› Forums › Security › News (Security) › Intel expert divulges security trends
Tagged: Governance_G12, Security_S12, Tech_G15
- This topic has 1 voice and 0 replies.
-
AuthorPosts
-
-
February 7, 2020 at 6:12 am #39353
#News(Security) [ via IoTGroup ]
Headings…
Intel expert divulges security trends
The ethical hacker and bug bounties
Privacy, please
Control of personal data
Global harmonyAuto extracted Text……
Intel’s Amit Elazari Bar On discussed IoT security, ethical hackers, bug bounties, and more.
Combine an academic, a practitioner, a techie, and a lawyer, and you have Dr. Amit Elazari Bar On, director of global cybersecurity policy at Intel and lecturer at UC Berkeley’s School of Information, whose focus is cyberlaw, privacy and intellectual property.
In partnership with the UCLA Burkle Center for International Relations, Elazari recently held a live podcast to discuss her research in cybersecurity, patents, copyright, privacy and private ordering, and the evolving cybersecurity issues plaguing companies.
The focus was on how security is one of the most evolving and impactful landscapes in the regulatory sphere and the proposed initiatives in the areas of data protection, Internet of Things (IoT), Coordinated Vulnerability Disclosure (CVD), and more.
“This is the idea that companies can actually collaborate with external hackers, ethical hackers, friendly hackers, and security researchers,” who are not employed by the organization, “but out there testing the devices for potential security vulnerabilities or for potential issues that might leak information of users or whatnot.”
“It’s really about collaboration and increasing collaboration, and this is going to be more important as we think about all the regulatory initiatives and concepts that we have in the area of IoT security, an area which is definitely critical,” she said.
The Computer Crime Fraud and Abuse Act (CFAA), Elazari said, is one of the main anti-hacking laws in the United States.
Because of how interconnected everyone seems to be, “what we’re seeing with connectivity, [are] definitely proposed regulations of policies in the area of security and privacy,” Elazari said.
“This is just one example of the kind of issue that we’re seeing and regulatory landscape, the issue of equipping users with rights, about their data,” she said
Read More..
AutoTextExtraction by Working BoT using SmartNews 1.0299999999 Build 26 Aug 2019
-
-
AuthorPosts
- You must be logged in to reply to this topic.