CPO Magazine sat down with Prashant Pai and Scott Stransky at Verisk to understand what companies should consider when shoring their cybersecurity defenses.
Staff Writer at CPO Magazine
Sarah Meyer is a technology writer for more than 10 years. She writes on public policy issues with a focus on cybersecurity and personal data protection. Sarah has previously worked for large multinational cybersecurity companies in the areas of government relations and public policy engagement.
Securus data scandal exposes cavalier attitude of location aggregators and mobile carriers towards location data and consumer privacy.
Proposed Secure Data Act wants to forbid government agencies from demanding for encryption backdoors. This is a positive move but will it resolve the security vs. privacy debate?
Seventy percent of security pros want governments to impose social media regulation for the collection of personal data by social media companies. Yet, expectations are hazy and 72% also indicated that they have little to no faith that government officials have an understanding of the threats to digital privacy.
Whether you are a user or not, you have a relationship with Facebook. With the latest revelations of the Cambridge Analytica "breach", it is becoming more and more obvious that whether you like it or not, your data will be harvested – and “sold”. Privacy choice and control is no longer fully in your hands.
Recent data breaches at Under Armour and Panera Bread has been making headlines. But the approach taken to mitigate the threat to consumers could not have been more different. One is a lesson on best practice and the other is a cautionary tale on how not to handle malicious attacks aimed at seizing consumer data.
Latest variant of Fakebank Android malware adds even more functional threats to banking clients – in the form of ‘vishing’ (voice phishing). It can now intercept outgoing and incoming calls which is then redirected to scammers which allows them to pose as legitimate employees of the bank.
When consumers shop online many do not realize that they are not only handing over their hard-earned cash, there’s another transaction that is happening at the same time – online behavioral tracking. Data about you is being gathered, shared and analyzed to determine what you see and to shape your online experience.
EFF and Lookout traced Dark Caracal to Lebanon and has infected Android users in more than 20 countries and stolen hundreds of gigabbytes of dat. Cyber espionage using fake apps with Android malware is the new trend as nation states and cybercriminals move towards using mobile as the target platform.
The Unique Identification Authority of India (UIDAI) has denied reports that the Aadhaar data breach has made masses of biometric data available to external players for a miniscule sum. Has big government in India simply overreached itself as far as its vision for this database is concerned?