Posts tagged Public Policy

Overview of the EU’s draft NIS 2 Directive

Industry Trends

Overview of the EU’s draft NIS 2 Directive

Harley Geiger's avatar

Harley Geiger

Principles for personal information security legislation

Industry Trends

Principles for personal information security legislation

Harley Geiger's avatar

Harley Geiger

Congress unanimously passes federal IoT security law

Detection and Response

Congress unanimously passes federal IoT security law

Harley Geiger's avatar

Harley Geiger

Ransomware Payments and Sanctions - U.S. Treasury Advisory

Industry Trends

Ransomware Payments and Sanctions - U.S. Treasury Advisory

Harley Geiger's avatar

Harley Geiger

A step closer to stronger federal IoT security

Industry Trends

A step closer to stronger federal IoT security

Harley Geiger's avatar

Harley Geiger

Internet of Things Cybersecurity Regulation and Rapid7

Detection and Response

Internet of Things Cybersecurity Regulation and Rapid7

Jen Ellis's avatar

Jen Ellis

Rapid7 statement on privacy and status of EU-US data transfers post-Schrems II

Industry Trends

Rapid7 statement on privacy and status of EU-US data transfers post-Schrems II

Raisa Litmanovich's avatar

Raisa Litmanovich

Rapid7 joins CFAA brief to the Supreme Court

Industry Trends

Rapid7 joins CFAA brief to the Supreme Court

Harley Geiger's avatar

Harley Geiger

Cybersecurity Vulnerability Disclosure in Trade Agreements

Industry Trends

Cybersecurity Vulnerability Disclosure in Trade Agreements

Harley Geiger's avatar

Harley Geiger

Hackers On The Hill - Slides and recap on cybersecurity policy

Industry Trends

Hackers On The Hill - Slides and recap on cybersecurity policy

Harley Geiger's avatar

Harley Geiger

An update on trade

Industry Trends

An update on trade

Harley Geiger's avatar

Harley Geiger

What Is Texas Senate Bill 820, and How Will It Affect Your School District?

Products and Tools

What Is Texas Senate Bill 820, and How Will It Affect Your School District?

Harley Geiger's avatar

Harley Geiger

The IoT Cybersecurity Improvement Act of 2019

Detection and Response

The IoT Cybersecurity Improvement Act of 2019

Jen Ellis's avatar

Jen Ellis

Expanded Protections for Security Researchers Under DMCA Sec. 1201

Industry Trends

Expanded Protections for Security Researchers Under DMCA Sec. 1201

Harley Geiger's avatar

Harley Geiger

Prioritizing the Fundamentals of Coordinated Vulnerability Disclosure

Vulnerabilities and Exploits

Prioritizing the Fundamentals of Coordinated Vulnerability Disclosure

Harley Geiger's avatar

Harley Geiger

Georgia should not authorize "hack back"

Industry Trends

Georgia should not authorize "hack back"

Harley Geiger's avatar

Harley Geiger

NIST Cyber Framework Updated With Coordinated Vuln Disclosure Processes

Vulnerabilities and Exploits

NIST Cyber Framework Updated With Coordinated Vuln Disclosure Processes

Harley Geiger's avatar

Harley Geiger

FCC Repeals Net Neutrality: What Now?

Industry Trends

FCC Repeals Net Neutrality: What Now?

Harley Geiger's avatar

Harley Geiger

Welcome transparency on US government's process for disclosing vulnerabilities

Industry Trends

Welcome transparency on US government's process for disclosing vulnerabilities

Harley Geiger's avatar

Harley Geiger

Copyright Office Calls For New Cybersecurity Researcher Protections

Detection and Response

Copyright Office Calls For New Cybersecurity Researcher Protections

Harley Geiger's avatar

Harley Geiger

Legislation to Strengthen IoT Marketplace Transparency

Industry Trends

Legislation to Strengthen IoT Marketplace Transparency

Harley Geiger's avatar

Harley Geiger