Blog Archives

Chilling Effect Impact

Surveillance, First Amendment Rights and the “Chilling Effect”

by Curt Monash of The Monash Report

In which I observe that Tim Cook and the EFF, while thankfully on the right track, haven’t gone nearly far enough.

Traditionally, the term “chilling effect” referred specifically to inhibitions on what in the US are regarded as First Amendment rights — the freedoms of speech,

Read more ›

Posted in Content, Governent Oversight, Government Surveilance, Incident Response, Legal, Privacy, Privacy Laws, Regulatory, Risk Management
Tags: , , , , , , , , , ,

Data and (Deep) Machine Learning

Trend to Watch Closely: Data and (Deep) Machine Learning

May 28, 2015 by: Rajat Taneja Executive Vice President, Technology at Visa

Over the course of my career I have been very fortunate to have been part of three secular trends that changed the way we work and interact.

Read more ›

Posted in Big Data, Data Solutions, Data Structure, Fraud, Machine Learning, Optimization
Tags: , , , , , ,

SureView: Compliance, Continuous Monitoring, and the Insider Threat

The Role of Continuous Monitoring in Compliance, and Combating the Insider Threat

thanks to: Dave Shackleford, Voodoo Security LLC

For security teams in many organizations, continuous monitoring is an ambiguous concept that originated in association with Federal Information System Management Act (FISMA) compliance.

Read more ›

Posted in Breach, Compliance, Content, Cybersecurity, Insider Threats, Regulatory, Risk Management, Vendor Compliance
Tags: , , , , , , , , ,

Press Release: SMLR is Now a SpectorSoft Gold Certified Partner

 

SpectorSoft Names SMLR Group, Inc. a Gold Certified Partner

The SMLR Group, Inc., and SpectorSoft have entered into a strategic partnership wherein the SMLR Group, Inc., has been awarded Gold Certified Partner status.

Spectrosoft_gold_distributorSpectrosoft_gold_distributor

Read more ›

Posted in Content, Customer Engagement, Cybersecurity, Incident Response, Insider Threats, Legal, Risk Management, Vendor Compliance
Tags: , , , , , , , , , ,

OIG: EHR Fraud Detection Inadequate

Report Says CMS, Contractors Need to Adopt Best Practices to Combat Fraud
By , January 9, 2014. Follow Marianne @HealthInfoSec

The Centers for Medicare and Medicaid Services and many of its contractors need to adopt better practices to detect fraud committed using electronic health records,

Read more ›

Posted in Compliance, Customer Engagement, Fraud, Fraud, HHS, HIPAA, Privacy, Risk Management
Tags: , , , , , , , , ,

Social Media Monitoring Helps Investigations

Sheriff Richard Wiles and the El Paso County, Texas Sheriff’s Department were heavily criticized for a recent purchase of software to monitor social media for possible criminal activity.

Although much smaller in scale, El Paso law-enforcement officials have been swept into the government spying controversy over local surveillance of social media sites.

Read more ›

Posted in Content, Forensic Social Media, Social Media and the Law, Social Media Discovery, Social Media Privacy
Tags: , , , ,

NIST Review Won’t Disrupt Work with NSA

NIST Cyber Leader: ‘We’re Being a Little More Cautious’
By , November 5, 2013. Follow Eric @GovInfoSecurity

The National Institute of Standards and Technology continues to collaborate with the National Security Agency on its IT security guidance even as NIST investigates whether the spy agency meddled with one of its special publications.

Read more ›

Posted in Compliance, Cybersecurity, Encryption, Governent Oversight, Government Surveilance, Privacy, Privacy Laws, Regulatory
Tags: , , , , , , ,

NSA E-Spying: Bad Governance

NSA “Surprises” Continue: Harvesting Millions of E-mail Contacts, Buddy Lists

By , October 17, 2013. Follow Eric @GovInfoSecurity

NSA E-Spying: Bad GovernanceNSA E-Spying: Bad Governance

The Washington Post reported on Oct. 14 that the NSA is harvesting hundreds of millions of contact lists from personal e-mail and instant messaging accounts around the world,

Read more ›

Posted in Cybersecurity, Government Surveilance, Insider Threats, Legal, Privacy, Privacy Laws
Tags: , , , , ,

Risky Business: Monitoring Employees on LinkedIn

Do companies go too far by trying to control what their employees post on LinkedIn?

By Bruce K. Segall from Mahoney Partners Risk Communications

While LinkedIn is primarily a vehicle for individual visibility, our May 7th blog post took an institutional perspective. “Managing the Risks and Benefits of LinkedIn” reviewed ways for companies to manage key risks with LinkedIn,

Read more ›

Posted in Content, Insider Threats, Legal, Privacy, Risk Management, Social Media Privacy, Social Media Today
Tags: , , , , ,

“Stingray” Surveillance Tool

February 12, 2013 | By Trevor Timm

As Secretive “Stingray” Surveillance Tool Becomes More Pervasive, Questions Over Its Illegality Increase

A few months ago, EFF warned of a secretive new surveillance tool being used by the FBI in cases around the country commonly referred to as a “Stingray.” Recently,

Read more ›

Posted in Cybersecurity, Forensic Social Media, Government Surveilance
Tags: , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:

Name:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity

Archives

Recent Tweets

Categories

Follow

Get every new post delivered to your Inbox

Join other followers: