Security Experts:

Privacy & Compliance
long dotted

NEWS & INDUSTRY UPDATES

Tech giant IBM plans to acquire early-stage attack surface management startup Randori in a deal that signals a major expansion of Big Blue’s cybersecurity ambitions. [Read More]
Apple’s App Store prevented more than 1.6 million risky applications and app updates from defrauding users. [Read More]
Ten Eleven Ventures has joined a growing list of cybersecurity-focused venture capital firms raising new funds to invest in startups solving information security problems. [Read More]
Sequoia is leading a massive $50 million early-stage investment in Chainguard, a startup created by a team of ex-Google software engineers to "make software supply chain secure by default." [Read More]
Devo Technology, a late-stage startup building technology for data logging and security analytics, has closed a new $100 million funding round that pushes its valuation in the $2 billion range. [Read More]
ReliaQuest shells out $160 million to add threat intelligence capabilities to its flagship GreyMatter platform. [Read More]
Forgepoint Capital is pumping $10 million into a startup incubated to provide incident response services to the cyber-insurance ecosystem. [Read More]
Bug hunters at Microsoft are calling attention to several high-severity vulnerabilities in a mobile framework used by carriers in pre-installed Android System apps. [Read More]
SYN Ventures has closed a new $300 million fund and announced the addition of serial entrepreneur Ryan Permeh as full-time operating partner. [Read More]
witter will pay a $150 million penalty and put in new safeguards to settle federal regulators’ allegations that the social platform failed to protect the privacy of users’ data over a six-year span. [Read More]

FEATURES, INSIGHTS // Privacy & Compliance

rss icon

Marcus Ranum's picture
To communicate about our metrics, we need ways that we can ground our experience in terms of “normal” for us; Otherwise, we really can't communicate our metrics effectively with anyone who isn't in a similar environment.
Adam Firestone's picture
The misconception that Internet privacy equals anonymity must be dispelled if cyberspace is to be a secure and safe place. At the same time, mechanisms must be incorporated to ensure that communications remain confidential and resistant to unauthorized alteration by third parties.
Mark Hatton's picture
The oversight for the protection of healthcare information is only getting tighter, and it is incumbent upon the security teams to ensure healthcare professionals have all the tools necessary to improve patient outcomes, while we worry about keeping the bad guys away.
Tal Be'ery's picture
The Google-backed "Certificate Transparency" initiative has gained much momentum and may have a real chance to amend the battered Public-Key Infrastructure (PKI).
Nimmy Reichenberg's picture
With the release of PCI-DSS 3.0, organizations have a framework for payment security as part of their business-as-usual activities by introducing more flexibility, and an increased focus on education, awareness and security as a shared responsibility.
Mark Hatton's picture
Complacency is never a good thing, but in security it can have devastating effects. While it’s good to acknowledge progress, that should never stand in the way of staying ahead of the next potential threat.
Chris Coleman's picture
The events that occurred in 2013 will forever be reflected in the Internet DNA of the future, and how the cyber security market evolves to accommodate that future.
Chris Hinkley's picture
For security professionals, PCI DSS 3.0 means that PCI compliance will become more of an everyday business practice, rather than an annual checklist obligation.
Gant Redmon's picture
Proper use of Google Glass respecting law and privacy will be all about context. Context is different depending where you are. Are you in a public place, a private place, or a restricted place like a government installation?
Ram Mohan's picture
There is a lot we can do to keep our data private and, like many aspects of managing security, it’s a process that is best grounded in common sense. What can organizations do to shield themselves from the kind of scrutiny that has caught the world’s attention recently?