iOS app Android app

Data Security

The Digital Underworld: What You Need to Know

Doug Irving | Posted 07.26.2016 | Technology
Doug Irving

Illustration by Meriel Waissman Tens of millions of Americans will have their credit-card numbers, hospital records, or digital identities hacked or ...

Moving: A Dangerous Time for Your Identity

Adam Levin | Posted 06.09.2016 | Crime
Adam Levin

Whether we're talking about college kids coming home for a few months or simple relocation, there's nothing relaxing about a move -- or simple. Get it wrong, and you become vulnerable to identity theft and other forms of fraud.

It's the year's your cybersecurity?

The Conversation US | Posted 05.02.2016 | Technology
The Conversation US

Steven Weber, University of California, Berkeley and Betsy Cooper, University of California, Berkeley What if, in 2020, wearable devices did not care...

Facebook Sees Spike In Government Data Requests

Reuters | Casey Williams | Posted 04.28.2016 | Technology

(Reuters) - Facebook Inc said on Thursday that government requests for account data increased by 13 percent in the second half of 2015, with the Unit...

Android Phones Are Much Safer Than They Used To Be, Google Says

The Huffington Post | Casey Williams | Posted 04.20.2016 | Technology

Every now and then, a piece of nasty malware worms its way into Google's Play store and onto people's Android devices. But Google says that downloadin...

Police Officials Tell Congress Encryption Hurts Their Ability To Fight Crime

Reuters | Casey Williams | Posted 04.19.2016 | Technology

WASHINGTON, April 19 (Reuters) - The growing use of strong default encryption on mobile devices and communications by criminal suspects is handicappin...

House Finally Approves Bill To Keep Your Old Emails Private

Reuters | Casey Williams | Posted 04.13.2016 | Technology

WASHINGTON (Reuters) - Legislation that would require law enforcement to obtain a search warrant before asking technology companies to hand over dated...

Political Campaigns and Data Security

Daniel Etcovitch | Posted 04.04.2016 | Technology
Daniel Etcovitch

Political campaigns are usually on tight budgets and are much more focused on campaign mechanics than cybersecurity, which to them feels like something outside their realm of expertise, so they spend little time thinking about what's happening to their data.

Government Accuses Apple Of 'Deliberately' Boosting Security To Keep Feds Out

Reuters | Casey Williams | Posted 03.10.2016 | Technology

By Dan Levine and Dustin Volz (Reuters) - The U.S. Justice Department on Thursday said Apple Inc's rhetoric was "false" in a high-profile fight over t...

Apple, FBI Take Their Dispute To Congress

Reuters | Casey Williams | Posted 03.01.2016 | Technology

WASHINGTON (Reuters) - FBI Director James Comey told a congressional panel on Tuesday that a final court ruling forcing Apple Inc to give the FBI dat...

Getting to "Reasonable" With the SAFETY Act

Brian E. Finch | Posted 02.24.2016 | Business
Brian E. Finch

While an executive or board member has every right to ask about a company's cybersecurity posture, the problem is that CIOs generally do not have the ...

Here's What The FBI Actually Asked Apple To Do

The Huffington Post | Casey Williams | Posted 02.18.2016 | Technology

Apple stood up to the government in a big way on Wednesday. But what exactly did the FBI ask Apple to do that’s got everyone whipped into a lather? ...

Will anticipatory compliance be the next best practice?

Tom Garrubba | Posted 02.12.2016 | Business
Tom Garrubba

I was recently invited to speak on a panel regarding third party risk strategies for the Securities Industry and Financial Markets Association's (SIFM...

Let's Use Data to Help Our Kids, Not Lock It Up and Throw Away the Key

Aimee Rogstad Guidera | Posted 02.01.2016 | Education
Aimee Rogstad Guidera

Data is transforming our lives -- how we communicate, shop, do business and even socialize. In education, we are just starting to see the benefits of using data to improve student achievement.

Bootlegging, Piracy and the Modern Workforce Have Things in Common

Ian Khan | Posted 01.26.2016 | Technology
Ian Khan

There are serious correlations and similarities between smuggling alcohol, piracy in any form -- whether it is the real life bad guys on ghost ships in the seas or digital pirates who download stuff off the internet thinking it's all free while some artist starves to death.

12 Resolutions That Could Save Your Identity in 2016

Adam Levin | Posted 12.31.2015 | Business
Adam Levin

The best intentions can't really stop these guys, but adopting a best-practices approach to data security can make your online world more secure. Here are some of the things you can do in 2016 to help avoid the living hell of identity theft and other identity-related crimes.

Why You Should Beware of the "Most Used Words" App on Facebook

Adam Levin | Posted 11.26.2015 | Technology
Adam Levin

The reason this app has privacy hawks screeching is simple: it grabs an enormous amount of personally identifiable information and private details about Facebook users for way too little in return.

How to Keep Your Smart Devices From Exposing Your Data

Adam Levin | Posted 11.19.2015 | Technology
Adam Levin

In 2015, somewhere in the neighborhood of 1 billion Internet of Things (IoT) devices will be purchased, an increase of 60 percent over the previous year. There will be 10 billion IoT devices connected to the Internet this year.

Ending Indifference Toward Consumer Financial Safeguards

Steven Smith | Posted 11.12.2015 | Black Voices
Steven Smith

Consumer vulnerabilities affect everyone -- financial institutions and retailers who must bear the cost, small businesses whose reputations' suffer if their consumers are affected by fraud, and most importantly, working class Americans who have to bear these consequences firsthand.

Identity Theft: A Real-World Version of 'The Walking Dead'

Adam Levin | Posted 10.29.2015 | Technology
Adam Levin

Breaches, and the identity theft that flows from them, have become the third certainty in life, right behind death and taxes. Your introduction to the fact that you got "got" can take many forms.

The Not-So-Secret Service: What Your Company Can Learn From the Rep. Chaffetz Scandal

Tom Garrubba | Posted 10.21.2015 | Business
Tom Garrubba

How can your company learn from the U.S. Secret Service's mistakes? Start by developing basic information security guidelines with respect to who can access sensitive data (such as personnel files or other confidential data) within your organization.

What's the Big Deal With Data?

Victoria Espinel | Posted 10.21.2015 | Technology
Victoria Espinel

Plenty, according to new report from BSA | The Software Alliance We are generating more data today than ever before - and it's improving everything...

Physician Heal Thyself: Are Your Medical Records Safe?

Adam Levin | Posted 10.19.2015 | Technology
Adam Levin

We live in a time when databases have started to include a terrifying amount of extremely intimate information about illnesses, diagnoses, treatments and health issues that nobody should have to fear might become reading material for criminals or their customers.

Does Your Airline Really Understand Data Security?

Adam Levin | Posted 10.09.2015 | Technology
Adam Levin

A friendly reminder to organizations in regular communication with the public: You never know who John Q. Public is.

How the Ashley Madison Hack Might Impact You | Posted 08.28.2015 | Technology

Whether you are a part of the database or not, this hack could affect you. Millions of e-mail addresses, home addresses, credit cards and other information are contained within the leaked database.