Security

Security | News, how-tos, features, reviews, and videos

lawsuit judge law court decision sued

A new patent myth in Washington

A flawed study prompts developments in Congress and the Patent and Trademark Office that threaten progress made against trolls.

privacy

When it comes to GDPR, are CIOs finally ready?

GDPR is a significant change for all organizations. The question is how prepared are organizations to respond of all of its edicts?

hollywood los angeles california usa dv376007

Challenges and opportunities in California’s new privacy law

Despite its democratic deficit, California’s new regulations create an opening to get U.S. national privacy policy right.

penny pritzker vera jourova privacy shield

EU lawmakers threaten businesses relying on Privacy Shield

A vote by European Union lawmakers seeking to suspend Privacy Shield could spell bad news for businesses that have built their GDPR compliance strategy on adherence to the EU-U.S. data transfer agreement’s principles.

mobile device management

Open source mobile operating systems need to control fragmentation

The history of failed operating systems has a lesson for today’s competition policy regulators.

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

$660,000 data privacy fine highlights dangers for businesses dabbling in politics

A year into an investigation into the use of data analytics in political campaigns, the U.K.’s privacy watchdog is hitting companies that shared data with political parties with sanctions including a criminal prosecution and a...

flextronics

Flex strengthens supply chain with IAM

An identity and access management solution helps the technology company provision and deprovision identities for thousands of employees and supply chain partners, allowing CIO Gus Shahin to move on to more strategic efforts, including...

Abhilasha Bhargav-Spantzel

Why don’t password policies work?

Sponsored by Centrify -- Abhilasha Bhargav-Spantzel, Principal Engineer, Intel, explains why password policies are often ineffective in securing access.

Bill Mann and Garrett Grajek

Why hackers love to target access credentials

Sponsored by Centrify -- Garret Grajek, CISSP, VP, Identity, Cylance and Bill Mann, SVP, Products & Chief Product Officer, Centrify, dig into the most common reason for data breaches and why it’s time to approach identity and access...

salted hash thumbnail final
video

The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34

In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.

Tom Kemp

Security budgets are up, but breaches are too

Sponsored by Centrify -- Tom Kemp, CEO of Cetrify, explains why traditional approaches to access management and security have failed, and why enterprises need to embrace a Zero Trust Security model.

Chase Cunningham and John Kindervag

Why technology alone can’t reduce risk

Sponsored by Centrify -- John Kindervag, Zero Trust founder and former analyst at Forrester Research, and Dr. Chase Cunningham, Principal Analyst, Forrester Research, discuss why investing in new technology for security will not...

GDPR, legal, European Union

The GDPR and the effect on US ad tech

The GDPR has been in effect since May 25. Discover the impact this new legislation has had on the U.S. ad tech industry and what it means for the future of targeted online marketing and marketing automation.

government cios without authority washington columns executives

Open government data is essential, but policies should not discourage public-private data partnerships

Policymakers must craft sensible policies to ensure the public and private sectors can continue collaborating for the benefit of government and its citizens.

risk assessment - safety analysis - security audit

Workday transforms risk management into strategic advantage

Workday's home-grown risk management tool offers a strategic boost by facilitating communication between security teams and business leadership.

template c100.00 09 23 04.still001
video

Getting hands-on with industrial control system setups at RSA | Salted Hash Ep 31

Host Steve Ragan is joined on the RSA 2018 show floor by Bryson Bort, CEO and founder of SCYTHE, to talk about the ICS Village, where attendees can learn how to better defend industrial equipment through hands-on access to the...

icann whois

ICANN’s Whois service faces GDPR compliance challenges

Legal uncertainties shutter previously accessible databases used to identify fraudsters, criminals, thieves and hackers.

template c100.00 08 17 21.still001
video

How the Spanish cybercriminal underground operates | Salted Hash Ep 30

Host Steve Ragan reports from the RSA 2018 conference, talking with Liv Rowley, an intelligence analyst at Flashpoint, about Spanish cybercrime, an underground community that poses persistent security risks.

gdpr

GDPR is a missed opportunity for real privacy protection

Doubling down on individual control makes GDPR an expensive nuisance for enterprises while failing to protect consumers against likely data harms.

template c100.00 00 52 07.still001
video

Learn what the 'zero trust' security model really means | Salted Hash Ep 29

Host Steve Ragan reports from RSA 2018 conference, talking with Wendy Nather, director, advisory CISOs at Duo Security, about how organizations can build a zero trust model, including consistently authenticating users.

Load More