Consumer privacy took a body blow in 2017 when U.S. President Donald Trump signed a repeal of the broadband privacy rules. Increasingly, the complex nature of privacy in the age of the internet is putting the fraught relationship between government, big business and the man on the street to the test.
Staff Writer at CPO Magazine
Sarah Meyer is a technology writer for more than 10 years. She writes on public policy issues with a focus on cybersecurity and personal data protection. Sarah has previously worked for large multinational cybersecurity companies in the areas of government relations and public policy engagement.
Recent study by Imperva gets under the skin of what can now be characterized as an increasingly complex and rapidly maturing phishing industry. The study examined more than 1,000 free phishing kits that allow for the development of phishing web sites in what has been called an ‘easy to deploy’ format.
AIG releases new cyber risk benchmarking model to quantify and score cyber maturity of clients, boosting cyber insurance and promoting metrics useful for the industry to evaluate the risks that organizations face in terms of cyber security.
The U.S. Federal Government is a behemoth that touches every aspect of American life – and today the services and information needed by U.S. citizens are increasingly found online. However, the latest report on the state of U.S. federal websites indicates that they fail on some key indicators regarding web security.
Identity theft is a frighteningly real concern during the holiday season as consumers shop more and cyber criminals get busy. Companies that proactively offer identity protection to cushion the full impact of a data breach on customers that are victimized will reap benefits of trust and loyalty from their customers.
Misconfigured AWS buckets containing dozens of terabytes worth of social media messages were exposed to the public. The data found in Pentagon's leaked database was gathered by the U.S. military as part of their ongoing efforts to identify so called ‘persons of interest’, revealing the extent of internet surveillance.
The U.S. government reveals the Vulnerabilities Equities Process which decides if vulnerability data is released or gets stockpiled as cyber weapons.
Rock bottom prices on the dark web for remote access into corporate PCs a boon for cyber criminals to steal data, distribute malware and ransomware attacks.
Consumer trust has taken a hit over the past year. Retailers now need to offer identity protection services to regain confidence of holiday shoppers.
Amazon Key is still in the early stages yet there are so many questions of hacking, insurance risks and liability if problems were to occur during delivery.