Rating the payment options

Several electronic and mobile payment options have become available, but most of us in the U.S. are still using plain-vanilla credit and debit cards with magnetic stripes. They use technology that dates to the first Nixon administration. That's not a problem in itself; I have no problem with time-tested security measures that work effectively. But just look around: Data breaches are everywhere, and those magnetic-stripe cards are often implicated.

By Kenneth van Wyk | 27 February, 2015 03:07

Tags: Apple, Google Wallet, mobile payments, Google, mastercard, EMV, mobile, Square, Apple Pay

No one is too small to hack

As the White House and Congress consider new cybersecurity legislation, some middle-market companies may still be questioning whether the cybersecurity crisis is a real threat for their businesses.

By By Matthew F. Prewitt | 17 February, 2015 21:08

Tags: white house, security

The ‘sophisticated attack' myth

Sometimes I wonder whether any company will ever fall victim to an unsophisticated cyberattack. Because after every attack that comes to light, we hear that same excuse: It was a sophisticated attack.

By Ira Winkler | 11 February, 2015 03:26

Tags: Target, Anthem, intrusion, security, beca, Home Depot, sony, Cybercrime & Hacking

Protect yourself from hackers and the NSA

The downside of email, chat, text and messaging apps is that they make you feel like you're communicating privately, with only the intended recipients. And that your messages are private. Until they're not.

By Mike Elgan | 07 February, 2015 23:07

Tags: data security, security, Sony Pictures Entertainment, Sony Pictures, sony, data protection

Uber shows how not to do a privacy report

The Uber privacy report released last week (Jan. 30) is the perfect example of how not to handle a privacy PR disaster -- or any privacy policy matters at all.

By Evan Schuman | 06 February, 2015 06:08

Tags: Uber, security, data privacy, privacy policy, privacy

It's time for the chip-and-PIN'ing of America

Thank goodness for that signature on the back of my credit card. If it weren't for that smudged scrawl, a thief might steal my card (or card number) and make fraudulent purchases. Or steal my identity. Right.

By By Bret Swanson | 05 February, 2015 02:05

Tags: Target, chip and pin, security, credit cards, paypal, Sena, Home Depot

Can you trust Amazon's WorkMail?

When Amazon unveiled its cloud-based corporate WorkMail email offering last week (Jan. 28), it stressed the high-level of encryption it would use and the fact that corporate users would control their own decryption keys. But Amazon neglected to mention that it will retain full access to those messages -- along with the ability to both analyze data for e-commerce marketing and to give data to law enforcement should subpoenas show up.

By Evan Schuman | 03 February, 2015 20:07

Tags: Amazon Workmail, amazon, Apple, Google, security, encryption

7 smartphone rules changed this week

Federal regulators have been throwing their weight around lately, and mostly to good effect for consumers and users of mobile technology.

By Mike Elgan | 03 February, 2015 01:24

Tags: Mobile & Wireless, Federal Trade Commission, Federal Communications Commission, at&t, ftc, mobile

'Parks And Recreation,' Facebook and The New Privacy

If you tuned into Parks And Recreation Tuesday night, you were treated to an episode where social media startup Gryzzl attempts to win over the hearts and minds of its  new neighbors in the fictional town of Pawnee with boxes full of gifts, delivered via Amazon-esque drones.

By Matt Weinberger | 29 January, 2015 09:04

Tags: security, computerworld, data privacy, twitter, privacy

Be prepared for the breach that's headed your way

January 2015 is already winding down, but it's not too late to think about the lessons of 2014. For anyone in information security, 2014 was a year marked by spectacular breaches. It ended with Sony Pictures Entertainment getting its clock cleaned by hackers, quite possibly from North Korea. Wouldn't it be great if 2015 doesn't include the same sort of clock cleaning at your company?

By By Kenneth van Wyk | 27 January, 2015 02:28

Tags: network security, security, data breach, Sony Pictures Entertainment, Sony Pictures, sony

Facebook, take note!

In the last few weeks it's possible some of your Facebook chums posted messages on their walls in which they tried to revoke permission for the social network to use and distribute content they post.

