Missouri Governor Mike Parson's explosive reaction to a reporter "hacking" the state's web application, there is an outpouring of public figures, InfoSec professionals, and other tech experts telling the governor what they think. Journalists responsibly sounding an alarm on data privacy is not criminal hacking.

InfoSec 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 9 Trends In Cybersecurity Careers for 2025

eSecurity Planet

EC-Council : The International Council of E-Commerce Consultants, or EC-Council, offers several certifications for different career paths but is best known for its white-hat hacking program. Among security personnel, infosec engineers (6.25%), infosec analysts (3.12%), and network security engineers (2.63%) saw the most significant hikes.

article thumbnail

Hacking Ham Radio: Why It’s Still Relevant and How to Get Started

Security Boulevard

This week we discuss hacking ham radio with special guests Caitlin Johanson, Rick Osgood, and Larry Pesce. In this episode you’ll learn what ham radio is, why its still relevant, why would attackers want to hack ham radio, all about packet radio and APRS (Automatic Packet Reporting System), and what equipment and licensing you need […].

Hacking 124
article thumbnail

Secure Communications: Relevant or a Nice to Have?

Jane Frankland

Still, the top response stood out clearlyprotecting data privacy. The thing is, secure communication goes beyond just protecting data privacy. The rise of these types of attacks marks a significant shift in the cyber threat landscape, where attackers are increasingly “logging in” rather than hacking in.

article thumbnail

Okta Hacked Again, Quishing Is The New Phishing, Google Play Protect Real-Time Scanning

Security Boulevard

Finally, we discuss Google Play Protect’s new feature, “Real-time App Analysis,” which […] The post Okta Hacked Again, Quishing Is The New Phishing, Google Play Protect Real-Time Scanning appeared first on Shared Security Podcast.

Phishing 109
article thumbnail

Multi-Factor Authentication Fatigue Attack, Signal Account Twilio Hack, Facebook and Instagram In-App Browser

Security Boulevard

The post Multi-Factor Authentication Fatigue Attack, Signal Account Twilio Hack, Facebook and Instagram In-App Browser appeared first on The Shared Security Show. The post Multi-Factor Authentication Fatigue Attack, Signal Account Twilio Hack, Facebook and Instagram In-App Browser appeared first on Security Boulevard.