Earlier this week, Department of Homeland Security Secretary Jeh Johnson told attendees at the Reuters Cybersecurity Summit that members of Congress will likely move forward on bipartisan cybersecurity legislation this summer. The Senate also issued a report on Thursday urging some the country’s leading high-tech companies to go to greater lengths to protect consumers from hackers using online advertisements as a way to infect computers.
A new "Global Study on Mobility Risks" reveals that corporate mobile devices and the bring-your-own-device (BYOD) phenomenon are rapidly circumventing enterprise security and policies. Seventy-seven percent of more than 4,000 respondents in 12 countries agree that the use of mobile devices in the workplace is important to achieving business objectives. But 76 percent also believe that these devices put their organizations at risk—and only 39 percent have the necessary security controls to address the risk.
An annual report to Congress touched off a round of speculation Wednesday about the motives of a small Chinese Internet service provider that briefly rerouted as much as 15 percent of the world’s Web traffic on two occasions last spring. The report, by the United States-China Economic and Security Review Commission, noted that the service provider, IDC China Telecommunication, broadcast inaccurate Web traffic routes for about 18 minutes on April 8.
According to a press release quietly issued earlier this month, some personal records were found on the hard drive of a copier found in a New Jersey warehouse. The copier had previously been leased by Affinity and was then returned to the leasing company, the release states.
Case serves as a wake-up call about the potential dangers of malicious insider access to sensitive data.
A Wyoming bank sent an e-mail containing sensitive customer data to the wrong Gmail account, and now wants Google to reveal the identity of the account holder who received the data.
Apple claims that hundreds of thousands of iPhones are being used by corporations and government agencies. What it won’t tell you is that the supposedly enterprise-friendly encryption included with the iPhone 3GS is so weak it can be cracked in two minutes with a few pieces of readily available freeware.
Protecting sensitive data means locating and enumerating the information in your databases -- and finding the right method to secure it.