Baking Your Big Data Information Governance Program; in Celebration of 2013
We all know the feeling; relatives on their way over, and no time left to bake a big data information governance program from scratch. Got you covered; knew you were coming, so the elves baked one for...
View ArticleApps and Mobile Ads Make Surveillance Easy
News that the National Security Agency has for years harvested personal data “leaked” from mobile apps such as Angry Birds triggered a fresh wave of chatter about the extent of the NSA’s reach...
View ArticleThe Internet is Owned–Act Accordingly
Costin Raiu is a cautious man. He measures his words carefully and says exactly what he means, and is not given to hyperbole or exaggeration. Raiu is the driving force behind much of the intricate...
View ArticleSamsung Push Into U.S. Government Sector Threatens BlackBerry
Samsung Electronics Co. is revamping its push into the U.S. enterprise and government sector, adding further pressure to the new leadership at the company that once dominated that space, BlackBerry...
View ArticleKill Switches: Phones Just The Start
Mandatory phone kill switches will hasten the arrival of the Surveillance of Everything. Consider these 11 technologies that come with strings attached. Federal and state lawmakers have proposed to...
View ArticleBehind iPhone’s Critical Security Bug, a Single Bad ‘Goto’
Like everything else on the iPhone, the critical crypto flaw announced in iOS 7 yesterday turns out to be a study in simplicity and elegant design: a single spurious “goto” in one part of Apple’s...
View ArticleMac Users Warned Against Using Public Wi-Fi Networks
Security experts have advised companies to ban employees using Mac laptops to connect to public Wi-Fi networks, including those at the RSA Conference this week, until Apple releases a patch for a...
View ArticleAmerica’s Energy Grid Still Vulnerable To Cyber Attacks
A new report by security experts confirms what people involved with the nation’s infrastructure have suspected for some time: that America’s energy sectors are still very vulnerable to a massive and...
View ArticleWhat My Droid’s Metadata Says About Me
Jonathan Mayer, like many privacy advocates, challenges the National Security Agency’s contention that the NSA’s program to collect metadata from telephone calls does not violate individuals’ privacy...
View ArticleCohen’s SAC Taps Analytics Firm Palantir to Monitor Employees
Billionaire investor Steven A. Cohen hired a top Silicon Valley data analytics firm to keep closer tabs on his employees just months after his hedge fund SAC Capital Advisors pleaded guilty to insider...
View Article
More Pages to Explore .....