Flaws in Development Tools Expose Android App Makers to Attacks

Millions of computers and servers that are used to develop, test and analyze Android applications were put at risk by vulnerabilities in widely used development tools. The flaws were discovered by researchers from Check Point Software Technologies and … Continue reading Flaws in Development Tools Expose Android App Makers to Attacks

How CISOs Can Successfully Talk Security to CEOs

It would be funny, if it were not so frustrating, that two individuals so intent on managing risk don’t understand one another. But that is the fundamental problem between business and security leaders. The gap is so huge that bridging it may seem near… Continue reading How CISOs Can Successfully Talk Security to CEOs

Uber’s Shady Competitive Intelligence Unit Revealed in Court

In an interesting turn of events, the ongoing case of Waymo v. Uber, which was scheduled to go to trial next week, has come to a screeching halt amid allegations of Uber having withheld material information surrounding the existence of a unit within th… Continue reading Uber’s Shady Competitive Intelligence Unit Revealed in Court

Data Loss Prevention Needs a Little Help from Its Friends

I recently read an article on Security Boulevard discussing how to get the most out of data loss prevention (DLP) technology. While much of the byline I agree with, especially the three questions all organizations should be asking to understand their d… Continue reading Data Loss Prevention Needs a Little Help from Its Friends

China Continues its Xenophobic Counterintelligence Campaigns

Some may say that China has always had an underlying current of xenophobia. Arrests and prosecutions of foreign nationals in China on unexplained or unidentified espionage charges continue. These actions continue to feed this narrative, as do the gover… Continue reading China Continues its Xenophobic Counterintelligence Campaigns

Supreme Court May Decide Data Breach Victims’ Rights

The U.S. Supreme Court may decide whether you can act on that “Dear valued customer, we regret to inform you that your data may have been compromised …” letter or e-mail with an individual or class action lawsuit. Right now, courts around the country d… Continue reading Supreme Court May Decide Data Breach Victims’ Rights

Supreme Court May Decide Data Breach Victims’ Rights

The U.S. Supreme Court may decide whether you can act on that “Dear valued customer, we regret to inform you that your data may have been compromised …” letter or e-mail with an individual or class action lawsuit. Right now, courts around the country d… Continue reading Supreme Court May Decide Data Breach Victims’ Rights

Extremist Groups: Using the Internet to Foment Online Radicalization

Anyone with access to the internet can have their voice heard. And this is exactly the philosophy behind the extremist online radicalization and recruitment efforts of various terrorist organizations, including Hezbollah and ISIS/ISIL (Islamic State of… Continue reading Extremist Groups: Using the Internet to Foment Online Radicalization

Corporate, Consumer Views Diverge on Securing Customer Data

Because companies accept and store sensitive, personally identifiable consumer customer data, they are responsible for safeguarding it against theft by cybercriminals. This should be common sense. Yet, according to a Ponemon Institute study commissioned by Centrify, only about half of the marketing and IT/security professionals polled agree that their companies “have an obligation to take..

The post Corporate, Consumer Views Diverge on Securing Customer Data appeared first on Security Boulevard.

Continue reading Corporate, Consumer Views Diverge on Securing Customer Data