Big Data

Safe passage: Case study

Safe passage: Case study

By

HR firm Pasona N A needed strong and flexible security for file-sharing around the globe, reports Greg Masters.

China to use big data surveillance a la 'Minority Report' to predict terrorism

China to use big data surveillance a la 'Minority Report' to predict terrorism

By

China has a contracted with China Electronics Technology Group to develop technology that can predict acts of terrorism before they occur based on surveillance data.

Is an NSA algorithm really killing 'thousands of innocent people'...probably not

Is an NSA algorithm really killing 'thousands of innocent people'...probably not

By

The NSA's SKYNET program earned some unwanted attention after a report said the agency's machine learning algorithm is inadequate.

Security 101: Is my sensitive data safe?

Join experts from Informatica who will address in detail the challenges companies face in knowing how to recognize sensitive data, discover where their data resides and how to protect it from attackers.

Telegram metadata allows for 'stalking anyone'

Telegram metadata allows for 'stalking anyone'

By

Researchers discovered more problems with Telegram, the messaging app founded by the Russian tech entrepreneur brothers Nikolai and Pavel Durov.

European and American authorities reportedly closing in on Safe Habor 2.0 agreement

European and American authorities reportedly closing in on Safe Habor 2.0 agreement

By

European and American diplomats are reportedly negotiating a "Safe Harbor 2.0" agreement to allow for data transfers to the United States while also addressing European privacy concerns, Reuters reported on Thursday.

SC Congress New York Photo Slideshow

By

Shots from around SC Congress New York 2015. The day-long event, held on October 20 at the Metropolitan Pavilion in Manhattan, featured 32 speakers, 350 guests and 32 exhibitors/sponsors.

 Into the spotlight: Cyberinsurance

Into the spotlight: Cyberinsurance

Data that can be monetized is, simply put, a magnet for the bad guys. No matter whether your organization is big or small, if you have desirable data, you can no longer afford to wonder whether or not to invest in cybersecurity insurance.

Corporations need to prioritize protecting keys and certificates

Corporations need to prioritize protecting keys and certificates

By

Businesses must prioritize protecting their security keys and certificates or leave themselves open to losing customers, system outages, audit failures and possibly failing, according to a report from the Ponemon Institute.

Microsoft exec clarifies Windows 10 data collection policy

Microsoft exec clarifies Windows 10 data collection policy

By

Microsoft released a statement on Tuesday that addressed the feedback and privacy concerns of Windows 10 data collection.

Roundtable: Identity and access management

Roundtable: Identity and access management

The SC Magazine UK roundtable convened with several industry experts to talk about the issues surround identity and access management

Data storage stolen at Lloyds, customer account data lost

Data storage stolen at Lloyds, customer account data lost

By

Lloyds Bank data storage device stolen from an RSA data centre two months ago contains customer names, addresses, sort codes and account numbers for Lloyds' Premier Account customers who had Royal Sun Alliance emergency home cover attached to their bank account between 2006 and 2012.

Fraudsters using credentials harvested from massive breaches, study finds

Fraudsters using credentials harvested from massive breaches, study finds

By

Digital identities are being exploited on a routine basis by sophisticated cybercriminals, says a just released ThreatMetrix study.

Google facility in Europe loses data due to lightning strikes

Google facility in Europe loses data due to lightning strikes

By

After lightning struck a local utility grid, one of Google's European data centers suffered a power outage that led to "some" permanent data loss.

10 Reasons You Need to Test, Not Guess

10 Reasons You Need to Test, Not Guess

How you are securing your sensitive information should not be a guessing game

American Airlines denies hack, but reinforces security efforts

American Airlines denies hack, but reinforces security efforts

By

American Airlines denied involvement in an apparent security incident at its one-time subsidiary Sabre, but is redoubling its own security measures as a precaution.

Dropbox, Google Drive and others vulnerable to Man-in-the-Cloud attacks

Dropbox, Google Drive and others vulnerable to Man-in-the-Cloud attacks

By

Imperva believes cloud storage sites like Google Drive, Dropbox, OneDrive will be the next area corporations will have to defend in their on-going battle to keep their data under wraps.

Apple to block advertisers from getting app data in iOS 9, reports say

By

Apple announced that the iOS 9 will block advertisers and other companies from scanning devices for app-download data.

Uber simplified privacy policies, specifies data use

By

Uber has updated its privacy policies to use less legal jargon, be more concise and easier to understand.

RadioShack, state coalition reach terms on sale of customer data

By

RadioShack and a coalition of 38 states have reached an agreement allowing RadioShack to sell the customer data under certain conditions.

FTC recommends conditions for sale of RadioShack consumer information

FTC recommends conditions for sale of RadioShack consumer information

By

The FTC has recommended a list of conditions that a bankruptcy court should impose on the sale of RadioShack's information assets.

Building a sophisticated endpoint defense strategy with full security lifecycle protection

Attackers are more sophisticated than they've ever been. They're targeting our intellectual property, sensitive customer information, user information and much more. The network is not the target—it's the endpoint where that data resides.

RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns

RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns

Gib Sorebo used his session at RSA to discuss the Internet of Things (IoT) and its possible repercussions.

RSA 2015: Intel SVP looks to Moneyball story to inspire offensive strategies

RSA 2015: Intel SVP looks to Moneyball story to inspire offensive strategies

By

At RSA Conference in San Francisco, Intel Security Group SVP and General Manager Christopher Young challenged the industry to write its own Moneyball story.

Permira, CPPIB to acquire Informatica

By

Data software company Informatica announced, on Tuesday, that it is set to be acquired by private equity firm Permira and Canada Pension Plan Investment Board (CPPIB).

IBM will invest $3 billion in new IoT unit

IBM will invest $3 billion in new IoT unit

By

IBM will investing $3 billion over the next four years to establish a new Internet of Things (IoT) business unit along with a cloud-based platform to help build IoT solutions.

Cracking the confusion between encryption and tokenization

Today there are more options for securing enterprise data than ever before. Yet with so many approaches, choosing the best fit isn't always an easy decision.

How Provident Bank transformed their information protection strategy

A single click by your end users can lead either to a data breach or to data protection. Which would your organization prefer?

Canada losing cybersecurity war

By

Canada's companies are ill-prepared to meet modern cybersecurity challenges, according to a survey by the Ponemon Institute.

Samsung updates Smart TV privacy policy to clarify collection of user data

Samsung updates Smart TV privacy policy to clarify collection of user data

By

After device owners and media outlets began questioning Samsung's vague privacy policy related to its Smart TVs, the company revised the policy to further clarify.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US