Threats & Malware, Vulnerabilities
January 26, 2022
Via: SecureWorldWhile sometimes controversial, whistleblowers have the potential to save an organization from millions of dollars in losses, public backlash, or government regulation—unless they are treated with disrespect and not taken seriously. In September 2021, a senior employee at Volkswagen tried […]
September 24, 2021
Via: Help Net SecurityLast month, President Biden hosted a group of technology and insurance executives to build support for a “whole-of-nation effort” to improve cybersecurity. The executive summit was one of a series of steps the Biden administration has taken to try to […]
August 13, 2019
Via: Threat PostA U.S. senator has put telecommunication companies – AT&T, T-Mobile, Sprint and Verizon – on notice for their data collection and retention policies. Last week, U.S. Senator Ron Wyden (D-Ore.) sent an open letter to the CEOs of the four […]
April 24, 2019
Via: Help Net SecurityAs trusted partners, third-party vendors often become an overlooked or unwitting accomplice in criminal activities. As privacy laws and cybersecurity regulations continue to increase accountability around data confidentiality and protection, eSentire wanted to know how seriously firms take the risks […]
April 5, 2019
Via: Help Net SecurityWhile nearly four out of five organizations (78 percent) now include privileged credential protection as part of their cybersecurity policies, their privileged access management (PAM) security practices are woefully lacking and even worse than you might expect. Eighty-five percent are […]
September 26, 2018
Via: Security WeekThe Trump administration is hoping Congress can come up with a new set of national rules governing how companies can use consumers’ data that finds a balance between “privacy and prosperity.” But it will be tricky to reconcile the concerns […]
June 18, 2018
Via: Dark ReadingTeaching users why it’s important to commit to security controls is a far more effective strategy than simply demanding that they follow them. Here’s how. IT usage and security policies can be an annoyance for employees who simply see them […]
June 12, 2018
Via: The HillSenators are barreling toward a clash with the Trump administration over how to deter and respond to cyberattacks. The Senate is taking up annual defense policy legislation this week that would set a national policy for cybersecurity and cyber warfare, […]
Mobile security, Vulnerabilities
June 5, 2018
Via: Threat PostFacebook is hitting back against a New York Times article alleging that it struck deals enabling phone-makers to access users’ personal information. The incident is yet another blow to the social media giant as it continues to deal with questions […]
April 20, 2018
Via: The HillPresident Trump has sent to Congress a long-awaited report on U.S. policy for deterring and responding to attacks in cyberspace. The policy was sent to the House and Senate committees with oversight of the departments of State, Homeland Security, Defense […]
March 20, 2018
Via: Threat PostFacebook is in hot water after acknowledging that a consulting group – that has worked on several high profile political campaigns, including that of President Donald Trump’s – used the social media company’s platform to harvest the data of 50 […]
October 4, 2017
Via: Dark ReadingCustom roles for Cloud Identity and Access Management will give users full control of 1,287 public permissions in the Google Cloud. Google today released a beta version of custom roles for Cloud Identity and Access Management (IAM) on the Google […]
October 12, 2016
Via: Help Net SecurityVulnerabilities continue to grab headlines. Whether it is a zero-day that affects “tens of millions” servers around the globe or an old unpatched flaw that leads to a data compromise, we will keep reading about them. The modern security landscape […]
July 4, 2016
Via: The HillThe Democratic National Committee carves out a stance against data localization requirements in the party’s draft platform, released Friday. The draft calls for greater “access to global markets for American intellectual property and other digital trade by opposing quotas, discriminatory […]
January 27, 2016
Via: Security WeekAs the name implies, DLP is about preventing loss or misuse of data. By various means, including content discovery and analysis, it helps preclude end users from accidentally or maliciously sharing sensitive, critical, and confidential data that might put a […]
November 4, 2015
Via: Dark ReadingIn the wake of FTC v. Wyndham, government agencies are becoming more aggressive about protecting corporate data and customer privacy. But the new rules are very much a work in progress. It’s an unquestionable fact that our industry’s current state […]
August 24, 2015
Via: application-securityEven a small modification might be a change you don’t like, such as a shift from “we won’t share your data with anyone else” to “now we’ve been acquired, we will allow our new parent company to use some of […]
July 29, 2015
Via: Russel EdwardsA business payment security survival guide is a useful tool for small businesses. Anyone looking to start an online store, or already established businesses trying to countercheck or improve their security procedures could benefit from such information. When outsourcing the […]
May 28, 2015
Via: privacy-protectionUber Technologies is set to tweak its #privacy #policy so it can access a rider’s location when the Uber app is running in the background. The change in policy will also allow it to send special offers to users’ friends and […]