Security Experts:

Privacy & Compliance
long dotted

NEWS & INDUSTRY UPDATES

Researchers discovered that a Conexant audio driver shipped with many HP laptops acts as a keylogger [Read More]
RedLock emerges from stealth with cloud infrastructure security offering and $12 million in funding [Read More]
The FCC said its comment system was disrupted by DDoS attacks, not because too many net neutrality supporters accessed its website [Read More]
Risks posed by SS7 flaws are no longer just theoretical – cybercriminals exploited vulnerabilities to steal money from bank accounts [Read More]
GDPR will affect all EU-based companies, and all US companies that have any trade with the EU. [Read More]
Mozilla has been following the certificate-related debate between Symantec and Google, and it largely agrees with the latter [Read More]
Researchers discovered several vulnerabilities in Evoko meeting room management devices [Read More]
Researchers claim to have found serious flaws in the nomx email security device. Vendor disputes findings [Read More]
WikiLeaks released details on CIA hacking tool designed to record audio via the built-in microphone of Samsung smart TVs [Read More]
The ambient light sensors found in phones, tablets and laptops can be abused to steal sensitive browser data, researchers warn [Read More]

FEATURES, INSIGHTS // Privacy & Compliance

rss icon

Torsten George's picture
The NIST Cybersecurity Framework is an important building block, but still just the first step towards implementing operationalized defenses against cyber security risks.
James McFarlin's picture
U.S tech giants are playing a game of high-stakes global brinksmanship around who has rights to control their data, which impacts their European growth prospects, business models, and ultimately stock valuations.
Marcus Ranum's picture
To communicate about our metrics, we need ways that we can ground our experience in terms of “normal” for us; Otherwise, we really can't communicate our metrics effectively with anyone who isn't in a similar environment.
Adam Firestone's picture
The misconception that Internet privacy equals anonymity must be dispelled if cyberspace is to be a secure and safe place. At the same time, mechanisms must be incorporated to ensure that communications remain confidential and resistant to unauthorized alteration by third parties.
Mark Hatton's picture
The oversight for the protection of healthcare information is only getting tighter, and it is incumbent upon the security teams to ensure healthcare professionals have all the tools necessary to improve patient outcomes, while we worry about keeping the bad guys away.
Tal Be'ery's picture
The Google-backed "Certificate Transparency" initiative has gained much momentum and may have a real chance to amend the battered Public-Key Infrastructure (PKI).
Nimmy Reichenberg's picture
With the release of PCI-DSS 3.0, organizations have a framework for payment security as part of their business-as-usual activities by introducing more flexibility, and an increased focus on education, awareness and security as a shared responsibility.
Mark Hatton's picture
Complacency is never a good thing, but in security it can have devastating effects. While it’s good to acknowledge progress, that should never stand in the way of staying ahead of the next potential threat.
Chris Coleman's picture
The events that occurred in 2013 will forever be reflected in the Internet DNA of the future, and how the cyber security market evolves to accommodate that future.
Chris Hinkley's picture
For security professionals, PCI DSS 3.0 means that PCI compliance will become more of an everyday business practice, rather than an annual checklist obligation.