Cybersecurity is rarely out of global news headlines. David Navetta and Marcus Evans have commented on the issue in the January 2016 edition of The Banker. The feature – “Cyber security – making banking safer” – looks how financial institutions are protecting their assets and customers’ data.… Continue Reading
On December 18, 2015, President Barack Obama signed into law the Cybersecurity Information Sharing Act of 2015 (CISA) as part of the 2016 omnibus spending bill. CISA encourages businesses and the federal government to share cyber threat information in the interest of national security.… Continue Reading
On December 7, 2015, the Council of the European Union (the Council) reached an informal agreement with the European Parliament on a new EU directive on network and information security (NISD).
The agreement marks the conclusion of two years of work, since the European Commission (the Commission) and the High Representative of the European Union for Foreign Affairs and Security Policy published a strategy for ‘An Open, Safe and Secure Cyberspace’ and proposed a directive in 2013. Once adopted, likely in early 2016, EU Member States will have 21 months to adopt the necessary national provisions to comply with the … Continue Reading
Each device which accesses the internet is allocated a unique number (Internet Protocol or IP address) by its internet service provider (ISP). A record is created each time this IP address accesses a webpage, including the date, time and URL (website address) accessed. These records are stored by the ISP.… Continue Reading
The proliferation of data gives rise to two challenges:
- Companies need to manage the vast amounts of data they now control and turn it to useful purposes.
- The availability of so much data has been an ideal environment for an explosion of various forms of cybercrime.
The South African Cybercrimes and Cybersecurity Bill expands on the original sections of the Electronic Communications and Transactions Act, 2002 (ECTA) with the creation of 20 new cybercrime offences. This illustrates the extent to which technology is being used for unlawful purposes and the need to protect yourself in your activities online. Comments on the Bill are due by Monday, 30 November 2015.… Continue Reading