The killing of an unarmed teen by police in Ferguson, Mo., has Anonymous sympathizers disagreeing on Twitter when and how to expose the identity of the shooter.
Can a smart phone increase your privacy and security while remaining both highly usable and attractive to buyers? The inaugural Blackphone is testing that question for consumers and businesses.
A U.S. federal court judge has upheld a warrant requiring Microsoft to give the Justice Department copies of e-mails being stored at a data center in Dublin. But Microsoft plans to appeal the ruling on privacy grounds.
NIST says its recommended changes to security and privacy assessment procedures should result in significant improvements in the efficiency and cost-effectiveness of control assessments.
Vendors are rushing useful new "Internet of Things" products to market, but too often treat device security and data privacy as an afterthought, says Forrester Research analyst Andrew Rose.
A senior White House official says the Cybersecurity Information Sharing Act of 2014, which a Senate committee passed earlier this month, needs to have its privacy and civil liberties protection provisions strengthened to win presidential support.
Google's move to adopt a single, unified privacy policy in 2012 continues to have legal repercussions, with the Italian Data Protection Agency demanding changes, and a judge clearing the way for a U.S. class action lawsuit to move forward.
The largest data breach reported in June resulted in the exposure of 1.3 million identities. This seems like a small number when compared to the 145 million exposed in the largest breach of May. However, while reported in June, this breach also took place during the month of May. This brings the total number of...
The endpoint protection platform provides a collection of security capabilities to protect PCs, smartphones and tablets. Vendors in this market compete on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration.
This analysis provides:
An evaluation of...
The Obama administration withholds judgment on the Cybersecurity Information Sharing Act until the bill is scheduled for a Senate floor vote. But no one is saying if or when that will happen.
FireEye has just appointed a privacy officer and handed him a big mission: Launch a new global privacy program. What is Shane McGee's strategy for this new role, and what will be his top challenges?
Schools are embracing the use of technology to cut costs, to perform research, roll out computer-based classes and exercises and to compete for students. At the same time, the school administration is being asked by parents, state, local, regional or even federal governments to make sure that students and faculty are...
Secure file sharing, syncing and associated productivity requirements impose pressing technical and operational challenges on organizations. Data must be secure. File sharing must adhere to company policies and industry regulations. At the same time, employees need fast, convenient access to content to be...
The consumerization of IT and the popularity of BYOD (Bring Your Own Device) are jeopardizing the security and integrity of business data. Seeking an easy way to share files across smartphones, tablets, and desktops, employees are signing up for free public cloud file sharing services that lack rigorous security and...
The Obama administration has reached a deal with EU representatives, pending Congressional approval, to give EU citizens the right to file lawsuits, in certain circumstances, if the U.S. has violated their privacy rights.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.