Just about every kind of healthcare related entity—hospitals, rehab centers, pharma companies, insurance carriers and more—have been and continue ...
I want to share with you my top SXSWi security takeaways, gathered from some interesting and engaging panels and discussions at the festival.
Sure, we see TSA screeners at airports every day, and there is a local FEMA office you can reach out to in the event of an emergency. However, for owners and operators "critical" infrastructure facilities, meaningful outreach to DHS can still at times be a challenge.
You may think you've guarded your company, but are your social media outlets unprotected? Look at these 15 potential weaknesses in your defense.
"Victory, I am free!" Fist up in the air, weev, Andrew Auernheimer, laughed. Last week, Aurenheimer was released after serving 14 months in federal prison.
Ever hear of the term "data broker"? What do you think that is? Think about that for a moment. Yep, you got it: An entity that goes after your data and sells it to another entity.
When our forensics investigators are called to look into the cause of a data breach, the majority of the time the initial point of entry is tied to a weak password.
If the Heartbleed fiasco taught us anything, it's that there are myriad ways your company can be affected by security issues. Your HR department is vulnerable, too, and the most dangerous fallout comes increasingly from tax-related identity theft.
Sure, the NSA, CIA and FBI deserve scrutiny, but we should devote our attention to the private sector also. Outsourcing has always been a convenient way to avoid accountability.
For developers to succeed in the long term, Google must take action to clean up the Google Play store. Changes may slow down the app approval process, but most developers would welcome it if it also created an environment where consumers were more comfortable paying for apps.
It's time to take a look at some of the most common security risks that we can experience within our web applications, and perhaps it's time we look into those risks at a much deeper level.
Finally, retailers and banks have agreed to work together to fight data breach incidents, foregoing the finger-pointing of who’s responsible for pre...
The sheer amount of personal information we are generating and sharing online underscores some of the biggest security challenges we are currently facing. How do we control what this data is being used for?
Two thirds of all of the websites in the world use OpenSSL, this vulnerability would enable hackers (or anyone else for that matter) to exploit the cryptographic library and use that as a way of stealing information trough the SSL/TLS gateways.
One man’s trash is another man’s new identity? Yes, because that “junk mail” you toss in the garbage contains valuable data about yourself. A ...
After the alarming gap in one of the Internet's key security methods *Heartbleed* was announced, even organizations that have taken precautions ...