The aim of this Privacy Framework is to improve privacy risk management between business/mission drivers and privacy protection activities. It is intended for organizations that use data processing systems, products or services irrespective of their sector, focus or size. …
Tag
Cybersecurity
IoT promises to be an extraordinary revolution in our day-to-day life. But how will we respond to the new cybersecurity and privacy threats that this new technology poses? What standards do we already have in place, and where is the global security discourse situated regarded this matter? …
Estonia is known as a pioneer in building e-country solutions. Some examples are e-government solutions, e-identity, e-voting, etc. My intention is to add to this list cybersecurity-related solutions, based on the fact that Estonia holds the number one position on the National Cyber Security Index (NCSI) ranking. I am not…
What we refer to as Cyberspace is in fact the totality of interactions between people, services, software etc. on the Internet. Cyberspace as such, does not exist in any physical form, and thus it is often perceived as this abstract notion which signifies processes, actions and platforms, exchanges and online…
A politically inclined attack or just a ‘simple’ lack of security awareness? Whatever the case, the cyber-attack that hit Marriott was huge. This was the joint second largest data breach to take place, after Yahoo in 2013 and Equifax in 2017. A cyber attacker stole personal information including names, emails,…
We are all talking about the future of jobs. But the question that we should perhaps ask, the most essential one, is: How should those jobs look like (or what should those jobs be)? With the evolution of the nature of the job market, we are facing new realities and…
It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it. – Stéphane Nappo Global CISO at Société Générale International Banking 2017 has reminded us once again that security threats are getting more sophisticated, unexpected, and attackers are working harder to discover new vulnerabilities. From…
The increasing nature of cybercrime Application services in the cyberspace have gained a huge importance in our lives expanding beyond the business-to-consumers and consumer-to-consumer models to a form of many-to-many interactions and transactions, called the Internet of Everything (IoE), predicting that by 2020 there will be more than 200 billion…
In 2016, data breaches remain one of the most significant challenges facing law firms and government agencies. Cybercriminals target law firms and government agencies due to the value of the intellectual property and sensitive information that they maintain. Since 2013, for the industries being tracked, approximately five (5) billion data…
Today, many people are facing the risk of losing information and sensitive data. For criminals/hackers, social engineering is one of the most prolific and effective means to induce people to carry out specific actions or to divulge information that can be useful for attackers. This article will discuss the basics…