State Dept. Says UN Cybercrime Treaty Must protect Human Rights On the eve of final negotiations at the UN for a long awaited cybercrime treaty, the US says they are focused on ensuring the treaty protects human rights. The US, along with 40 other countries — not including, Surprise, Russia or China — signed off […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
CISA’s SECURE SOFTWARE DEVELOPMENT ATTESTATION FORM rule comes into effect next week. It requires that companies that produce software and sell it to the government adhere to key security practices. It also requires that those developers attest to their practices. In writing. Signed by an executive of the company. It applies to companies that do […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Feds Say ChangeHealth Can File Breach Notice on Behalf of Doctors After All Changing your mind … is a federal agency’s prerogative, apparently. Normally under HIPAA, it is the doctor or hospital that has to file the breach notice and until this week, that was the fed’s (HHS) position for the ChangeHealth breach. However, smarter […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
First it was cybersecurity laws. Then it was breach notification laws. Then first generation privacy laws. Then second generation privacy laws. Now it is AI laws. What is interesting is the velocity. It took over 15 years for all states to have a cybersecurity law. We now have 17 or 18 states that enacted second […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
This one is called LINGUISTIC LUMBERJACK. Fluent Bit is a very widely used open source logging package in the cloud. It is used by all major cloud providers. It has been downloaded over 3 billion times just in 2022. Fluent Bit is described as “a lightweight, open-source data collector and processor” which collecting and processing […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
There are folks who say that open source is safer than commercial software because, well, it is open source. Their theory is that since, technically, anyone can look at the source (ignoring the fact that you would need to be a trained programmer in whatever language that software is written in and have the time […]
Continue reading →
[DISPLAY_ACURAX_ICONS]