Security Experts:

Privacy & Compliance
long dotted

NEWS & INDUSTRY UPDATES

Twitter sued the US government, claiming its free speech rights are being violated by restrictions on its ability to disclose numbers of secret orders to hand over user data.
The head of a company that develops and sells spying software for mobile devices has been indicted in the Eastern District of Virginia in what's said to be the first-ever criminal case involving the advertisement and sale of mobile spyware.
FBI director James Comey hit out at Apple and Google over new data-security measures designed to reassure customers wary of government prying.
Google said Thursday it would beef up encryption of its mobile operating system, so that it would not hold "keys" to devices even if it is served with a warrant.
Apple is rolling out new privacy protections for iPhones and iPads, with a new system that makes it impossible for the company to unlock a device even with a warrant.
A media rights group urged Qatar to revoke sections of a new cybercrime law, saying they threaten freedom of expression in the Gulf state.
Demands for data on Google users have gone up dramatically during the past five years.
WikiLeaks today released new information on FinFisher, and a list of countries that have acquired licenses for the controversial suite of IT surveillance software.
Chinese authorities have started intercepting encrypted traffic to and from Google's servers, in an apparent man-in-the-middle (MitM) attack against the encrypted traffic between CERNET and Google.
Apple is ramping up iCloud defenses in the aftermath of hackers swiping nude photos of celebrities from the online digital vault, the Wall Street Journal reported.

FEATURES, INSIGHTS // Privacy & Compliance

rss icon

Adam Firestone's picture
The misconception that Internet privacy equals anonymity must be dispelled if cyberspace is to be a secure and safe place. At the same time, mechanisms must be incorporated to ensure that communications remain confidential and resistant to unauthorized alteration by third parties.
Mark Hatton's picture
The oversight for the protection of healthcare information is only getting tighter, and it is incumbent upon the security teams to ensure healthcare professionals have all the tools necessary to improve patient outcomes, while we worry about keeping the bad guys away.
Torsten George's picture
The NIST Cybersecurity Framework is a good first step towards creating a standardized approach to cyber security, but requires many substantial updates before really improving our nation’s cyber resilience.
Tal Be'ery's picture
The Google-backed "Certificate Transparency" initiative has gained much momentum and may have a real chance to amend the battered Public-Key Infrastructure (PKI).
Nimmy Reichenberg's picture
With the release of PCI-DSS 3.0, organizations have a framework for payment security as part of their business-as-usual activities by introducing more flexibility, and an increased focus on education, awareness and security as a shared responsibility.
Mark Hatton's picture
Complacency is never a good thing, but in security it can have devastating effects. While it’s good to acknowledge progress, that should never stand in the way of staying ahead of the next potential threat.
Chris Coleman's picture
The events that occurred in 2013 will forever be reflected in the Internet DNA of the future, and how the cyber security market evolves to accommodate that future.
Chris Hinkley's picture
For security professionals, PCI DSS 3.0 means that PCI compliance will become more of an everyday business practice, rather than an annual checklist obligation.
Gant Redmon's picture
Proper use of Google Glass respecting law and privacy will be all about context. Context is different depending where you are. Are you in a public place, a private place, or a restricted place like a government installation?
Ram Mohan's picture
There is a lot we can do to keep our data private and, like many aspects of managing security, it’s a process that is best grounded in common sense. What can organizations do to shield themselves from the kind of scrutiny that has caught the world’s attention recently?