Showing only posts tagged Data protection. Show all posts.

Cumbria police admit huge breach of data of officers and staff

Source

Exclusive: Accidental publishing of names and salaries happened in March and follows scandal over PSNI leak Another British police force has experienced a huge breach of the data of all its officers and staff, the Guardian has learned. Cumbria police has admitted accidentally publishing the names and salaries of …

PSNI and UK voter breaches show data security should be taken more seriously

Source

There were 9,000 breaches of personal information last year but experts say not enough is being done to stop them “It’s brutal. People are wondering if they should resign, or move house, or get fortified gates. You can feel the anger.” The comment from a former officer …

Northern Ireland police chief urged to consider position over data breach

Source

DUP MP Sammy Wilson says serious questions must be asked at highest level of PSNI amid fears over safety of officers The head of policing in Northern Ireland has been urged to consider his position over the mass breach of officers’ data amid warnings that terrorists could use the …

Hacked UK voter data could be used to target disinformation, warn experts

Source

Data from Electoral Commission breach could allow rogue actors to create AI-generated messages in effort to manipulate elections Data accessed in the Electoral Commission hack could help state-backed actors target voters with AI-generated disinformation, experts have warned. The UK elections watchdog revealed on Tuesday that a hostile cyber-attack had …

Electoral Commission apologises for security breach involving UK voters’ data

Source

Names and addresses of 40 million registered voters were accessible as far back as 2021 after cyber-attack Confidence in the UK’s electoral regulator has been thrown into question after it emerged a hostile cyber-attack accessing the data of 40 million voters went undetected for a year and the …

MPs fiddled with voter ID as electoral data security burned

Source

Electoral Commission hack is reminder of importance of protecting democratic system where it counts It turns out that while Conservative ministers were spending hours of parliamentary time in 2021-22 introducing requirements for voters to produce ID at polling stations – to protect elections against a threat most experts believed was …

CISPE Code of Conduct Public Register now has 107 compliant AWS services

Source

We continue to expand the scope of our assurance programs at Amazon Web Services (AWS) and are pleased to announce that 107 services are now certified as compliant with the Cloud Infrastructure Services Providers in Europe (CISPE) Data Protection Code of Conduct. This alignment with the CISPE requirements demonstrates …

AWS Security Profile: Ritesh Desai, GM, AWS Secrets Manager

Source

In the AWS Security Profile series, we interview Amazon Web Services (AWS) thought leaders who help keep our customers safe and secure. This interview features Ritesh Desai, General Manager, AWS Secrets Manager, and re:Inforce 2023 session speaker, who shares thoughts on data protection, cloud security, secrets management, and …

Real estate agents push back against Australian privacy law changes designed to protect personal data

Source

Real Estate Institute of Australia president says additional layer of responsibility could force smaller agencies to close down Follow our Australia news live blog for the latest updates Get our morning and afternoon news emails, free app or daily news podcast Real estate agents are pushing back against proposed …

Drug and alcohol tests of graduate paramedics revealed in Ambulance Victoria data breach

Source

Privacy watchdog will be asked to investigate after information became available for all employees to view on the staff intranet Follow our Australia news live blog for the latest updates Get our morning and afternoon news emails, free app or daily news podcast The confidential drug and alcohol test …

Twitter admits to ‘security incident’ involving Circles tweets

Source

Feature allows users to set a list of friends and post tweets that only they are supposed to be able to read A privacy breach at Twitter published tweets that were never supposed to be seen by anyone but the poster’s closest friends to the site at large …

Delivering on the AWS Digital Sovereignty Pledge: Control without compromise

Source

At AWS, earning and maintaining customer trust is the foundation of our business. We understand that protecting customer data is key to achieving this. We also know that trust must continue to be earned through transparency and assurances. In November 2022, we announced the new AWS Digital Sovereignty Pledge …

