to help enterprise security across Europe
The resource centre for busy senior executives seeking the latest insights into IT Compliance & Privacy issues for major organizations
sarbaines oxley ofcom communications regulator
Latest Resources      data protection register
compliance resources privacy resource center

Breaking Global News
Global Compliance and Privacy News
- Breaking News, updated every 30 minutes
•   Compliance, Privacy and Security
•  Money Laundering
•  Phishing
•  Regulatory Issues
•  SOX, Basel 2, MiFID

You Tell Us:

We use SSL Technology for web data entry points:

What is SSL?

Are Smartphones Endangering Security? - Wick Hill
Dealing with Internet Security Threats - Ian Kilpatrick
How the New EU Rules on Data Export Affect Companies in and Outside the EU - Thomas Helbing
Farmers' Data Leak Highlights Old Technology Use - Wick Hill
Saving Money with SFTP - Wick Hill
UK Information Commissioner targets firm selling vetting data - Eversheds e80
12 Key Steps to Internet Security - Wick Hill
Telephone Monitoring Legality in the UK - Dechert
Firewall or UTM - Wick Hill
UK Information Commissioner demands mobile device encryption - Eversheds e80
Data loss - liability, reputation and mitigation of risk - Eversheds e80
Phorm, Webwise and OIX - BCS Security Forum
The challenges of PCI DSS compliance - Thales, Russell Fewing
"Quality" Data Vendor Spams us! Editor astounded!
National Gateway Security Survey 2008 - Wick Hill
Unified Threat Management - Watchguard Technologies

news archives
0 | 1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 | 11 |
12 | 13
[What is this?]

Industry Blogs
Tim Berners Lee's Blog
Tim Callan's SSL Blog
Davis Wright Tremaine's Privacy & Security Law Blog
Emergent Chaos Blog
Michael Farnum's Blog
Phillip Hallam-Baker's Blog - The dotFuture Manifesto: Internet Crime, Web Services, Philosophy
Stuart King's Security and Risk Management Blog
David Lacey's IT Security Blog
Metasploit Official Blog
Jeff Pettorino's Security Convergence Blog
Jeff Richards's Demand Insights Blog
David Rowe's Risk ManagementBlog
Bruce Schneier's Security Blog
Larry Seltzer's Security Weblog
Mike Spinney's Private Communications Blog
Richard Steinnon's Threat Chaos Blog
The TechWeb Blog
Tim Trent's Marketing by Permission Blog
Rebecca Wong 's DP Thinker Blog

23 February Newsletter
Newsletter Archives are located in "News"

Industry Update
Internet Security Intelligence Briefing - November 2005
Find out the latest trends in e-commerce, web usage & the latest threats from adware/Spyware

Phorm, Webwise and OIX
- BCS Security Forum

'The Any Era has Arrived, and Everyione has Noticed' - Stratton Sclavos - VeriSign
Identity Security - Time to Share
Malicious code threats - iDefense
Public Alerts - updated as they happen from
Public Alerts - updated as they happen from Websense
Public Advisories - updated as they happen, from iDefense
Phoraging - Privacy invasion through the Semantic web: a special report by Mike Davies of VeriSign

Privacy Laws & Business International E-news, Issue 57
Privacy Laws & Business UNited Kingdom E-news, Issue 60

Security Reviews
February 2007 - VeriSign Security Review
The security review archive is here

Case Studies
Finance Industry
Case Study Example

A case study on a Finance industry company.

White Papers
VeriSign® Intelligent Infrastructure for Security
VeriSign® Intelligent Infrastructure: An Overview
Identity Protection Fraud Detection Service - description of the service
Life of a Threat - Video on Threat Management Lifecycle
Optimizing Enterprise Information Security Compliance - Dealing with all the audits
For a full list of all whitepapers, visit our Whitepaper library

Legal Notices
Privacy Policy
Terms of use

basel 2 sarbanes oxley
data controller notification binding corporate rules BCR data transfer third countries third part data transfer basel 2 regualtor regulation regulate FSA banking network security RSA encryptin algorithm Bits sacked bank staff
Blogs compliance Reports compliancy Legislation Data Protection Case Studies data privacy White Papers data protection act News information commissioner Events security standards Links information security iDefense
Retail Solutions

News - an Archive Roundup of all the News Items November 2005 to January 2006, Newest First

Current News Updates compliance and privacy

An archive of all the news items November 2005 to January 2006 on Compliance and Privacy

To avoid long load times news is archived periodically. If you can't find what you are looking for on this page please refer to our archives. Please use the search engine for ease of retrieval.

