Mastercard has a team working on an initiative aiming to ensure a more sustained security even beyond the letter of the PCI compliance requirements. [Read More]
The European Commission said Monday it had begun a "preliminary investigation" into how Facebook and Google collect personal data and what they do with it. [Read More]
The DHS’s Cybersecurity and Infrastructure Security Agency (CISA) this week announced the release of an open source post-election auditing tool in preparation for the 2020 elections. [Read More]
California's attorney general accuses Facebook of failing to provide a slew of information subpoenaed in a probe of its privacy practices begun last year in the wake of the Cambridge Analytica scandal. [Read More]
Facebook says 100 third-party application developers continued to access user information via the Groups API even after access to the data was restricted. [Read More]
Proton Technologies, the company behind the privacy-focused email service ProtonMail, has made available the source code of its iOS client application. [Read More]
An analysis of Android flashlight apps available in Google Play reveals that they request an average of 25 permissions, with some requesting up to 77 permissions when installed. [Read More]
The Libra Association, the organization in charge of Facebook’s Libra cryptocurrency, has launched a public bug bounty program with rewards of up to $10,000. [Read More]
To communicate about our metrics, we need ways that we can ground our experience in terms of “normal” for us; Otherwise, we really can't communicate our metrics effectively with anyone who isn't in a similar environment.
Security is a creature of habit. Security likes things to stay the same. Change brings chaos. Chaos is bad for security. But, we can help control the security of our environment by following good security habits.
A new amendment to Texas' breach notice law is designed to make it easier for Texas entities to comply with Texas law by giving those entities the choice of notifying under Texas law or the law of residents of other states.
While regulations and ensuing IT audits go beyond firewalls and firewall policies, these devices are often a good place to start when it comes to becoming "audit-ready" and gaining continuous visibility of what's going on in your network.
Too many IT and risk managers are surprised by security breaches, compromised keys or operational failures that occur from sheer neglect that result when you leave your valuable keys as exposed as a password on a post-it. Hefty, potential fines for failing to comply with regulations are risk enough, but the risks of ignoring these vulnerabilities extend even further.
The vast majority of ISVs are focused on prospecting and lead generation while overlooking potential sales funnel leakage due to piracy. Any vendor that is serious about its longevity needs to know if it has a software piracy problem.