Poor security can literally ruin your company - just ask the former Bitcoin giant MtGox. Handling around 70 per cent of the world's Bitcoin trades ...
While we are inevitably doomed to repeat this cycle (ILOVEYOU, Nimda, Storm Worm, etc) it can't hurt to see what real news Heartbleed has brought to the light of day.
The controversy over how to manage and store sensitive student data reached boiling point this week. InBloom, the non-profit organization backed by a $100M grant from the Gates Foundation, closed its doors over parental concerns about the potential misuse of that data and other privacy and security fears about how students' information might be used, manipulated or get into the wrong hands.
co-authored by Dr. Stephen Bryen, CTO, Ziklag Systems Verizon has published a blockbuster report on Internet "data breaches" which has garnered maj...
But wait, after the cards were/are compromised, the banks reissue you a new card, they let you dispute any bad transactions and the merchants may offer you a discount to keep you coming back. So, no harm, no foul, right? Not so fast ...
Just about every kind of healthcare related entity—hospitals, rehab centers, pharma companies, insurance carriers and more—have been and continue ...
I want to share with you my top SXSWi security takeaways, gathered from some interesting and engaging panels and discussions at the festival.
Sure, we see TSA screeners at airports every day, and there is a local FEMA office you can reach out to in the event of an emergency. However, for owners and operators "critical" infrastructure facilities, meaningful outreach to DHS can still at times be a challenge.
You may think you've guarded your company, but are your social media outlets unprotected? Look at these 15 potential weaknesses in your defense.
"Victory, I am free!" Fist up in the air, weev, Andrew Auernheimer, laughed. Last week, Aurenheimer was released after serving 14 months in federal prison.
Ever hear of the term "data broker"? What do you think that is? Think about that for a moment. Yep, you got it: An entity that goes after your data and sells it to another entity.
When our forensics investigators are called to look into the cause of a data breach, the majority of the time the initial point of entry is tied to a weak password.
If the Heartbleed fiasco taught us anything, it's that there are myriad ways your company can be affected by security issues. Your HR department is vulnerable, too, and the most dangerous fallout comes increasingly from tax-related identity theft.
Sure, the NSA, CIA and FBI deserve scrutiny, but we should devote our attention to the private sector also. Outsourcing has always been a convenient way to avoid accountability.
For developers to succeed in the long term, Google must take action to clean up the Google Play store. Changes may slow down the app approval process, but most developers would welcome it if it also created an environment where consumers were more comfortable paying for apps.
It's time to take a look at some of the most common security risks that we can experience within our web applications, and perhaps it's time we look into those risks at a much deeper level.