Ionela Toma

45 Added | 1 Magazine | 1 Follower | @IonelaToma2016 | Keep up with Ionela Toma on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Ionela Toma”

Is your business ready for the Data Protection Regulation?

In recent years, technological advances in areas such as mobile and cloud computing and the ubiquity of the internet have made it ever easier for …

Every Android device is vulnerable to newly discovered bugs

With two new "Stagefright" vulnerabilities discovered, almost every Android device ever released is vulnerable to malicious hackers. Fixing the bug isn't simple.<p>Two major vulnerabilities have been discovered in Google's Android mobile software by the same security company that found a whole series …

Is BYOK the key to secure cloud computing?

Thanks to Edward Snowden’s revelations about the NSA, the comprehensive hacking of Sony, and on-going legal battles over whether email stored in the …

Hacking is such a problem that the cost of cyber insurance is skyrocketing

<i>(By Jim Finkle, Reuters) –</i> A rash of hacking attacks on U.S. companies over the past two years has prompted insurers to massively increase cyber premiums for some companies, leaving firms that are perceived to be a high risk scrambling for cover.<p>On top of rate hikes, insurers are raising …

Health Care

Fallout from EU-US Safe Harbor ruling will be dramatic and far-reaching | Ars Technica

Clever ruling by the Court of Justice will be almost impossible to circumvent.<p>In the wake of last week's dramatic judgement by the Court of Justice …

7 Ways Technology is Changing Home Security

Technology has radically changed the way we protect our homes. What was previously only possible in Sci-Fi movies is now gradually becoming reality. The digital revolution has made its way into our homes.<p>1. Remote Monitoring: Remote monitoring is a great way to keep an eye on the home when you are …

Senate passes controversial CISA cybersecurity bill

In a 74 to 21 vote, the Senate has voted to pass the Cybersecurity Information Sharing Act, or CISA, a bill that privacy advocates have long argued will quietly give the government invasive spying powers. The House has already passed similar legislation, and the two versions will now enter a …

Researchers poke hole in custom crypto built for Amazon Web Services | Ars Technica

Even when engineers do everything by the book, secure crypto is still hard.<p>Underscoring just how hard it is to design secure cryptographic software, …

How to Boost Your Internet Security with DNSCrypt

When you use HTTPS or SSL, your web browsing traffic is encrypted. When you use a VPN, all of your traffic is encrypted (usually). Sometimes even …

How to hack any Linux machine just using backspace

A rather embarrassing bug has been discovered which allows anyone to break into a Linux machine with ease.<p>If you press the backspace key 28 times on …

The FBI director just gave a striking example of how much of a problem encryption has become

And a comment Wednesday from the FBI's director emphasizes how serious the issue has become.<p>At a Senate Judiciary Committee hearing on Wednesday, FBI Director James Comey said encryption is a "big problem" that the US must grapple with, especially in light of recent ISIS-linked terror attacks that …

John Brennan

If you’ve never applied Risk Management to a project before

All projects face risks and risk management is a key process area of all major PM Bodies of Knowledge such as the PMI Body of Knowledge (PMBoK®). If …

Project Management

E&O: Are You In The Know? - CRC

Several times over the past decade FINRA has indicated they may be considering making it a requirement for broker-dealers to maintain errors and …

DEUTSCHE BANK: Killing passwords is the future of security

The Financial Times reports that the bank is looking at replacing passwords with biometric security that measures 50 different factors including location data, how you hold your phone, thumbprint technology, and facial recognition. Deutsche Bank is working with company Callsign on the …

Deutsche Bank

Step-In Risk: A New Reputational Risk

Privacy Policy <i>(Updated: October 8, 2015)</i>:<p>hide<p>JD Supra provides users with access to its legal industry publishing services (the "Service") through …

Ascending the Ranks: The Brazilian Cybercriminal Underground in 2015

View Ascending the Ranks: The Brazilian Cybercriminal Underground in 2015<p>The Brazilian underground’s emergence can largely be attributed to an …

Anonymous takes down Nissan's site over whaling in Japan

Hacker collective Anonymous is stepping up its fight against Japan over the country’s continued whale hunting.<p>The group claimed responsibility for taking down auto maker Nissan’s Japanese website on Wednesday morning. The company confirmed its site was unavailable to visitors; a spokesperson …

Shinzo Abe

The Biggest Security Threats We'll Face in 2016

Hackers are nothing if not persistent. Where others see obstacles and quit, hackers brute-force their way through barriers or find ways to game or …

Security

Tax and compliance in the new sharing economy

By Team Intuit<p>Within the next five years, as many as four in 10 workers in the United States are expected to be self-employed, due in part to …

KPMG withdraws audit opinions on CFTC over accounting error - documents

A KPMG logo is seen on their down town office tower in Los Angeles, California Thomson Reuters<p>By Sarah N. Lynch and Lisa Lambert<p>WASHINGTON (Reuters) - The U.S. regulator that polices the complex derivatives markets is struggling to keep its own books in order and has made a material error that its …

Corruption

Compliance does not equal security

A security manager needs a philosophy about how to address security issues, and I find that many elements of mine can be reduced to a few words that …

Information Systems

Securities Brokers Don't Tell The Full Story About Wash Sale Losses

It’s an inconvenient truth for brokers that the IRS asks them to report wash sale losses on 1099-Bs <i>differently</i> from the way traders must report wash sale adjustments on income tax returns. Brokers are correct in preparing 1099-Bs, but incorrect in telling clients they should import 1099-Bs into …

Finance

Got enterprise software? You're probably due for an audit

If you run software for a business, take note: Vendors are watching you closely.<p>Corporate users are expected to pay in full for all the ways they use a vendor's software, and on what systems, and for all the people who use it, and maybe more. Complicating matters further, the rules can often change.<p>…

Enterprise

Corruption Currents: HSBC Defends Itself from Cyberattack

By<p>Samuel Rubenfeld<p>Samuel Rubenfeld<p>The Wall Street Journal<p>Biography<p><i>A daily roundup of corruption news from across the Web. We also provide a daily roundup of important risk & compliance stories via our daily newsletter, The Morning Risk Report, which readers can sign up for here. Follow us on</i> …

Corruption

Cybersecurity much more than a compliance exercise

Even as an overwhelming majority of large global enterprises feel vulnerable to data breaches and other security threats, too many organizations …

Run This by Compliance

Wall Street banks are famously shrinking, but there's one area at Goldman Sachs where the job prospects are pretty hot: workers hired to keep …

JPMorgan Chase

Why companies don't change - and don't want to talk about it

At the World Economic Forum in Davos, when delegates debated ‘governance’ they were talking about politics rather than corporate governance<p>Business and government leaders worry about a multitude of issues these days. Climate change, weapons of mass destruction, water scarcity, migration, and energy …

Risk management will be very important in 2016

<b>RYK VAN NIEKERK:</b> Welcome to this market commentator podcast, Moneyweb’s weekly podcast where I speak to leading investment professionals.<p>Our guest …

How to Develop an Operational Risk Management Plan

Risk Management