Security

Security | News, how-tos, features, reviews, and videos

USA / United States of America / American flag

It’s time for a uniform national privacy law

In light of new laws from Europe and California privacy needs to be on the Congressional agenda.

8 authentication basics password identity protected security

Sheltered Harbor ensures cyber resilience for financial services firms

After the infamous Sony Pictures hack in 2014, the financial services industry came together to develop Sheltered Harbor to ensure customer financial data would remain secure and accessible in the event of a cyberattack.

data analytics - statistical analysis - charts, graphs, strategy planning

Sprint calls on open source analytics to prevent cyberfraud

Sprint’s open source Elastic Stack analytics implementation helped the mobile device and network provider reduce mobile phone fraud by 90 percent.

hacker

Online manipulation is the latest data protection debate

The furor over “dark patterns” reveals the limits of consumer control as the primary tool of data protection.

credit card

Ohio v. American Express is sensible antitrust policy

Supreme Court’s Ohio v. American Express decision is more sensible in how it handles antitrust policy than some realize.

lock, chain, blocks and binary code

How blockchain is impacting information security in companies

Blockchain has the ability to impact and disrupt multiple business sectors; and as hacking, phishing and security threats are becoming more prominent, companies are turning to groundbreaking technologies to protect not only their...

security breach egg reveal locks binary code hacked

CIOs reveal their security philosophies

Global IT leaders describe their approaches to cybersecurity application and communication.

Facade of government court building

The challenges and perils of intermediary liability

Companies generate controversy when they don’t moderate content – but even when they do.

lawsuit judge law court decision sued

A new patent myth in Washington

A flawed study prompts developments in Congress and the Patent and Trademark Office that threaten progress made against trolls.

privacy

When it comes to GDPR, are CIOs finally ready?

GDPR is a significant change for all organizations. The question is how prepared are organizations to respond of all of its edicts?

hollywood los angeles california usa dv376007

Challenges and opportunities in California’s new privacy law

Despite its democratic deficit, California’s new regulations create an opening to get U.S. national privacy policy right.

penny pritzker vera jourova privacy shield

EU lawmakers threaten businesses relying on Privacy Shield

A vote by European Union lawmakers seeking to suspend Privacy Shield could spell bad news for businesses that have built their GDPR compliance strategy on adherence to the EU-U.S. data transfer agreement’s principles.

mobile device management

Open source mobile operating systems need to control fragmentation

The history of failed operating systems has a lesson for today’s competition policy regulators.

Mark Hopkins

Cyber attacks are here today

Sponsored by Centrify -- Mark Hopkins, Information Security Operations Manager, YapStone, discusses the immediate nature of cyber attacks and how a Zero Trust Security model assists his organization with reducing risk.

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

$660,000 data privacy fine highlights dangers for businesses dabbling in politics

A year into an investigation into the use of data analytics in political campaigns, the U.K.’s privacy watchdog is hitting companies that shared data with political parties with sanctions including a criminal prosecution and a...

flextronics

Flex strengthens supply chain with IAM

An identity and access management solution helps the technology company provision and deprovision identities for thousands of employees and supply chain partners, allowing CIO Gus Shahin to move on to more strategic efforts, including...

Abhilasha Bhargav-Spantzel

Why don’t password policies work?

Sponsored by Centrify -- Abhilasha Bhargav-Spantzel, Principal Engineer, Intel, explains why password policies are often ineffective in securing access.

Bill Mann and Garrett Grajek

Why hackers love to target access credentials

Sponsored by Centrify -- Garret Grajek, CISSP, VP, Identity, Cylance and Bill Mann, SVP, Products & Chief Product Officer, Centrify, dig into the most common reason for data breaches and why it’s time to approach identity and access...

salted hash thumbnail final
video

The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34

In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.

Tom Kemp

Security budgets are up, but breaches are too

Sponsored by Centrify -- Tom Kemp, CEO of Cetrify, explains why traditional approaches to access management and security have failed, and why enterprises need to embrace a Zero Trust Security model.

Load More