Dutch Bureau of Statistics #statisticscbs published third Cybersecuritymonitor 2019. Using 20 indicators, an overview of the cyber security situation in the Netherlands regarding measures (increasing device security) and cybersecurity incidents is shown. https://t.co/VBPdUFwZjR https://t.co/JvzjBpEVcp
13 Sep 2019
Indeed the post #Brexit #GDPR #UK adequacy assessment might take years as there is already a waiting list of other countries. Use Standard Contractual Clauses (#SCC) to transfer #PersonalData into the UK legally. You can find them here: https://t.co/I3EskFxHYG https://t.co/YgnwSLIiWX
12 Sep 2019
UK Supervisory Authority #ICO provides documentation about if #GDPR still applies if the UK leaves the EU without a deal and if other laws still apply with a (no deal) #Brexit Read their Frequently Asked Questions. @PrivacyPros @toezicht_AP https://t.co/8I7XEfMWXP
03 Sep 2019
Criminals used artificial intelligence-based software to impersonate a chief executive’s voice and demand a fraudulent transfer of €220,000 ($243,000) in March https://t.co/KRrijQtncB
03 Sep 2019
Just added a new internet DNS tool @whatsmydns to my list of DNS tools at: https://t.co/C1TtTzKbv2 This site allows you to check the current state of DNS propagation after having made changes to domains. https://t.co/KmVrKnnw65
02 Sep 2019
XCA the Certificate and Key management tool by Christian HohnstädtThis application is intended for creating and managing X.509 certificates, certificate requests, RSA, DSA and EC private keys, Smartcards and CRLs. Everything that is needed for a CA is implemented. All CAs can sign sub-CAs recursively. These certificate chains are shown clearly.
For an easy company-wide use there are customiseable templates that can be used for certificate or request generation.
All cryptographic data is stored in a SQL database. SQLite, MySQL (MariaDB) and PostgreSQL databases are supported.
You may vote your opinion about this article:
Scripts and programming examples disclaimerUnless stated otherwise, the script sources and programming examples provided are copyrighted freeware. You may modify them, as long as a reference to the original code and hyperlink to the source page is included in the modified code and documentation. However, it is not allowed to publish (copies of) scripts and programming examples on your own site, blog, vlog, or distribute them on paper or any other medium, without prior written consent.
Many of the techniques used in these scripts, including but not limited to modifying the registry or system files and settings, impose a risk of rendering the Operating System inoperable and loss of data. Make sure you have verified full backups and the associated restore software available before running any script or programming example. Use these scripts and programming examples entirely at your own risk. All liability claims against the author in relation to material or non-material losses caused by the use, misuse or non-use of the information provided, or the use of incorrect or incomplete information, are excluded. All content is subject to change and provided without obligation.
Generated by WebHalla™ Version 0.1.e.3 : Sunday 15-9-2019
© Copyright 1995-2019 Johan van Soest