Items Tagged with "Social Media"


7fef78c47060974e0b8392e305f0daf0

Social Media Monitoring: A Rubric for Control

February 21, 2012 Added by:Infosec Island Admin

We have become a watched commodity via all means of communication. Programs have been put together with the veneer of protecting us from another 9/11 and perhaps some of them were made with the best of intentions, but this idea of monitoring social media is half baked...

Comments  (2)

A7290c5bd7bc2aaa7ea2b6c957ef639b

NLRB Issued Second Report on Social Media Enforcement

February 17, 2012 Added by:David Navetta

As we have previously noted in prior posts about the NLRB’s social media enforcement actions, employers should carefully review and adjust their social media policies and practices in light of the NLRB’s guidance and enforcement...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Twitter Finally Enables HTTPS as a Default Setting

February 14, 2012 Added by:Headlines

Among other security benefits, the HTTPS feature will prevent users from having their login credentials stolen by attackers who may attempt to harvest passwords when users access their accounts over unencrypted Wi-Fi networks...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Syrian Drama and the Impact on Cyberspace

February 07, 2012 Added by:Pierluigi Paganini

Cyberspace is comparable to a stormy sea in which you navigate by sight, and where the scenarios are changing rapidly in an unpredictable way by the presence of uncontrolled entities such as cyber hacktivists, in addition to cyber armies set up by the main world powers...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Legal Implications of Social Networking Part 3: Data Security

January 31, 2012 Added by:David Navetta

Technology exists for monitoring and tracking of social media usage by employees. Ultimately however, like social media itself, it comes down to people - risk can only be addressed appropriately if the individuals using social media are equipped to identify and mitigate against it...

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

IT Security Issues for 2012

January 27, 2012 Added by:Simon Heron

The pace of technological innovation is getting faster. At the same time, the work place is changing significantly, driven by organizations’ need to be more competitive and efficient. These two factors mean that there is a lot of change on the horizon for 2012...

Comments  (0)

B09c361cbdc6cf629affdc7db30a186d

Social Business Trends for 2012

January 26, 2012 Added by:Steven Fox, CISSP, QSA

The use of social media by merchants could be targeted by hacktivists with a social agenda or by hackers with financial goals. If hackers aligned themselves with protesters, they could launch social media campaigns designed to influence the perception of a business...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

E-Meme: The Next Generation of Thought Crime Detection?

January 25, 2012 Added by:Infosec Island Admin

An Orwellian software development project that the Navy has invested in called “E-MEME” will be able to sift through the internet for ideas and meme’s to analyze them for predictive behavior assessment. Predictive behavioral analysis via meme’s... Whatever could go wrong?

Comments  (6)

69dafe8b58066478aea48f3d0f384820

Aaron Barr Terminated for Obsession with Anonymous

January 23, 2012 Added by:Headlines

"When I hired Aaron about eight months ago, it was under the perception that we were going to be able to help the NSA with some things relating to national security, not with Anonymous and social groups," John Sayres, the company's founder said...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

WOMMA Releases Social Media Marketing Privacy Guidelines

January 19, 2012 Added by:Headlines

WOMMA applauds the FTC's efforts at making transparency a key point. While it is not yet clear what effect these developments have had on the online marketing industry - we appreciate the agency's efforts to allow industry leaders to develop self-regulatory initiatives...

Comments  (0)

D551093f5d8af724e17929c91eb90d63

Social Business Security and Risk Management Strategies

January 18, 2012 Added by:Andrea Zapparoli Manzoni

This is not something that the Marketing Department can handle alone, nor IT, not even the Security Team the Legal Department: all will fail if given the task of managing an organization's Social Business Strategy outside a multidisciplinary and truly integrated approach...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Seven Emerging Security Trends from 2011

December 15, 2011 Added by:Headlines

Issues gaining attention over the past year include the weakening of the digital certificate authorities, surges in malware targeting mobile devices, designer malware, and the rash of corporate network breaches - be they by hacktivists, nation-state supported hackers, or criminal syndicates...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Cyber Crime Creates More Victims Per Hour than Babies Born

December 10, 2011 Added by:Kelly Colgan

As more shoppers turn to their laptop, iPads and mobile phones to get items crossed off their list, thieves are on the prowl to hack into systems to obtain customer information – email addresses, passwords, credit card data, PayPal account info, etc...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Network Security in the Age of Social Media

December 08, 2011 Added by:Ben Rothke

Social media is now mainstream in corporate America, and the security and privacy issues around it are hot. In the past, many firms simply said no to social media at the corporate level. But that will no longer work, as social media isn’t a choice anymore, it’s a business transformation tool...

Comments  (0)

37d5f81e2277051bc17116221040d51c

How to Recover a Hacked Facebook Account

December 02, 2011 Added by:Robert Siciliano

At least weekly some stressed out victim of a Facebook hack a.k.a “account takeover”, contacts me to help them get their account back in order. While I do have a connection or two at Facebook, the victim of the hack is in the best position to fix it themselves...

Comments  (0)

C6b9a422851928980389afe33c48e213

Social Media and Security in the Enterprise

November 14, 2011 Added by:Eric Cissorsky

The goal of this article is not to disparage social media. It is to have organizations review their policies with the purpose of aligning them with their mission, vision and business culture. The best way is through an informed, clearly communicated and enforced acceptable use policy...

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »