Information security laws, investigations and ethics

Get news, advice and commentary on information security laws such as the CFAA, CAN-SPAM and CALEA. Learn about information security legislation, ethical vulnerability disclosure, digital surveillance laws and more.

Information security laws, investigations and ethics News

  • October 04, 2019 04 Oct'19

    Risk & Repeat: Trump takes aim at DNC hack and CrowdStrike

    This week's Risk & Repeat podcast looks at President Trump's recent comments about CrowdStrike and the DNC 'server' and the misinformation around Russian election interference.

  • October 03, 2019 03 Oct'19

    Zendesk breach in 2016 affected 10,000 customers

    Zendesk disclosed a previously undetected security incident from 2016 in which data for 10,000 customer accounts was accessed, but the disclosure is missing some key details.

  • October 01, 2019 01 Oct'19

    Bulletproof host raided in former NATO bunker

    German authorities arrested seven in raid of bulletproof hosting company CyberBunker -- which was housed in a former NATO bunker -- for allegedly hosting dark web marketplaces.

  • September 27, 2019 27 Sep'19

    New York files lawsuit over Dunkin' breach response

    The New York attorney general filed a lawsuit against Dunkin' Brands regarding attacks dating back to 2015 and alleges the company failed to respond or notify victims properly.

View All News

Information security laws, investigations and ethics Get Started

Bring yourself up to speed with our introductory content

  • cyberterrorism

    According to the U.S. Federal Bureau of Investigation, cyberterrorism is any 'premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by ... Continue Reading

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network. Continue Reading

  • USA Patriot Act

    The USA Patriot Act is a law enacted in 2001, granting new and extended data-collection abilities to federal agencies in an effort to combat terrorism after the September 11 attacks. Continue Reading

View All Get Started

Evaluate Information security laws, investigations and ethics Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Information security laws, investigations and ethics

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Information security laws, investigations and ethics Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close