Invite to discuss

Want posts & news about #protection measures on your wall?

Sign Up

protection measures

Posts
6
Experts
6
Views
814
Shares
20
Upvotes
56

Posts

Graham Joseph Penrose

Does legislation stifle innovation?

Does legislation stifle innovation? No. Why? Because it legislates in "catch up mode" mostly and on those rare occasions when the legislators do see something coming in advance (examples? I don't have any actually) - then they fail to implement the legislation or put in place checks and balances to monitor compliance. Legislators are better at legislating for the abuse of datRead more
3
5
Join the discussion...
mesbernard@gmail.com
When you consider the fact that legislation usually is created to control risks associated with a "leap frog" innovation event then the obvious answer is "YES!". Legislation goes on to stifle the ongoing creative process that led to the immediate evolution. A follow up question might be, "could legislation be designed to encourage future innovation?" … Read more
1
David Froud
My cynicism goes nowhere near as deep as yours, perhaps because I see this from an information security perspective, not so much a privacy/human right one, but I absolutely agree with "catch-up mode". What choice do they have? Vendors create something new and amazing, everyone want it, and by then it's too late to take it away. Governments regulate after the fact, and can onl… Read more
Rosie Anderson

New Job Opportunity - Security Architect - Electronics - Hertfordshire, UK

Outsource UKs Cyber Security division is looking for a Technical Security Solutions Lead to work for a defence customer in Hertfordshire on a permanent basis The role You will be responsible for the implementation of datalink security solutions across all deliverable projects across France and the UK, including all associated datalink information assurance and IPR… Read more
5
Start the discussion...
Rathnakumar Arumugam

Cyber Intelligence Automation - Next Gen Security Platform

“Automation always assumes better” is this just an assumption or it is true. The era of data explosion has brought innovation in the digital business ecosystem that’s faster and more volatile face an array of digital threats from sophisticated hackers, cyber attackers, and insiders. Many Digital Enterprises and Government bodies have implemented Security best practicesRead more
3
3
Join the discussion...
1337Mark
I will try to analyze what you wrote. Analyzing threat data. This element has two separate elements to it - internal threat data (anomalies) and external global threat data - threat intelligence. The second part, threat intelligence‍, you can automate parts of this - the ingestion of IOC feeds into a central repository, but at that point you need to add a manual vetting process or you will… Read more
2
Richard Sink

Community-Driven Cyber Threat Mitigation and Reporting

Industry focus on individual site and firewall protection measures against malicious intruders has yielded some positive results however attack frequency, complexity and severity is increasing and protective measures remain insufficiently comprehensive in many cases. RIDEN℠ is a community-based cyber threat monitoring and detection system in which users participate and benefit from a centr… Read more
25
2
Join the discussion...
John Gorman
Hi Richard Sink‍ , it's not clear to me what RIDEN℠ is. Is it an open source/free product or a commercial one? Are you looking for volunteers or salaried developers? Can you elaborate?
1
Andra Zaharia

Security Alert: Adwind RAT Spotted in Targeted Attacks with Zero AV Detection

The malware economy is alive and well! And cyber criminals are making big money by using this business model. The re-emergence of Adwind RAT provides additional proof to support this. This Java-based malware has been spotted over the weekend in several targeted attacks against Danish companies. Given that the malicious email employed to deceive victims is in English, the attackers wil… Read more
13
Start the discussion...
Start the discussion...