Government

Government | News, how-tos, features, reviews, and videos

USA / United States of America stars + stripes and binary code superimposed over The White House
EU / European Union / GDPR data privacy, regulation, compliance

aerial view of a network of roads

Privacy legislation: The road ahead

The pace of change in privacy laws, and the technologies they seek to regulate, is only accelerating.

California Consumer Privacy Act  / CCPA  >  State flag superimposed on map and satellite view

What is the CCPA and why should you care?

CCPA is the law and the only way for a business to opt-out of it is to go out of business. For businesses that want to stay in business, however, CCPA is just the beginning of things to come.

Hacking stealing password data

Will you sleep safer tonight?

Looking at a scenario through three different lenses highlights the conflict and complexity of the emergent issues impacting national and international information security policy.

collage of US government icons

Will the US ever get serious about security and privacy?

We have the ability to drastically reduce cybercrime. So why are we still failing?

The U.S. Capitol building in Washington

Federal cybersecurity agency on the way?

As human activity migrates into the online space, keeping the bad guys from mucking it all up becomes paramount. Does that mean it’s time for a federal cybersecurity agency?

sacramento california state house

Proposed changes to California Consumer Privacy Act of 2018 could rewrite privacy law

A recently proposed repeal of 2018's CCPA called the PAA would shift California even closer to the requirements of the GDPR.

julian assange wikileaks 1

Julian Assange arrested: Hero of transparency and privacy, or villain against nations?

Just because you can take something doesn’t mean you should...or that it’s the right thing to do.

nycrr cybersecurity gavel regulation compliance law nyc statue of liberty

Landmark laws: data brokers and the future of US privacy regulation

Vermont’s new law on data brokers has revealed an expansive registry of secretive firms profiting from your corporate and personal data. As the first law of its kind in the US, privacy advocates have rejoiced – but how much will it...

a hooded figure targets a coding vulnerability

Breaches, market volatility and the government shutdown: Security in the crosshairs

If the start of 2019 is anything to base the year ahead on—with data breaches, shakiness in the market and the government shutdown negotiations at an impasse—cybersecurity experts are going to have their hands full with increasingly...

intel primary

The federal privacy bill: Intel gets the ball rolling

As momentum builds to pass a federal privacy bill, corporate behemoth Intel has drafted a bill palatable to tech giants. But will politicians take the bait?

supply chain

In the cloud era, government can only be as secure as its supply chain

While regulation is often seen as antithetical to technological progress, the supply chain is an area where clearly-defined, reasonable directives have had a tremendously positive effect on the security and technological leadership of...

Election 2016 teaser - A hacker pulls back the curtain on United States election data

“Political hack” takes on new meaning in the age of cyberwarfare

Political hacking is a real and present danger, but more advanced detection and response capabilities will help defend our democratic institutions better than what is current practice.

sacramento california state house

How citizen ownership of data impacts business going forward

Is California's Consumer Privacy Act of 2018 (CCPA) poised to become the new standard in the United States?

What it takes to become an information assurance analyst

This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...

Fraud prevention: Improving internal controls

Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.

What it takes to become an IT security engineer

The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set...

information security 2

How to write an information security policy

Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.

Red team versus blue team: How to run an effective simulation

Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.

Load More
You Might Also Like