Privacy
Sustaining Video Collaboration Through End-to-End Encryption
October 21, 2020 Added by:Michael Armer
By infusing end-to-end encryption into any video strategy, it ensures not only the sustainability of the channel, but the businesses that rely on it.
Comments (0)
Expect Behavioral Analytics to Trigger a Consumer Backlash
August 10, 2020 Added by:Steve Durbin
The deployment of cameras, sensors and applications in public and private places for behavioral analytics will be followed by consumer and regulatory backlash.
Comments (0)
When Data Is Currency, Who’s Responsible for Its Security?
February 11, 2020 Added by:Jason Bevis
With recent security incidents, we've caught a glimpse of the role that data enrichment, aggregators and brokers play in security. What type of responsibility do these parties bear in protecting consumer data and privacy?
Comments (0)
Gaining Control of Security and Privacy to Protect IoT Data
April 24, 2019 Added by:Mike Nelson
It’s a matter of who is in control of our data. Today, IoT device manufacturers and businesses are in control. In the future, we must be in control of our own information.
Comments (0)
"Can you Hear Me Now?” - Security Professionals Warn about Who May Be Listening
June 27, 2018 Added by:Jeannie Warner
In light of the recent move by Verizon to stop sharing location data with third parties, companies need to rethink strategies for data gathering from users.
Comments (0)
GDPR Is Coming. Is Your Organization Ready?
May 01, 2018 Added by:Mark Baldwin
The General Data Protection Regulation (GDPR) that goes into effect on May 25 affects any business that processes information of any EU citizen, regardless of whether the business is located in or has operations in the EU.
Comments (0)
Increasing Importance of Mobile Makes Malware a Priority
January 17, 2018 Added by:Asma Zubair
Businesses should fortify their high value apps with additional security precautions from the inside out.
Comments (0)
The 5 Motives of Ransomware
January 04, 2018 Added by:Joseph Carson
Who would have foreseen the impact of both WannaCry and NotPetya
Comments (0)
Follow the Money — Stemming Hacker Habits
June 30, 2017 Added by:Steve McGregory
Cybercriminals aren’t stopping anytime soon. Ensure you have a finger on the pulse of your network or be ready to become another notch on a hacker’s belt.
Comments (0)
Ask a Security Pro: Encryption Explained
April 13, 2017 Added by:Logan Kipp
Modern encryption has become an arms race between brilliant mathematicians and their computers, and hackers and theirs.
Comments (0)
FriendFinder Breach Highlights the Need for Better Practice in Password Security
January 31, 2017 Added by:Donato Capitella
The FriendFinder Network breach is a perfect example of how poor password storage can exacerbate the impact of a breach and expose accounts to further exploitation.
Comments (0)
Differential Privacy vs. End-to-end Encryption – It’s Privacy vs. Privacy!
October 12, 2016 Added by:Vanishree Rao
While differential privacy is a promising tool, implementing and deploying it while retaining the privacy of end-to-end encryption is challenging.
Comments (0)
One Encryption Backdoor Is One Too Many
August 11, 2016 Added by:Joe Levy
Although the FBI no longer needs to force Apple to unlock an iPhone that belonged to one of the San Bernardino terrorists, the debate must continue. Strong encryption that cannot be exploited by external or internal actors is a must for any organization.
Comments (0)
Cloud Security Can’t Be Ignored Anymore, Thanks to Millennials
May 09, 2016 Added by:Vanishree Rao
Thanks to digital preferences of millennials, increased digitization and cloudification will drive the demand for cloud security products and services.
Comments (0)
End-to-end Encryption, Today -- Loophole Closed or Moved?
April 22, 2016 Added by:Vanishree Rao
End-to-end encryption does not solve the problem, despite the common perception that it is the holy grail of instant-messaging security. It is necessary that service providers shift their attention toward non-traditional key-derivation mechanisms to close the loophole.
Comments (0)
Cloud Email Applications Could Put Your Corporate Data at Risk
April 12, 2016 Added by:Yotam Gutman
Third party email cloud application could expose the organizations data since employees now have the ability to grant applications access to their corporate information
Comments (0)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider