Blog Posts Tagged with "Data"

3013a8d01542d3101f0a905ab013f00a

All Data is Security Data: A Shift in Thinking

August 30, 2018 Added by:Chris Jordan

Reviewing the data used in security operations shows that all data, not just security logs, are needed to operate efficiently.

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

Law Of First Digits and How It Might Lead To More Trust

May 03, 2012 Added by:Alan Woodward

It might be as simple as whether an image has been altered to whether large data sets should be used to make a critical business decision. Benford's law and its generalized forms can help us decide whether or not we can trust some electronic data we may be about to rely upon...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Open, Closed, 1984 and the Evil Empire

March 22, 2012 Added by:Ben Kepes

I’m buoyed by the very existence of open API – technology that forces data interchange to become real. Sure there are ways vendors manipulate what should be open to achieve their aims, but the API is our equivalent of Excalibur – it has the ability to deliver us from evil...

Comments  (0)

D03c28fd5a80c394905c980ee1ecdc88

Shopper Trust and the Zappos Ordeal

January 23, 2012 Added by:Bill Mathews

Often merchants just sell your information outright to make revenue off the data they’ve collected. Usually this is reserved for more nefarious merchants, and sometimes it is done out of ignorance of their own policies. But make no mistake – it DOES happen...

Comments  (0)

509ea0c1f4a210534eb004d35c10aa2d

Companies Providing Data Under Threat of Prosecution

July 27, 2011 Added by:Marjorie Morgan

An effort is underway to compel thousands of companies to provide proprietary data under the Defense Production Act (DPA) or face fines and criminal prosecution. While use of the DPA has ample precedent, this seems to go well beyond its intended purposes...

Comments  (0)

959779642e6e758563e80b5d83150a9f

The Importance of Data Collection in Risk Assessments

June 02, 2011 Added by:Danny Lieberman

Many times we feel secure but are not, or don’t feel secure when we really are. A company may feel secure behind a well-maintained firewall but if employees are bringing smart phones and flash drives to work, this is an attack vector which may result in a high level of risk...

Comments  (0)

0c4ca84ec3f3f2d57194f8e0cbd5ba85

Data Privacy: Don't Hand Over the Keys to Your Kingdom

May 26, 2011 Added by:Lindsay Walker

While internal breaches remain a high risk, 57% of the C-level respondents in the survey felt that that next one to three years will see external threats, such as cyber-criminals, being a greater security risk than threats from with the organization...

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Payment Card Industry Data Security Standards Overview

March 17, 2011 Added by:Jon Stout

In a nutshell, the PCI DSS requires companies to build and maintain a secure network. The purpose of the PCI DSS is not only to reduce the amount of payment card fraud and identity theft, but also the costs of mitigating the institutional risks associated with those activities...

Comments  (2)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Class-Action Lawsuit Alleges Data Privacy Violations

March 14, 2011 Added by:David Navetta

Privacy-related lawsuits are on the rise, and this time Amazon.com is the target. On March 2, 2011, two named plaintiffs filed a class-action lawsuit alleging that Amazon circumvents browser privacy settings to collect users’ personal information without permission and shares the information with third parties...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

SMBs, the Cloud and Disaster Recovery

March 09, 2011 Added by:Ben Kepes

Despite organizations identifying recovery time as a critical aspect of DR, and despite them estimating the cost of extended downtime at a very high rate, only 55% of respondents actually have any faith that their data will be completely restored within hours of an outage...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

California Supreme Court Says Zip Codes are PII

February 24, 2011 Added by:David Navetta

Thinking hard about how business and consumer interests can be harmonized by effective and privacy/security-friendly policies and practices? We thought so. Worried that zip codes might be treated as personal information in this country? Probably not. All that may be changing...

Comments  (1)

49afa3a1bba5280af6c4bf2fb5ea7669

Research Roundup: Rootin’ Through the Data

February 17, 2011 Added by:Mike Meikle

One of the biggest problems we face as security professionals is information overload. Our inboxes look like the warehouse from Raiders of the Lost Ark, Twitter releases a fire hose of information in our faces and then we have a stack of print publications teetering in the corner...

Comments  (0)

D5e39323dd0a7b8534af8a5043a05da2

Applying Predictive Modeling Techniques to Information Security

February 13, 2011 Added by:Fred Williams

By using a modeling framework, modelers can apply techniques in an iterative fashion similar to software engineering. This enables the modelers to share models, evaluate models for effectiveness and determine if model results are accurate...

Comments  (5)