In a session titled ‘Becoming the Future CISO’ at the Forrester Forum for CIO’s in London, England, June 6 2013, Andrew Rose declared the current role of CISO a dying breed.
CESG publishes identity proofing guidelines
Access management is designed to allow only authorized digital identities to gain access to a system. But a digital identity is nothing more than “a collection of attributes that uniquely define a person or organization.” Proofing is the process of ens…
Operation PRISM: NSA and FBI monitoring activity at Facebook, Apple, Google, and other tech firms
It’s a potential publicity bomb that has yet to explode, apparently, but the Washington Post and the Guardian are reporting that both the US and the UK governments have been engaged in ongoing data collection of private information from web services, w…
Adware: the most pervasive mobile threat
A new examination of mobile threat data from the Lookout Platform in five countries has found that threats to consumers run the gamut, from annoying to extremely invasive. The study has uncovered that adware and malware threats like spyware, surveillan…
Connected TVs open up a host of threat vectors
In today’s world, everything from refrigerators to cars are beginning to get “connected” and given the ability to talk to you and to other things via broadband networks. Much of this still seems like science fiction, but when it comes to connected TVs,…
‘Beyond Orwellian’ – the FBI and NSA spy on all Americans
The Guardian newspaper has exposed a Foreign Intelligence Surveillance Court (FISC) ‘top secret’ order requiring Verizon to provide the NSA with all ‘telephony metadata’ for communications within the USA and between the USA and abroad.
Secunia names new CEO
Secunia, the Copenhagen-based provider of security software, announced the appointment of Microsoft’s Peter Colsted as the firm’s new chief executive.
Human error and system glitches drive nearly two-thirds of data breaches
The Ponemon Institute today released the 2013 Cost of Data Breach Study: Global Analysis which reveals data breaches are often the result of poor processes, and the latest study from Ponemon Institute bears this out: Human errors and system problems ca…
The effect of BYOD on information security
A new survey outlines the practical experience of IT/security professionals over the increasing use of personal devices within their business environment during the last 12 months.
Adobe CSO: Fixing vulnerbilities won’t thwart hackers
For commercial software coders looking to thwart cybercriminals, finding and fixing vulnerabilities is all well and good. In reality, though, that approach to product security can be a colossal waste of time and resources, according to Adobe’s Brad Ark…