Chinese telecoms firms pose national security risk, US intelligence committee...
Chinese telecoms firms pose national security risk, US intelligence committee claims US companies should avoid using telecoms equipment made by two leading Chinese firms, a report by a committee of the...
View ArticleManaging Mobile Risk for Lawyers
Managing Mobile Risk for Lawyers. Of the top themes presented at this summer’s International Legal Technology Association conference, collaboration and content delivery stood out in the crowd. But what...
View ArticleKill switches may be too difficult to implement despite new call by CFTC...
Kill switches may be too difficult to implement despite new call by CFTC member, expert says | Financial Regulatory Forum. WASHINGTON, Oct. 17 (Thomson Reuters Accelus) - CFTC Commissioner Bart Chilton...
View ArticleLegal potholes on road to mobility
Legal potholes on road to mobility. The popularity of mobile devices is intensifying not just security concerns, but also legal risks for business, two of Australia’s leading law firms have cautioned....
View ArticleNapolitano: Sandy Shows What Cyber Attack on Utilities Could Look Like
Napolitano: Sandy Shows What Cyber Attack on Utilities Could Look Like The ravages of super-storm Sandy on the Northeast’s infrastructure gives an idea of what a cyber attack on our utilities could...
View ArticleBaking Your Big Data Information Governance Program; in Celebration of 2013
We all know the feeling; relatives on their way over, and no time left to bake a big data information governance program from scratch. Got you covered; knew you were coming, so the elves baked one for...
View ArticleApps and Mobile Ads Make Surveillance Easy
News that the National Security Agency has for years harvested personal data “leaked” from mobile apps such as Angry Birds triggered a fresh wave of chatter about the extent of the NSA’s reach...
View ArticleThe Internet is Owned–Act Accordingly
Costin Raiu is a cautious man. He measures his words carefully and says exactly what he means, and is not given to hyperbole or exaggeration. Raiu is the driving force behind much of the intricate...
View ArticleSamsung Push Into U.S. Government Sector Threatens BlackBerry
Samsung Electronics Co. is revamping its push into the U.S. enterprise and government sector, adding further pressure to the new leadership at the company that once dominated that space, BlackBerry...
View ArticleKill Switches: Phones Just The Start
Mandatory phone kill switches will hasten the arrival of the Surveillance of Everything. Consider these 11 technologies that come with strings attached. Federal and state lawmakers have proposed to...
View ArticleBehind iPhone’s Critical Security Bug, a Single Bad ‘Goto’
Like everything else on the iPhone, the critical crypto flaw announced in iOS 7 yesterday turns out to be a study in simplicity and elegant design: a single spurious “goto” in one part of Apple’s...
View ArticleMac Users Warned Against Using Public Wi-Fi Networks
Security experts have advised companies to ban employees using Mac laptops to connect to public Wi-Fi networks, including those at the RSA Conference this week, until Apple releases a patch for a...
View ArticleAmerica’s Energy Grid Still Vulnerable To Cyber Attacks
A new report by security experts confirms what people involved with the nation’s infrastructure have suspected for some time: that America’s energy sectors are still very vulnerable to a massive and...
View ArticleWhat My Droid’s Metadata Says About Me
Jonathan Mayer, like many privacy advocates, challenges the National Security Agency’s contention that the NSA’s program to collect metadata from telephone calls does not violate individuals’ privacy...
View ArticleCohen’s SAC Taps Analytics Firm Palantir to Monitor Employees
Billionaire investor Steven A. Cohen hired a top Silicon Valley data analytics firm to keep closer tabs on his employees just months after his hedge fund SAC Capital Advisors pleaded guilty to insider...
View Article
More Pages to Explore .....