A sneak peek at the data protection sessions for re:Inforce 2023

Source

A full conference pass is $1,099. Register today with the code secure150off to receive a limited time $150 discount, while supplies last. AWS re:Inforce is fast approaching, and this post can help you plan your agenda. AWS re:Inforce is a security learning conference where you can …

AWS Security Profile – Cryptography Edition: Panos Kampanakis, Principal Security Engineer

Source

In the AWS Security Profile — Cryptography Edition series, we interview Amazon Web Services (AWS) thought leaders who help keep our customers safe and secure. This interview features Panos Kampanakis, Principal Security Engineer, AWS Cryptography. Panos shares thoughts on data protection, cloud security, post-quantum cryptography, and more. What do you …

New Global AWS Data Processing Addendum

Source

Navigating data protection laws around the world is no simple task. Today, I’m pleased to announce that AWS is expanding the scope of the AWS Data Processing Addendum (Global AWS DPA) so that it applies globally whenever customers use AWS services to process personal data, regardless of which …

AI can fool voice recognition used to verify identity by Centrelink and Australian tax office

Source

Exclusive: Voiceprint program used by millions of Australians to access data held by government agencies shown to have a serious security flaw Follow our Australia news live blog for the latest updates Get our morning and afternoon news emails, free app or daily news podcast A voice identification system …

Establishing a data perimeter on AWS: Allow only trusted resources from my organization

Source

Companies that store and process data on Amazon Web Services (AWS) want to prevent transfers of that data to or from locations outside of their company’s control. This is to support security strategies, such as data loss prevention, or to comply with the terms and conditions set forth …

Rishi Sunak faces calls to ban TikTok use by government officials

Source

PM under pressure to follow EU and US in taking step over fears Chinese-owned app poses cybersecurity risk Rishi Sunak has been urged to ban government officials from using TikTok in line with moves by the EU and US, amid growing cybersecurity fears over China. Officials in Europe and …

Australia to consider European-style right to be forgotten privacy laws

Source

Attorney general promises ‘whole range’ of modernisations of the Privacy Act to follow new customer data protection laws Follow our Australia news live blog for the latest updates Get our morning and afternoon news emails, free app or daily news podcast The right to be forgotten and a right …

Three key security themes from AWS re:Invent 2022

Source

AWS re:Invent returned to Las Vegas, Nevada, November 28 to December 2, 2022. After a virtual event in 2020 and a hybrid 2021 edition, spirits were high as over 51,000 in-person attendees returned to network and learn about the latest AWS innovations. Now in its 11th year …

How to secure your SaaS tenant data in DynamoDB with ABAC and client-side encryption

Source

If you’re a SaaS vendor, you may need to store and process personal and sensitive data for large numbers of customers across different geographies. When processing sensitive data at scale, you have an increased responsibility to secure this data end-to-end. Client-side encryption of data, such as your customers …

I am a Medibank customer. Am I affected by the cyber-attack? What can I do to protect myself?

Source

Experts suggest using multifactor authentication and telling your bank to put extra security checks in place Follow our Australia news live blog for the latest updates Get our morning and afternoon news emails, free app or daily news podcast Millions of Medibank’s current and former customers have had …

AWS Digital Sovereignty Pledge: Control without compromise

Source

French | German | Italian | Japanese | Korean We’ve always believed that for the cloud to realize its full potential it would be essential that customers have control over their data. Giving customers this sovereignty has been a priority for AWS since the very beginning when we were the only major …

Establishing a data perimeter on AWS: Allow only trusted identities to access company data

Source

As described in an earlier blog post, Establishing a data perimeter on AWS, Amazon Web Services (AWS) offers a set of capabilities you can use to implement a data perimeter to help prevent unintended access. One type of unintended access that companies want to prevent is access to corporate …

Facebook sued for collecting personal data to target adverts

Source

In high court case that could set precedent for millions, Tanya O’Carroll alleges owner Meta is breaking UK data laws A human rights campaigner is suing Facebook’s owner in the high court, claiming the company is disregarding her right to object against the collection of her personal …

« newer articles | page 2 | older articles »