The uproar over Google's latest privacy policy is much ado about nothing, especially the cry from some in Congress that the Internet company won't allow users to opt out of its new policy.
Imagine if the shutdown of Wikipedia was involuntary, taken down by politically minded hackers, and not an intentional act of protest. What's the message of the blackout beyond the protest over anti-piracy legislation?
Bringing Your Own Device raises jitters among employers, who worry about exposing or losing sensitive data, and employees, who fret about their bosses spying on them. Despite these anxieties, the trend will continue because that's what people want.
Cybersecurity Coordinator Howard Schmidt recognizes the need to battle online piracy to protect U.S. intellectual property but contends legislation before Congress to do just that would unacceptably curtail Internet freedom and increase cybersecurity risks.
Steven VanRoekel says the mobile revolution will fundamentally change the way the federal government serves the public and its employees. But in outlining the Federal Mobile Strategy, the federal CIO hardly mentions security and privacy.
As we close out one year and begin another, we look back at IT security lessons that emerged over the past 12 months. Here are five that should resonate in the coming year.
What's really scary, beyond the obvious, is the risk this hidden software poses to organizations trying to protect the security of their data and the privacy of their employees.
IEEE sees 2012 as a disruptive year of widespread mobile-device intrusions as a growing number of smartphones - now 20 percent of the market - make them an attractive target for hackers.
A wave of security breaches serves as a catalyst for all types of organizations to assess the need for cyber insurance. Here's the story of one institution that saw the threat and took out a $10 million policy.
The bust of six Estonians for one of the biggest online frauds ever is reminiscent of another type of organized crime: drugs. Despite the similarities, there's one big difference between drugs and online crimes.
Today ends National Cybersecurity Month, and one thing is clear: cybersecurity awareness does not equate secure cyber. "The market still doesn't appreciate how much good cybersecurity is worth," Rep. Jim Langevin says.
New research from Carnegie Mellon University's Software Engineering Institute provides further evidence why IT security isn't just the problem of an enterprise's security organization but of its top non-IT leadership as well.
Facial recognition, arguably, is the technology that most threatens individual privacy online, and that's on the mind of Senate Commerce Committee Chairman Jay Rockefeller, who has asked the FTC to report on its growing use.
Don't be too fast to blame Research In Motion for the disruption in BlackBerry service if your organization suffered from the lack of e-mail exchanges. It could be partly your fault, too, says noted infosec lawyer Francoise Gilbert.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.