Items Tagged with "Social Media"


Social Media Monitoring: A Rubric for Control

February 21, 2012 Added by:Infosec Island Admin

We have become a watched commodity via all means of communication. Programs have been put together with the veneer of protecting us from another 9/11 and perhaps some of them were made with the best of intentions, but this idea of monitoring social media is half baked...

Comments  (2)


NLRB Issued Second Report on Social Media Enforcement

February 17, 2012 Added by:David Navetta

As we have previously noted in prior posts about the NLRB’s social media enforcement actions, employers should carefully review and adjust their social media policies and practices in light of the NLRB’s guidance and enforcement...

Comments  (0)


Twitter Finally Enables HTTPS as a Default Setting

February 14, 2012 Added by:Headlines

Among other security benefits, the HTTPS feature will prevent users from having their login credentials stolen by attackers who may attempt to harvest passwords when users access their accounts over unencrypted Wi-Fi networks...

Comments  (0)


Syrian Drama and the Impact on Cyberspace

February 07, 2012 Added by:Pierluigi Paganini

Cyberspace is comparable to a stormy sea in which you navigate by sight, and where the scenarios are changing rapidly in an unpredictable way by the presence of uncontrolled entities such as cyber hacktivists, in addition to cyber armies set up by the main world powers...

Comments  (0)


Legal Implications of Social Networking Part 3: Data Security

January 31, 2012 Added by:David Navetta

Technology exists for monitoring and tracking of social media usage by employees. Ultimately however, like social media itself, it comes down to people - risk can only be addressed appropriately if the individuals using social media are equipped to identify and mitigate against it...

Comments  (0)


IT Security Issues for 2012

January 27, 2012 Added by:Simon Heron

The pace of technological innovation is getting faster. At the same time, the work place is changing significantly, driven by organizations’ need to be more competitive and efficient. These two factors mean that there is a lot of change on the horizon for 2012...

Comments  (0)


Social Business Trends for 2012

January 26, 2012 Added by:Steven Fox, CISSP, QSA

The use of social media by merchants could be targeted by hacktivists with a social agenda or by hackers with financial goals. If hackers aligned themselves with protesters, they could launch social media campaigns designed to influence the perception of a business...

Comments  (0)


E-Meme: The Next Generation of Thought Crime Detection?

January 25, 2012 Added by:Infosec Island Admin

An Orwellian software development project that the Navy has invested in called “E-MEME” will be able to sift through the internet for ideas and meme’s to analyze them for predictive behavior assessment. Predictive behavioral analysis via meme’s... Whatever could go wrong?

Comments  (6)


Aaron Barr Terminated for Obsession with Anonymous

January 23, 2012 Added by:Headlines

"When I hired Aaron about eight months ago, it was under the perception that we were going to be able to help the NSA with some things relating to national security, not with Anonymous and social groups," John Sayres, the company's founder said...

Comments  (2)


WOMMA Releases Social Media Marketing Privacy Guidelines

January 19, 2012 Added by:Headlines

WOMMA applauds the FTC's efforts at making transparency a key point. While it is not yet clear what effect these developments have had on the online marketing industry - we appreciate the agency's efforts to allow industry leaders to develop self-regulatory initiatives...

Comments  (0)


Social Business Security and Risk Management Strategies

January 18, 2012 Added by:Andrea Zapparoli Manzoni

This is not something that the Marketing Department can handle alone, nor IT, not even the Security Team the Legal Department: all will fail if given the task of managing an organization's Social Business Strategy outside a multidisciplinary and truly integrated approach...

Comments  (0)


Top Seven Emerging Security Trends from 2011

December 15, 2011 Added by:Headlines

Issues gaining attention over the past year include the weakening of the digital certificate authorities, surges in malware targeting mobile devices, designer malware, and the rash of corporate network breaches - be they by hacktivists, nation-state supported hackers, or criminal syndicates...

Comments  (0)


Cyber Crime Creates More Victims Per Hour than Babies Born

December 10, 2011 Added by:Kelly Colgan

As more shoppers turn to their laptop, iPads and mobile phones to get items crossed off their list, thieves are on the prowl to hack into systems to obtain customer information – email addresses, passwords, credit card data, PayPal account info, etc...

Comments  (0)


Network Security in the Age of Social Media

December 08, 2011 Added by:Ben Rothke

Social media is now mainstream in corporate America, and the security and privacy issues around it are hot. In the past, many firms simply said no to social media at the corporate level. But that will no longer work, as social media isn’t a choice anymore, it’s a business transformation tool...

Comments  (0)


How to Recover a Hacked Facebook Account

December 02, 2011 Added by:Robert Siciliano

At least weekly some stressed out victim of a Facebook hack a.k.a “account takeover”, contacts me to help them get their account back in order. While I do have a connection or two at Facebook, the victim of the hack is in the best position to fix it themselves...

Comments  (0)


Social Media and Security in the Enterprise

November 14, 2011 Added by:Eric Cissorsky

The goal of this article is not to disparage social media. It is to have organizations review their policies with the purpose of aligning them with their mission, vision and business culture. The best way is through an informed, clearly communicated and enforced acceptable use policy...

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »