Japanese government plans to hack into citizens’ IoT devices

Catalin Cimpanu reports: The Japanese government approveda law amendment on Friday that will allow government workers to hack into people’s Internet of Things devices as part of an unprecedented survey of insecure IoT devices. The survey will be … Continue reading Japanese government plans to hack into citizens’ IoT devices

Federal Cybersecurity Posture “Untenable,” According to OMB Risk Report

When he issued Executive Order 13800 (EO 13800) on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, President Trump’s goal was to highlight that security and public accountability of government officials are founda… Continue reading Federal Cybersecurity Posture “Untenable,” According to OMB Risk Report

How the Federal Shutdown Could Do Long-Term Digital Security Damage

Most people have at least heard of the partial shutdown plaguing the U.S. federal government. Now over three weeks old, the stoppage owes its existence to a conflict over border security funding. President Donald Trump wants $5.7 billion to build a new… Continue reading How the Federal Shutdown Could Do Long-Term Digital Security Damage

When can the feds hack into your computer? Case involving scam targeting Wegmans could decide.

Phil Fairbanks reports: When the FBI uncovered a scammer targeting Wegmans two years ago, agents hacked into the suspect’s computer in an effort to learn his identity. The hacking, approved by a judge, involved an email and attachment that, when … Continue reading When can the feds hack into your computer? Case involving scam targeting Wegmans could decide.

New China Guideline for Internet Personal Information Security Protection

Barbara Li and Bohua Yao report: On November 30, 2018 the Cyber Security Protection Bureau, under the auspices of the PRC Ministry of Public Security (the “MPS”), issued a draft Guideline for Internet Personal Information Security Protection (the “Guid… Continue reading New China Guideline for Internet Personal Information Security Protection

Rooted in Security Basics: The Four Pillars of Cyber Hygiene

The term “cyber hygiene” pops up frequently in articles, blogs and discussions about cybersecurity. But what does it really mean? Some say it is an ill-defined set of practices for individuals to follow (or ignore). Others say it is a measu… Continue reading Rooted in Security Basics: The Four Pillars of Cyber Hygiene

Federal insider-threat programs get a dose of ‘Maturity’

A government task force hopes to improve federal agencies’ ability to identify insider threats and avoid the leak of sensitive or classified information. The National Insider Threat Task Force (NITTF) — run by the FBI and the Office of the Director of National Intelligence — released the “ Insider Threat Program Maturity Framework” on Thursday. It complements a set of standards the task force released in 2012 that set the “minimum elements necessary to establish functional insider threat programs.” The aim with the new framework is to help federal agencies go beyond the minimum guidelines issued six years ago and be “more proactive, comprehensive, and better postured to deter, detect, and mitigate insider threat risk.” It can be used to start an insider threat program or augment an existing one. The framework comprises 19 “maturity elements,” such as the ability to adapt a program to comply with changing laws; educating employees […]

The post Federal insider-threat programs get a dose of ‘Maturity’ appeared first on Cyberscoop.

Continue reading Federal insider-threat programs get a dose of ‘Maturity’

Canadian Regulator Issues Final Guidance on New Data Breach Reporting Requirements

Hunton writes: On October 29, 2018, the Office of the Privacy Commissioner of Canada (the “OPC”) released final guidance (“Final Guidance”) regarding how businesses may satisfy the reporting and record-keeping obligations under Canada’s new data breach… Continue reading Canadian Regulator Issues Final Guidance on New Data Breach Reporting Requirements

Is Your e-PHI Secure? ONC and OCR Update HIPAA Security Risk Assessment Tool

Valerie K. Jackson of Jackson Lewis writes: October 2018 marks the 15th annual National Cyber Security Awareness Month. In honor of this occasion, the Office of the National Coordinator for Health Information Technology (ONC) and the HHS Office for Civ… Continue reading Is Your e-PHI Secure? ONC and OCR Update HIPAA Security Risk Assessment Tool