Main News page | Archives: (oldest) 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 (most recent)

Brussels Pauses Financial Regulations

Brussels has granted the financial sector a breathing space in the welter of Regulations after the huge number than that have been imposed over the last very few years. Many planned items are "paused"

Click Here for the full article

Sarbanes-Oxley Brings Business Benefits Outside the USA

Just as the mists were starting to clear for C-Level executives, a torrent of SOX is heading Europe's way. It can certainly be argued that Euro-CIOs should already be aware of Sarbanes-Oxley, but so many of them said “US Only. Not Relevant!” and moved on. The more astute looked at the regulatory regime and said “Ah, if we comply here, then it genuinely makes our lives easier for the future,” because they recognised competitive advantage and cost saving when they saw it.

Click Here for the full article

Compliance and Privacy Newletter - 5 December 2005

In this issue:

  • Cybercrime nets more than drugs!
  • MiFID Catches C-Level Execs Unawares
  • Breaking News

Click Here for the Newsletter

Hard Numbers on Internet Crime

A recent headline claims that cybercrime is more profitable than the drugs trade.

How can this be true? Trafficking in drugs is a mature criminal enterprise, large scale professional Internet crime only emerged in the past five years. The number of daily security alerts issued by VeriSign iDefense increased from 21 per day to 59, a 180% rise. If the claim that Internet crime already earns $105 billion a year is true and the growth rate is even a fraction of that, we are in very, very serious trouble

Click Here for the full article

Cybercrime yields more cash than drugs?

Compliance and Privacy's Peter Andrews looks at the claims made in a major interveiw Valerie McNiven gave to Reuters in Riyadh on 28th November. Andrews takes a harder look at the numbers quoted and has a critical look at the substance of the claims

Click Here for the full article

Michael Durant Refused Landmark Appeal by The House of Lords

Michael Durant is out of luck in his quest for a ruling in his favour in the UK courts, the House of Lords said at the end of November 2005. His only route forward is now Strasbourg.

Click Here for the full article

Information Commissioner sets priorities for Data Protection enforcement

The Information Commissioner's Office has launched a new Enforcement Strategy, which targets organisations that deliberately or persistently ignore their obligations under the Data Protection Act 1998.

Click Here for the full article

Nearly Half of Consumers Worldwide Willing to Switch Banks for More Security

Forty-five% of consumers worldwide are willing to switch to financial institutions that offer more security protection, according to new research from Unisys Corporation that polled more than 8,000 people around the world on identity fraud and bank security issues.

Click Here for the full article

MiFID'S Potential Impact on Europe's Securities Markets

The Markets in Financial Instruments Directive (MiFID) is likely to be one of the greatest legislative changes seen in Europe 's securities markets in over two decades. The intention of MiFID is to raise the standards of the European investment markets to US market levels and in particular, focus on best execution, investor protection, and transparency of trading.

Click Here for the full article

MiFID - the Markets in Financial Instruments Directive

Alongside Sarbanes Oxley and Basel 2 is the MiFID, which, if the European Parliament has its way, will be delivered inside two years. And this régime has swingeing penalties for failure to conform and will dwarf the budgetary impact of SOX and Basel 2 put together

Click Here for the full article

Password-stealing keyloggers skyrocket

Hackers are on target to release more than 6,000 keystroke loggers in 2005, a 65 per cent increase from the 3,753 keyloggers released last year, according to security intelligence organisation iDefense.

