Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
GDPR Oddsmakers: Who, Where, When Will Enforcement Hit First?
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Ayo99
50%
50%
Ayo99,
User Rank: Apprentice
7/10/2018 | 4:46:41 AM
Re: stop data processing
luckly im not live in europe.. and my target market are asian
alise1208
50%
50%
alise1208,
User Rank: Apprentice
6/21/2018 | 6:05:27 AM
GSPR experience
When I was looking for any information about GDPR compliance, I came across many articles where companies described their experience in solving this issue. Here is one great post on Redwerk's blog https://redwerk.com/blog/turning-gdpr-compliance-redwerks-experience I think everyone can use this tips and implement in their company, as GDPR fines already come into force.
AnneJoiner
50%
50%
AnneJoiner,
User Rank: Apprentice
6/1/2018 | 6:57:12 AM
Re: Targeting Habitual Violators
that sound is good
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/31/2018 | 10:46:51 PM
Re: Targeting Habitual Violators
@Ryan: I'm not so sure there will be a lot of companies going out of business here, but the UK's ICO (i.e., that nation's DPA responsible for enforcing GDPR there) is on record as saying that they will exercise the same restraint and discretion that they always have -- noting that, pre-GDPR, maximum fining power for their organization under then-present regulations was £500,000, and that they had never once fined anyone that maximum.
CleanShine
50%
50%
CleanShine,
User Rank: Apprentice
5/30/2018 | 3:34:56 PM
thanks
Good
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
5/30/2018 | 2:35:47 PM
Re: Ghostery
I am sorry for this but could not resist .....

They are giving these legal issues interesting names these days, Who's filing first, what is filing second and i don't know who is issuing the third filing.  WHAT?  i SAID WHO is filing first.  That's what I am trying to find out, WHO is filing first? Yes.  Yes? Precisely.  Oh, precisely is filing first - NO NOTHING OF THE KIND, WHO IS FILING FIRST..
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/30/2018 | 2:38:26 AM
Ghostery
I think we already have an answer to the underlying question here: Ghostery.

The company was one of many to send GDPR contact emails -- but the person in charge of that task CC'd everyone instead of BCC'ing everying. The result was massive exposure of individuals' email addresses.

This was made public, and the company has indicated that it will self-report this data leak.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2018 | 3:07:13 PM
Re: Targeting Habitual Violators
However, I don't mind that GDPR enforcement is targeting a more draconian narrative and trying to remove habitual violators from the ecosystem. I would be ok with that too. Singling our the violators is the way to go I would say.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2018 | 3:05:37 PM
Re: stop data processing
But to order the company to stop processing and in essense stop bringing in money to the organization will most definitely bring those bad practices to a halt. I would agree. We need to start somewhere and improve on it.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2018 | 3:03:24 PM
Re: stop data processing
Most companies can more than survive fines that are given based on bad practices. That would be one of the concerns I have. That is still ok, fine could be increased at one point I would guess.
Page 1 / 2   >   >>


Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Ransomware Damage Hit $11.5B in 2019
Dark Reading Staff 2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7914
PUBLISHED: 2020-02-21
btif/src/btif_dm.c in Android before 5.1 does not properly enforce the temporary nature of a Bluetooth pairing, which allows user-assisted remote attackers to bypass intended access restrictions via crafted Bluetooth packets after the tapping of a crafted NFC tag.
CVE-2016-4606
PUBLISHED: 2020-02-21
Curl before 7.49.1 in Apple OS X before macOS Sierra prior to 10.12 allows remote or local attackers to execute arbitrary code, gain sensitive information, cause denial-of-service conditions, bypass security restrictions, and perform unauthorized actions. This may aid in other attacks.
CVE-2020-5243
PUBLISHED: 2020-02-21
uap-core before 0.7.3 is vulnerable to a denial of service attack when processing crafted User-Agent strings. Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent hea...
CVE-2019-14688
PUBLISHED: 2020-02-20
Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable during an initial produc...
CVE-2019-19694
PUBLISHED: 2020-02-20
The Trend Micro Security 2019 (15.0.0.1163 and below) consumer family of products is vulnerable to a denial of service (DoS) attack in which a malicious actor could manipulate a key file at a certain time during the system startup process to disable the product's malware protection functions or the ...