Techworld

Security

We can learn from the Sony hack

Well that stinks, doesn't it? Sony Pictures goes and scrubs the launch of a $44 million movie after being hacked, potentially by North Korea. Almost reads more like a James Bond plot than a news story, but there it is. And this time, it doesn't seem likely that Bond, James Bond, is going to show up at the eleventh hour to save the day.

By By Kenneth van Wyk | 20 December, 2014 06:09

Tags: intrusion, Incidence Response, security, sony, Sony Pictures, north korea, Cybercrime & Hacking

Why <i>The Interview</i> won't play in Peoria -- for now

Maybe I should be outraged by Sony's decision not to distribute the movie The Interview, but I am merely saddened by it. I am saddened that a hacking incident with all the hallmarks of a simple case of extortion has been distorted so it looks like a terrorist threat.

By Ira Winkler | 20 December, 2014 05:58

Tags: security, cyber terror, sony, Sony Pictures, north korea, iland

Intelligence community must get its own house in order

Earlier this month, Robert Hannigan, the director of GCHQ, a British intelligence agency, wrote an opinion piece in the Financial Times castigating tech companies for being "in denial" about abuses of their platforms by criminals and terrorists and calling on them to develop better arrangements for facilitating lawful government investigations. While there is certainly much room for improved cooperation between government and the private sector, the first step for reform should be for intelligence agencies like GCHQ to take a hard look in the mirror.

By Daniel Castro and Alan McQuinn | 13 December, 2014 02:19

Tags: National Security Agency, security, beca, data privacy, nsa, financial times, GCHQ, privacy

Network security needs big data

There are two types of organization now: those that have been breached, and those that just don't know it yet.

By By Ahmed Banafa | 24 November, 2014 23:50

Tags: Zero-Trust Model, data security, security, data protection

Getting your board's buy-in on cybersecurity

High-profile data breaches continue to make news, and you can bet that your board of directors has noticed. Breaches can result in huge remediation costs, litigation and lost revenues resulting from a damaged reputation. Board members pay attention to those things.

By Bart Perkins | 19 November, 2014 06:30

Tags: Target, security, LinkedIn, Leverage Partners, fbi

Google's takedown policy: Celebrity nudes today, your right to know tomorrow?

Google last week did something that is really hard to find objectionable: It said it deleted quite a few ("tens of thousands") nude pictures stolen from celebrities. But as with anything that involves such an influential company as Google, this move creates a precedent, and it's a dangerous one.

By Evan Schuman | 08 October, 2014 00:11

Tags: Google, security, data privacy, data protection

Three critical changes to PCI DSS 3.0 that every merchant should know

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

By Chris Camejo | 24 September, 2014 03:10

Tags: security, PCI

Restoring user freedom in the security-first enterprise

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

By Andrew Avanessian | 23 September, 2014 07:02

Tags: Priveleged Access Management, security

In iOS 8, Medical ID could be a life-saver

Of all the new features in iOS 8, one hasn't gotten a lot of attention -- and it's the one feature that all iOS 8 users should at least consider.

By Ryan Faas | 22 September, 2014 20:32

Tags: Apple, security, Access control and authentication, health care, industry verticals, Apple iOS

‘Can everyone hear me now?'

Mobile threats have been with us for some time. Most organizations have done a fair job of protecting their important proprietary information, securing emails, encrypting on-board data and using mobile management tools to suppress data loss. All that has made a safer mobile world for many organizations, but certainly not foolproof.

By By Jack Gold | 09 September, 2014 22:31

Tags: data security, consumer electronics, security, smartphones, data protection

Encrypted data in the cloud? Be sure to control your own keys

This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe.

By Linda Musthaler | 05 September, 2014 23:45

Tags: security, cloud security, encryption

The Fappening: iCloud users, beware!

The event dubbed by the internet as "the Fappening" is the largest celebrity nude photo leak in history. Although information is still emerging as to how, why and who is at fault, don't blame Apple for this latest security disaster. Celebrity nudes are not new; I am sure that everyone remembers the controversy surrounding Paris Hilton -- and Pamela Anderson before her. What makes this different is how these photos were taken. The celebrities involved were quick to respond to the news in a variety of intriguing ways, including the following tweet from Mary E. Winstead:

By Alex Burinskiy | 05 September, 2014 05:44

Tags: Apple, Instagram, security, cloud security, internet, cloud computing, Hilton

How to avoid 10 common Active Directory mistakes

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

By Rod Simmons | 27 August, 2014 05:45

Tags: Active Directory, security, Access control and authentication, application security

The trouble with trolls (and how to beat them)

A vulnerable person. A sociopath or two on social media tormenting that person without consequence. That's trolling in a nutshell.

By Mike Elgan | 16 August, 2014 21:22

Tags: Internet-based applications and services, consumer electronics, security, twitter, internet, social media, Personal Technology, privacy

Security Manager's Journal: Peering behind the firewall

The corporate firewall is like a dike keeping out a raging sea of malware. Where does it all come from?

By J.F. Rice | 11 August, 2014 23:36

Tags: security, Malware and Vulnerabilities

OkCupid -- it's not me, its you

Remember the controversy over Facebook's social experimentation, which showed how people's emotions could be toyed with by changing what they see online? Well, Facebook wasn't the only site playing with your heart. Dating site OkCupid has now acknowledged doing much the same thing. The mostly free dating service is being very open about how it manipulated members' online dating lives and offers a detailed explanation that amounts to a version of "Hey, everybody's doing it."

By Alex Burinskiy | 06 August, 2014 01:35

Tags: security, OKCupid, internet, privacy

Security Manager's Journal: A ransomware flop, thanks to security awareness

People like to ask the security manager, "What keeps you up at night?" My usual answer: "Employees." And there's good reason. About 95% of the security incidents my department responds to are a result of an employee doing the wrong thing, whether it's clicking on an evil link within an email, installing a malicious program or sending a sensitive document outside the company.

By Mathias Thurman | 31 July, 2014 23:25

Tags: security

Evan Schuman: The data dangers of free public Wi-Fi

New York's plan to turn pay phones into free Wi-Fi stations could be a template for other cities, and bad news for IT departments trying to protect corporate data and intellectual property.

By Evan Schuman | 29 July, 2014 23:04

Tags: management, wireless networking, network security, Google, security, Networking, wireless

The hidden dangers of "good enough" authentication

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

By By David Hald, co-founder and chief relation officer, SMS PASSCODE | 26 July, 2014 06:11

Tags: security, Multi-factor authentication, mobile security, Volkswagen

Solidifying Microsoft Azure Security for SharePoint and SQL in the Cloud

More and more organizations are moving SharePoint and SQL workloads into Microsoft Azure in the cloud because of the simplicity of spinning up servers in the cloud, adding more capacity, decreasing capacity without having to BUY servers on-premise. What used to cost organizations $20,000, $50,000, or more in purchasing servers, storage, network bandwidth, replica disaster recovery sites, etc and delay SharePoint and SQL rollouts by weeks or month is now completely managed by spinning up virtual machines up in Azure and customizing and configuring systems in the Cloud.

By Rand Morimoto | 23 July, 2014 08:14

Tags: Microsoft Subnet, security, Microsoft, internet, cloud computing

Top Whitepapers

Twitter Feed

Featured Whitepapers