Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A small fine of $20,000 in Sweden highlights a potential problem for the use of biometrics in security throughout Europe, including American firms with offices in Europe. [Read More]
Data protection firm BigID raises $50 million in a Series C funding round, which brings the total raised by the company to nearly $100 million. [Read More]
Google agreed Wednesday to pay $170 million to settle charges that it illegally collected and shared data from children on its YouTube video service, a deal critics said was too soft on the internet giant. [Read More]
Twitter said Monday it has suspended more than 200,000 accounts that it believes were part of a Chinese government influence campaign targeting the protest movement in Hong Kong. [Read More]
Twitter and Facebook suspend accounts believed to be part of a Chinese government influence campaign targeting Hong Kong protests. [Read More]
Facebook announces that its Data Abuse Bounty program now includes Instagram, and the company has invited some security researchers to test Instagram’s new Checkout feature. [Read More]
Apple files copyright infringement lawsuit against Corellium for creating replicas of iOS that can be used as a security research tool for discovering vulnerabilities. [Read More]
A survey of over 2,000 Americans shows that cybersecurity has become a political issue and most believe that cybersecurity should be a top priority for the government. [Read More]
Facebook has paid hundreds of contractors to listen to and transcribe snippets of users' conversations, US media reported on Tuesday, amid heightened scrutiny of the social network's data collection practices. [Read More]
Global privacy regulators joined forces Tuesday to demand guarantees from Facebook on how it will protect users' financial data when it launches its planned cryptocurrency, Libra. [Read More]

FEATURES, INSIGHTS // Compliance

rss icon

Mark Hatton's picture
Complacency is never a good thing, but in security it can have devastating effects. While it’s good to acknowledge progress, that should never stand in the way of staying ahead of the next potential threat.
Chris Hinkley's picture
For security professionals, PCI DSS 3.0 means that PCI compliance will become more of an everyday business practice, rather than an annual checklist obligation.
Chris Hinkley's picture
Compliance is a byproduct of a solid security program – but that doesn’t mean it’s simple. Compliance can involve technical architecture and operational processes that many organizations simply don’t understand or don’t want to bother with.
Gant Redmon's picture
The CSO is so critical for the CPO’s success that I guarantee that if you send this article to your CPO, they will take you out for a free lunch the next day.
Nick Cavalancia's picture
In the era of the public cloud, when employees are frequently using consumerized applications to share and store data, it's time for security and risk professionals to adopt a new security thought paradigm that focuses on the insider threat that employees create, not solely on protecting data itself.
Jon-Louis Heimerl's picture
The Omnibus Rule that updated the Health Insurance Portability and Accountability Act (HIPAA) has the potential to be a game changer because of the things it says in writing, as well as some of the things that it doesn’t say.
Dr. Mike Lloyd's picture
2012 was an interesting year in security – publicity around breaches led to greater awareness than we’ve seen in years, encouraging many in the Federal sector to look into our corner of IT. So what will happen in IT Security 2013?
Dr. Mike Lloyd's picture
Santa doesn’t care if you were naughty or nice on Christmas Eve – what matters is how you did all year. Security is much the same.
Gant Redmon's picture
You can have security without privacy, but you cannot have privacy without security. To have privacy, you must have security to protect things you wish not to share from those who are interested...
Gant Redmon's picture
Data breach notification laws are confusing and ever changing. Legislators trying to harmonize all the different state breach notification laws are going to have three big political challenges.