At the VigiTrust "How to Prevent Data Loss and Breaches in the Healthcare Industry" forum, held at the Irish Consulate in New York City, the conferenc...
So now we find out that the CEO in many cases is the biggest threat to corporate security. Aren't there any institutions that are functioning in a competent manner these days?
The case of Jeremy Hammond is illustrative of a trend to target, overcharge and come down hard on those the state perceives as threatening. The supposed threats are due to their beliefs and/or actions toward information freedom and transparency.
The classical division between classified information and unclassified information is no longer functional. We need to implement encryption, not classification, for all government materials that are not accessed by the public, and particularly for defense information.
The online world can be a dangerous place for the unprepared. And it's just going to get worse. It's time to teach cyber security as integral part of the high school and college curriculum and to all corporate employees.
Background Recently, I participated in SC Magazine's eSymposium on Corporate Espionage. Ira Winkler, President of Secure Mentem and the Internet Sec...
What can FinFisher and other tools do? On mobile platforms they can record voice calls, SMS messages and emails. The software can place "silent calls" -- that is, turning your phone on when you are unaware it is active.
DNS, like all good technologies, was designed to explore new frontiers and not be put to one particular use. Its design was purposely extensible.
The market risks associated with real-time reporting became a reality last month, as a Twitter hoax claiming that an explosion occurred at the White House injuring President Obama led to a 150-point drop, a $136 billion market value, in the Dow Jones industrial average.
The top Chinese official of the People's Liberation Army, General Fang Fenghui recently announced that the consequences of a major cyber attack "may be as serious as a nuclear bomb." His remarks are symptomatic of the global uncertainty surrounding the results of a 'major cyber attack.'
Before you go to the trouble and expense of doing a credit freeze, you should understand how the process works and be aware of several inconveniences you might experience.
Whether the voices of the people on it are driving administration policy remains up for the debate. What can't be said now is that they're not paying attention to the issues raised. We, the People, should be heard. Now there are new ways to you raise your voice.
Once again we come back to the very real threat this kind of malware presents to the small- to medium-sized business who will very commonly use these kinds of free and open source tools to build up and maintain their online presence.
It's fairly safe to assume that calendars, call logs, contacts, emails, financial data, text messages, photos and videos stored on smartphones or mobile devices are at risk of being monitored or stolen.
If and when a cybersecurity bill moves to the Senate, the story about House passage of CISPA should not be about failure.
In 2009, my friend Mike was getting into bitcoin and I remember him explaining the whole concept to me: A virtual currency managed by a peer-to-peer network open to anyone with a computer and uncontrolled by any bank or government.