As location-based services become ubiquitous and the rise of selfie soldiers, the Strava heat map incident shows the difficulty in governing civilian technology in military settings.
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
Google has a vision for users to not have to think about cybersecurity, even as the human factor is the weakest link. Realistic cybersecurity training is still critical as we can't fully trust and rely on technological capabilities.
SIM swap scams are increasingly profitable for criminals with the growing dependence on phone-based authentication and mobile wallets storing cryptocurrencies. Are mobile carriers doing enough to prevent SIM swap fraud?
According to Tripwire's State of Cyber Hygiene report, many organizations are simply not getting their cyber security basics right. And there is a distinct lack of focus on the proper maintenance and basic protection organizations need to put in place for cyber defense.
Reddit hack shows that the industry standard two-factor authentication approach in certain cases might not offer as much protection of vulnerable data as has long been thought.
Are the privacy and data misuse scandals finally catching up with Facebook stock? There are lessons every business should heed to avoid a direct and shocking blow to company value.
Today most small and medium businesses adopt a reactive approach to cybersecurity – protect, pray and then react. Here are 7 criteria an SMB should look for when selecting solutions for a layered cyber defense.
Autonomous vehicles highlights pressing issues currently in technology law involving artificial intelligence and machine learning. What are the liability and risk problems that must be considered?
LabMD may have won an appeals case against the FTC, arguing that regulations regarding their cyber security practices were too vague to allow for prosecution, but every organization needs to be warned that the FTC could be coming for you next.
According to U.S. Director of National Intelligence Dan Coats, the U.S. is at “a critical point.” With Russian hackers breaking into the U.S. power grid and gaining access to utility control rooms, they have the opportunity to “throw the switch”, plunging the nation into darkness and chaos.