Blog Posts Tagged with "Data"


All Data is Security Data: A Shift in Thinking

August 30, 2018 Added by:Chris Jordan

Reviewing the data used in security operations shows that all data, not just security logs, are needed to operate efficiently.

Comments  (0)


Law Of First Digits and How It Might Lead To More Trust

May 03, 2012 Added by:Alan Woodward

It might be as simple as whether an image has been altered to whether large data sets should be used to make a critical business decision. Benford's law and its generalized forms can help us decide whether or not we can trust some electronic data we may be about to rely upon...

Comments  (0)


Open, Closed, 1984 and the Evil Empire

March 22, 2012 Added by:Ben Kepes

I’m buoyed by the very existence of open API – technology that forces data interchange to become real. Sure there are ways vendors manipulate what should be open to achieve their aims, but the API is our equivalent of Excalibur – it has the ability to deliver us from evil...

Comments  (0)


Shopper Trust and the Zappos Ordeal

January 23, 2012 Added by:Bill Mathews

Often merchants just sell your information outright to make revenue off the data they’ve collected. Usually this is reserved for more nefarious merchants, and sometimes it is done out of ignorance of their own policies. But make no mistake – it DOES happen...

Comments  (0)


Companies Providing Data Under Threat of Prosecution

July 27, 2011 Added by:Marjorie Morgan

An effort is underway to compel thousands of companies to provide proprietary data under the Defense Production Act (DPA) or face fines and criminal prosecution. While use of the DPA has ample precedent, this seems to go well beyond its intended purposes...

Comments  (0)


The Importance of Data Collection in Risk Assessments

June 02, 2011 Added by:Danny Lieberman

Many times we feel secure but are not, or don’t feel secure when we really are. A company may feel secure behind a well-maintained firewall but if employees are bringing smart phones and flash drives to work, this is an attack vector which may result in a high level of risk...

Comments  (0)


Data Privacy: Don't Hand Over the Keys to Your Kingdom

May 26, 2011 Added by:Lindsay Walker

While internal breaches remain a high risk, 57% of the C-level respondents in the survey felt that that next one to three years will see external threats, such as cyber-criminals, being a greater security risk than threats from with the organization...

Comments  (0)


Payment Card Industry Data Security Standards Overview

March 17, 2011 Added by:Jon Stout

In a nutshell, the PCI DSS requires companies to build and maintain a secure network. The purpose of the PCI DSS is not only to reduce the amount of payment card fraud and identity theft, but also the costs of mitigating the institutional risks associated with those activities...

Comments  (2)


Class-Action Lawsuit Alleges Data Privacy Violations

March 14, 2011 Added by:David Navetta

Privacy-related lawsuits are on the rise, and this time is the target. On March 2, 2011, two named plaintiffs filed a class-action lawsuit alleging that Amazon circumvents browser privacy settings to collect users’ personal information without permission and shares the information with third parties...

Comments  (0)


SMBs, the Cloud and Disaster Recovery

March 09, 2011 Added by:Ben Kepes

Despite organizations identifying recovery time as a critical aspect of DR, and despite them estimating the cost of extended downtime at a very high rate, only 55% of respondents actually have any faith that their data will be completely restored within hours of an outage...

Comments  (0)


California Supreme Court Says Zip Codes are PII

February 24, 2011 Added by:David Navetta

Thinking hard about how business and consumer interests can be harmonized by effective and privacy/security-friendly policies and practices? We thought so. Worried that zip codes might be treated as personal information in this country? Probably not. All that may be changing...

Comments  (1)


Research Roundup: Rootin’ Through the Data

February 17, 2011 Added by:Mike Meikle

One of the biggest problems we face as security professionals is information overload. Our inboxes look like the warehouse from Raiders of the Lost Ark, Twitter releases a fire hose of information in our faces and then we have a stack of print publications teetering in the corner...

Comments  (0)


Applying Predictive Modeling Techniques to Information Security

February 13, 2011 Added by:Fred Williams

By using a modeling framework, modelers can apply techniques in an iterative fashion similar to software engineering. This enables the modelers to share models, evaluate models for effectiveness and determine if model results are accurate...

Comments  (5)