Blog Archives

Online Privacy and Censorship

Living Free Online: A Basic Guide to Internet Censorship and Privacy

In order to keep our global society open and dynamic, the general principles of online freedom must be upheld, and the average person kept as informed as possible. There is no acceptable justification for government or organizational censorship of the internet.

Read more ›

Posted in censorship, Content, Government Surveilance, Legal, Privacy, Regulatory
Tags: , , , , , ,

Surviving the Data Breach – Part 2

The Top 3 Mistakes Businesses Make After a Breach

by: Carly Okyle, October 29, 2015

Rajesh De (pronounced Day) knows a thing or two about cybersecurity.

Read more ›

Posted in Breach, Compliance, Content, Cybersecurity, Governent Oversight, Incident Response, Legal, Regulatory, Risk Management
Tags: , , , , , , , ,

Chilling Effect Impact

Surveillance, First Amendment Rights and the “Chilling Effect”

by Curt Monash of The Monash Report

In which I observe that Tim Cook and the EFF, while thankfully on the right track, haven’t gone nearly far enough.

Traditionally, the term “chilling effect” referred specifically to inhibitions on what in the US are regarded as First Amendment rights — the freedoms of speech,

Read more ›

Posted in Content, Governent Oversight, Government Surveilance, Incident Response, Legal, Privacy, Privacy Laws, Regulatory, Risk Management
Tags: , , , , , , , , , ,

Infrastructure and Cyberwarfare

Critical Infrastructure Faces Growing Risk of Cyberwarfare, FBI Says

by Steve Rosenbush, WSJ

War is viewed as a continuation of politics by other means, and cyberwarfare plays a growing role in both realms. The attack on Sony Entertainment (more on that below), may have been launched by North Korea in response to a Sony movie that the regime didn’t like.

Read more ›

Posted in Cyberattack, Cybersecurity, DNS Attack, Government Surveilance, Hacks, Incident Response, Insider Threats, Malware, Risk Management
Tags: , , , , , , , , , , , , ,

NSA: Something Dramatic is Coming

NSA Director Delivers Cyberattack Wake-Up Call

by Tom Loftus, WSJ

The cyber threats arrayed against your operations are growing stronger and more sophisticated each day. On Thursday the director of the NSA delivered a wake-up call for everyone else. “It’s only a matter of the ‘when,’ not the ‘if,’ that we are going to see something dramatic,” said Adm.

Read more ›

Posted in Breach, Cyberattack, Cybersecurity, Government Surveilance, Hacks, Risk Management
Tags: , , , , , , , ,

Surveillance Environment Impacts the Way Companies do Business

“Snowden Effect” Causes Companies to Alter their Email Services

by Michael Hickins, Wall Street Journal

Business and consumer wariness of surveillance has pushed two of the world’s largest companies to make significant changes to their email services. Microsoft Corp. has decided to change its policies for accessing customer email after the company faced scrutiny for searching a user’s Hotmail email account to investigate a leak of company software,

Read more ›

Posted in Compliance, Encryption, Governent Oversight, Government Surveilance, Privacy, Privacy Laws, Regulatory
Tags: , , , , , , ,

Privacy vs. Security: The Compliance Conundrum

Blackphone Could Create a Black Hole for Compliance

By: Ben DiPietro for the Wall Street Journal

The announcement this week of a smartphone that claims it doesn’t have a backdoor to allow access to law enforcement of intelligence agencies could create compliance problems for companies—while offering criminals a secure arena to conduct their illegal activities,

Read more ›

Posted in Compliance, Cybersecurity, Legal, Privacy, Privacy Laws, Regulatory, Risk Management
Tags: , , , , , ,

NSA Reacts to Report on Device Hacking

New Snowden Leak: NSACompromised Hardware, iPhones
By , December 31, 2013. Follow Eric @GovInfoSecurity

Days after the German Der Spiegel newspaper reported that the U.S. National Security Agency had compromised a wide range of commercial computer hardware and smart phones for years,

Read more ›

Posted in Cybersecurity, Government Surveilance, Insider Threats, Legal, Privacy, Privacy Laws, Regulatory, Risk Management
Tags: , , , , , , ,

NIST Review Won’t Disrupt Work with NSA

NIST Cyber Leader: ‘We’re Being a Little More Cautious’
By , November 5, 2013. Follow Eric @GovInfoSecurity

The National Institute of Standards and Technology continues to collaborate with the National Security Agency on its IT security guidance even as NIST investigates whether the spy agency meddled with one of its special publications.

Read more ›

Posted in Compliance, Cybersecurity, Encryption, Governent Oversight, Government Surveilance, Privacy, Privacy Laws, Regulatory
Tags: , , , , , , ,

NIST to Review Crypto Guidance Methods

NIST Seeks to Rebuild Trust with IT Security Community
By , November 2, 2013. Follow Eric @GovInfoSecurity

Noting that its integrity has been questioned, the National Institute of Standards and Technology has launched a formal review on how it develops cryptographic standards because of concerns that the National Security Agency might have corrupted its cryptography guidance.

Read more ›

Posted in Compliance, Cybersecurity, Encryption, Government Surveilance, Legal, Regulatory, Risk Management
Tags: , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:

Name:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity

Archives

Recent Tweets

Categories

Follow

Get every new post delivered to your Inbox

Join other followers: