Blog Archives

The First 100 Days – Trump and Cybersecurity

Cybergovernance: 3 Initiatives for the First 100 Days

by | Nov 14, 2016

A new administration’s priorities are often set within its first 100 days. What should the new administration do to help the country achieve greater levels of cyber maturity and risk mitigation?

Read more ›

Posted in Cyberattack, Cybersecurity, Encryption, Governance, Legal, Privacy, ransomware, Regulatory, Risk Management
Tags: , , , , , , , , , , ,

Online Privacy and Censorship

Living Free Online: A Basic Guide to Internet Censorship and Privacy

In order to keep our global society open and dynamic, the general principles of online freedom must be upheld, and the average person kept as informed as possible. There is no acceptable justification for government or organizational censorship of the internet.

Read more ›

Posted in censorship, Content, Government Surveilance, Legal, Privacy, Regulatory
Tags: , , , , , ,

Encryption Isn’t Going Away

Encryption App Gains Popularity Amid Apple Privacy Battle

By Steve Rosenbush for WSJ

The battle between Apple Inc. and the FBI over an encrypted iPhone used by one of the San Bernardino terrorists could be meaningful to that particular investigation. Perhaps, if the FBI wins, and Apple unencrypts the phone,

Read more ›

Posted in Content, Cybersecurity, Encryption, Governance, Governent Oversight, Government Surveilance, ID Theft, Layered Defense, Legal, Regulatory, spyware
Tags: , , , , , , , , , , ,

Mobile Security and YOU

Mobile Devices and Your Security – Beyond Simple BYOD

By Michael O’Shaughnessy

Here is a question I bet you have never asked yourself; is your smartphone secure? I don’t mean a password, although that is important, I mean using an actual anti–virus/malware app. If you have some type of scanning app loaded on your phone congratulations,

Read more ›

Posted in Content, Cybersecurity, Hacks, ID Theft, Mobile
Tags: , , , , , , ,

Chilling Effect Impact

Surveillance, First Amendment Rights and the “Chilling Effect”

by Curt Monash of The Monash Report

In which I observe that Tim Cook and the EFF, while thankfully on the right track, haven’t gone nearly far enough.

Traditionally, the term “chilling effect” referred specifically to inhibitions on what in the US are regarded as First Amendment rights — the freedoms of speech,

Read more ›

Posted in Content, Governent Oversight, Government Surveilance, Incident Response, Legal, Privacy, Privacy Laws, Regulatory, Risk Management
Tags: , , , , , , , , , ,

Infrastructure and Cyberwarfare

Critical Infrastructure Faces Growing Risk of Cyberwarfare, FBI Says

by Steve Rosenbush, WSJ

War is viewed as a continuation of politics by other means, and cyberwarfare plays a growing role in both realms. The attack on Sony Entertainment (more on that below), may have been launched by North Korea in response to a Sony movie that the regime didn’t like.

Read more ›

Posted in Cyberattack, Cybersecurity, DNS Attack, Government Surveilance, Hacks, Incident Response, Insider Threats, Malware, Risk Management
Tags: , , , , , , , , , , , , ,

Surveillance Environment Impacts the Way Companies do Business

“Snowden Effect” Causes Companies to Alter their Email Services

by Michael Hickins, Wall Street Journal

Business and consumer wariness of surveillance has pushed two of the world’s largest companies to make significant changes to their email services. Microsoft Corp. has decided to change its policies for accessing customer email after the company faced scrutiny for searching a user’s Hotmail email account to investigate a leak of company software,

Read more ›

Posted in Compliance, Encryption, Governent Oversight, Government Surveilance, Privacy, Privacy Laws, Regulatory
Tags: , , , , , , ,

Cybersecurity: World Federation of Exchanges Looks for Answers

Stock exchanges of the world form central cybersecurity working group

by John Hawes on December 18, 2013 | Naked Security

The World Federation of Exchanges (WFE), the trade association for the world’s stock exchanges, has formed a central committee on cybersecurity, to work on how exchanges should go about protecting themselves from cyber attacks.

Read more ›

Posted in Cybersecurity, Financials, Risk Management, Vendor Compliance
Tags: , , , , , , , ,

Cybersecurity Bill Introduced in House

Measure Seen Bolstering Business-Government Cooperation on Cybersecurity
By , December 12, 2013. Follow Eric @GovInfoSecurity

Cybersecurity Bill Introduced in HouseCybersecurity Bill Introduced in House

Leaders of the House Homeland Security Committee have introduced a bipartisan bill they contend would strengthen the cybersecurity of the nation’s 16 critical infrastructure sectors and the federal government by codifying,

Read more ›

Posted in Cybersecurity, Governent Oversight, Marketing, Regulatory, Risk Management, Vendor Compliance
Tags: , , , , ,

Shaming China to Stop Hacks Doesn’t Work

Commission Also Warns of China Threat from the Cloud
By , November 21, 2013. Follow Eric @GovInfoSecurity

Attempts to shame China haven’t been effective in stopping that country from pilfering intellectual property from the computers of American companies,

Read more ›

Posted in Breach, Cloud, Cyberattack, Cybersecurity, Governent Oversight, Hacks, Legal, Malware & Other Threats, Risk Management
Tags: , , , , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:

Name:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity

Archives

Recent Tweets

Categories

Follow

Get every new post delivered to your Inbox

Join other followers: