Auto Added by WPeMatico

News Wrap: PoC Exploits, Cable Haunt and Joker Malware

Are publicly-released PoC exploits good or bad? Why is the Joker malware giving Google a headache? The Threatpost team discusses all this and more in this week's news wrap.

By |2020-01-17T13:03:42-05:00January 17th, 2020|cable haunt, critical vulnerability, exploit code, google, google play, Hacks, ISP, joker malware, poc, podcast, Podcasts, proof-of-concept exploit, Vulnerabilities, zero day|Comments Off on News Wrap: PoC Exploits, Cable Haunt and Joker Malware

California’s Domino Effect on U.S. Privacy Regulation

The California Consumer Privacy Act (CCPA), which goes into effect Jan. 1, will have a longstanding impact on privacy regulation across the U.S., a security expert says.

By |2019-11-14T10:32:16-05:00November 14th, 2019|California, CCPA, Consumer Privacy, Data Privacy, enfuse 2019, GDPR, Government, Hacks, IoT, janet de guzman, podcast, Podcasts, privacy, privacy regulation, security law, security regulation|Comments Off on California’s Domino Effect on U.S. Privacy Regulation

ST12: IoT in Energy & Manufacturing

In this episode, security operations solutions strategists Andrew Lancashire and Kate Scarcella discuss the world of Internet of Things inside the Energy and Manufacturing industries. The post ST12: IoT in Energy & Manufacturing appeared first on McAfee Blogs.

By |2019-11-01T10:00:34-04:00November 1st, 2019|podcast|Comments Off on ST12: IoT in Energy & Manufacturing