Click Here for the full article

Liberty Alliance to Speed Wide-Scale Adoption of Strong Authentication Solutions

The Liberty Alliance Project announced the formation of a global, cross-organizational expert group focused on developing open specifications for interoperable strong authentication. Liberty's new Strong Authentication Expert Group has been created to speed the worldwide deployment of interoperable strong authentication and to help organizations meet new industry-wide demands for universal strong authentication solutions.

Click Here for the full article

Protecting your personal information ranked as a top issue

Protecting personal information is now ranked as one of the top three most socially important issues, according to new research published by the Information Commissioner, Richard Thomas, on 16th November 2005.

Click Here for the full article

Backups, Archives and Subject Access Requests

We were prompted to look at this by the UBS/Perot/Michael Johnson case.  The circumstances of that case mean that one party is calling for Data Backups to be retrieved, originally as part of a Statutory Access Request [SAR], and later by use of a Witness Summons.  The other party is resisting.  We're not going to comment on the Witness Summons, except to note the huge cost, stated to be £4.27m, of complying.  Instead we're confining ourselves to the Data Protection Act 1998 [DPA].

Click Here for the full article

Compliance and Privacy Newletter - 14 November 2005

In this issue:

  • Wi-Fi Breaks Data Protection Law
  • Latest ISIB Report highlights VoIP risks
  • VeriSign MSS 3.0 Portal Training
  • Telemarketing and Privacy - Ofcom Acts on Silent Calls

Click Here for the Newsletter

Compliance is only one element of the security puzzle

Compliance is only one element of the security puzzle - cost and complexity are equally if not more important to the overall efficiency and protection of users, networks and ultimatlely assets and smooth running of business.

VeriSign's Gabriel Swift responds to the Ernst and Young 8th annual Global Information Security Survey

Wi-Fi Breaks Data Protection Law

Unless you as a Wi-Fi Hotspot Provider take sufficient care when configuring your Wi-Fi then you run the risk of breaking Data Protection laws. The EU Information Commissioners are now looking long and hard at how well companies protect data – it is only a matter of time before they turn their attention to Wi-Fi.

Click Here for the full article

Spear-phishing – the new corporate threat

Spear-phishing attacks are on the increase according to IBM and others. Unlike traditional phishing attacks which randomly spam thousands of e-mail addresses, spear-phishing attacks specific targets. It's more difficult to set up but the rewards can be far higher because a successful attack gives the “spear-phisher” massive access within a corporation. To date such attacks have largely gone unreported because companies fear the loss of trust that would occur if they went public.

Click Here for the full article

HP has bought its own customer list!

Interex, the Liquidated Independent HP User Group's Data is a Commerical Asset

This "stranger than life" story deals with the business assets of Interex, the independent HP user group. Interex, which went into liquidation earlier this year, has its list of members as a business asset. And the liquidators, quite reasonably, want to sell this asset to salvage what they can to pay off the £2.5m that it owes. HP has paid £40,000 for 100,000 of its own customers to prevent that data being circulated elsewhere

Click Here for the full article

Regulatory compliance takes the lead as the most important driver of information security, surpassing worms and viruses

Yet organizations are missing the rare investment opportunities that compliance offers to promote information security as an integral part of their business says Ernst & Young's 8th annual Global Information Security Survey

Click Here for the full article

Data Protection and Email Marketing

On the second of November 2005 The United Kingdom Information Commissioner issued a new Data Protection Good Practice Note entitled Data Protection and Email Marketing. This clarifies the situation with regard to how you should conduct, should not conduct, and most importantly must not conduct email marketing campaigns.

Click Here for the full article

Telemarketing and Privacy - Ofcom Acts on Silent Calls

Today Ofcom has finally announced that it will use its powers under the Communications Act (Sections 128-131 of the Communications Act 2003) to take action against persistent misusers of the network. And misuse now includes silent calls. A silent call is one where an automated dialer initiates a call when there is no tele-operator available to handle the call, resulting in the phone ringing but the recipient of the call only hearing silence.

Click Here for the full article


This site is independent of all its sources
The contents of the site are sourced from across the industry. All copyrights are acknowledged.