Cyber Security Practitioner

Volume: 2 Issue: 11
(November 2016)


The US National Institute of Standards and Technology ('NIST') issued, on 10 November 2016, its guide Small Business Information Security: The Fundamentals to assist small businesses in understanding and responding to the challenges related to the protection of their information systems ('the Guide'). / read more

The UK's National Cyber Security Centre ('NCSC') announced, on 7 November 2016, that a criminal investigation had commenced into a security incident at Tesco Bank, which led to the compromise of thousands of its customers' accounts. The investigation was launched under the leadership of the National Crime Agency ('NCA'), after Tesco previously confirmed that the incident had resulted in money being withdrawn from customer accounts fraudulently. / read more


The relatively short legal history of cyber security has been mainly about the criminalisation of cyber crime offences: see the Computer Misuse Act, the Cybercrime Convention etc. / read more

China finally passed its new Cyber Security Law (‘Law’) at the end of the first week of November 2016. The general public has now been provided with the final text of the Law. The guessing game is not entirely over, however, as there remain some provisions, and some aspects of interpretation, that remain to be clarified by way of implementing regulations and actual enforcement over time. Manuel E. Maisog, Partner at Hunton & Williams, analyses the new Law and the controversies created. / read more

A recent survey by ComRes found that 71% of UK corporate directors would be in favour of enhanced penalties for businesses that fail to meet basic cyber security requirements. Here, Thomas F. Zych, Partner at Thompson Hine LLP, considers the potential for such enhanced penalties for cyber security failings from a US perspective; in doing so he discusses the need for generally applicable and uniform security standards to be in place so that businesses are not punished unfairly. / read more

Charles McFarland, Senior Researcher at Intel Security, draws on a number of reports he has been involved with over the past few years to delve into the factors that influence dynamic changes in underground markets where stolen data is bought and sold. / read more

The European Court of Justice (‘CJEU’) handed down its ruling on 19 October 2016 in the Breyer case, in which a politician took action against the German Federal Government on the basis that the Government's publicly accessible websites stored IP addresses for cyber security reasons. The ruling clarifies when dynamic IP addresses may constitute ‘personal data.’ Dr Fabian Niemann, Lennart Schüßler, Francis Aldhouse and Ruth Boardman of Bird & Bird LLP discuss the CJEU’s decision and what it means for website operators storing IP addresses. / read more

Dr. Jessica Staddon, Associate Professor in the Department of Computer Science at N. C. State University, looks at the circumstances behind and objectives of the ‘Privacy Incidents Database,’ a project led by the University in collaboration with UNCC, Clemson University and RIT, which is designed to use data mining to maximise the advantages that privacy incident data can bring. Dr. Staddon outlines the benefits of privacy incident data and the role of database analysis in understanding such incidents. / read more

About Cyber Security Practitioner:

Cyber Security Practitioner, the most recently launched monthly publication from Cecile Park Media, provides a multi-disciplinary view on the cyber security challenges facing global businesses and delivers insight into operational change. It covers cyber security regulation, data breach, data security, cyber risk, cyber crime, ethical hacking, privacy and data protection, cyber infrastructure, technical solutions, risk management, information assurance, security standards, liability, consumer protection, ransomware and other cyber threats, cyber insurance... /read more

Search Publication Archives

Our publication archives contain all of our articles.
Can’t find what you are looking for?
Try an Advanced Search

Log in to cyber security practitioner
Subscribe to cyber security practitioner
Register for a Free Trial to cyber security practitioner
cyber security practitioner Pricing

Social Media

Follow cyber security practitioner on TwitterView cyber security practitioner LinkedIn Profilecyber security practitioner RSS Feed