I was shocked to learn that my U.S. Senator, Johnny Isakson, made the list. Could the legislator, one of the most respected members of the Senate and the state of Georgia, be a secret Klansman?
A rekindled multi-stakeholder dialogue is needed to help clarify global privacy standards and flesh out the right to privacy mentioned in both the 1948 Universal Declaration of Human Rights and the 1966 International Covenant on Civil and Political Rights (ICCPR).
The meeting point for hackers and mothers is like a mirror. The outward-bound reflection is where they intersect. Both are interested in what is revealed by a hack or sneak attack, but for the opposite reason.
October 1st was supposed to be a transition day for U.S. businesses with respect to credit cards. With a few exceptions like autopay gas pumps, credit card transactions were scheduled to be switched to the EMV method of payment processing.
Twenty-seven years ago on November 2, 1988, Robert Morris, then a Cornell University grad student, made history by launching the first "Internet worm" from MIT. Meant, according to Morris, to gauge the size of the Internet, the worm morphed into a denial of service exploit.
Librarians care an awful lot about your privacy. It's not really all that surprising, we have always been the trusted keepers of secrets, the nonjudgemental face at the reference desk.
Essentially, a cloud setup has two requirements: a group of connected servers, and virtualization software that connects those servers. The virtualization software is the key piece that turns a regular group of computers into a cloud computing setup.
Virtually all of the world's information moves deep under the sea. Well over 95 percent of everything moving on the global Internet passes through 200 or so highly active cables, some as deep under water as Mount Everest is tall. Recent reports indicate renewed interest by Russian submarine forces in surveillance of our undersea fiber optic cables. The movement of information is the lifeblood of the global economic system: it needs to be more secure from accident and attack.
Patricia Cornwell is known to millions of readers worldwide. She has won nearly every literary award for popular fiction and has authored 29 New York Times bestsellers.
SEOUL -- The solution to privacy concerns lies not in data localization, but in the development of secure systems and the proper use of encryption. Data storage actually means the continuous transfer of data between users, with no regard for Westphalian borders. Policies born of confusion, chaos and confrontation have no place in this new world of opportunities.
Yet another massive data break example, the TalkTalk data breach of "significant and sustained proportions" as quoted from the CEO Chief Executive Dido Harding, is cold comfort for customers, but what lessons must we keep learning?
Marina Kaljurand is Estonia's Minister of Foreign Affairs. Prior to becoming Foreign Minister in July 2015, she was a long-time Estonian diplomat, and an ambassador to the United States, Mexico, Canada, Russia, Kazakhstan and Israel.
How can your company learn from the U.S. Secret Service's mistakes? Start by developing basic information security guidelines with respect to who can access sensitive data (such as personnel files or other confidential data) within your organization.
We live in a time when databases have started to include a terrifying amount of extremely intimate information about illnesses, diagnoses, treatments and health issues that nobody should have to fear might become reading material for criminals or their customers.
As much as possible, never use simple passwords or, worse, use the same one on all of your accounts. Even if they are complicated, some websites have less security in protecting passwords. It is hard to memorize many passwords, but this is for your own good and the protection of your identity.
E-, virtual, online, and net are gradually disappearing: This is the conclusion reached by the prefix monitoring of ongoing UN-based negotiations on global digital policy (negotiations on the 10-year review of WSIS, the World Summit on the Information Society).