By Jonny Evans | 22 January, 2015 13:58

Tags: intellectual property, security, copyright, data privacy, legal, privacy, Facebook

Sony hack: Never underestimate the stupidity of criminals

So who was really behind the Sony hack? And does it really matter?

By By Ira Winkler and Araceli Treu Gomes | 15 January, 2015 03:07

Tags: Anonymous, intrusion, security, north korea, Sony Pictures, sony, Cybercrime & Hacking

2015: The year the Internet crashes. Hard.

An Internet joke that goes back at least to the early 1980s consists entirely of the phrase: "Imminent Death of the Net Predicted!" Every year, even more often than you'd hear "This will be the year of the Linux desktop!" someone would predict that the Internet was going to go to hell in a handbasket -- and nothing happened. This year it's my turn, but I fear I'm going to be proved right.

By Steven J. Vaughan-Nichols | 09 January, 2015 07:26

Tags: ddos, internet, sony

Sony and Chase: Don't blame the CISO

Over the last couple of weeks, I have read numerous news stories about the widely publicized security breaches at Sony and JPMorgan Chase. It seems as if everybody is a Monday-morning quarterback, with every other reporter voicing an opinion on how these breaches should have been prevented. In particular, I read two articles that specifically blamed the information security organizations at those companies for failing to properly stop the attackers. That's not fair.

By By J.F. Rice | 08 January, 2015 01:23

Tags: JPMorgan Chase, JP Morgan Chase, Microsoft, security, CISO, sony

We can learn from the Sony hack

Well that stinks, doesn't it? Sony Pictures goes and scrubs the launch of a $44 million movie after being hacked, potentially by North Korea. Almost reads more like a James Bond plot than a news story, but there it is. And this time, it doesn't seem likely that Bond, James Bond, is going to show up at the eleventh hour to save the day.

By By Kenneth van Wyk | 20 December, 2014 06:09

Tags: intrusion, Incidence Response, security, north korea, Sony Pictures, sony, Cybercrime & Hacking

Why <i>The Interview</i> won't play in Peoria -- for now

Maybe I should be outraged by Sony's decision not to distribute the movie The Interview, but I am merely saddened by it. I am saddened that a hacking incident with all the hallmarks of a simple case of extortion has been distorted so it looks like a terrorist threat.

By Ira Winkler | 20 December, 2014 05:58

Tags: cyber terror, security, north korea, Sony Pictures, sony, iland

Intelligence community must get its own house in order

Earlier this month, Robert Hannigan, the director of GCHQ, a British intelligence agency, wrote an opinion piece in the Financial Times castigating tech companies for being "in denial" about abuses of their platforms by criminals and terrorists and calling on them to develop better arrangements for facilitating lawful government investigations. While there is certainly much room for improved cooperation between government and the private sector, the first step for reform should be for intelligence agencies like GCHQ to take a hard look in the mirror.

By Daniel Castro and Alan McQuinn | 13 December, 2014 02:19

Tags: National Security Agency, security, nsa, data privacy, beca, financial times, privacy, GCHQ

Network security needs big data

There are two types of organization now: those that have been breached, and those that just don't know it yet.

By By Ahmed Banafa | 24 November, 2014 23:50

Tags: Zero-Trust Model, data security, security, data protection

Getting your board's buy-in on cybersecurity

High-profile data breaches continue to make news, and you can bet that your board of directors has noticed. Breaches can result in huge remediation costs, litigation and lost revenues resulting from a damaged reputation. Board members pay attention to those things.

By Bart Perkins | 19 November, 2014 06:30

Tags: Target, security, Leverage Partners, LinkedIn, fbi

Google's takedown policy: Celebrity nudes today, your right to know tomorrow?

Google last week did something that is really hard to find objectionable: It said it deleted quite a few ("tens of thousands") nude pictures stolen from celebrities. But as with anything that involves such an influential company as Google, this move creates a precedent, and it's a dangerous one.

By Evan Schuman | 08 October, 2014 00:11

Tags: Google, security, data privacy, data protection

Top Whitepapers

Twitter Feed

Featured Whitepapers