The Obama administration withholds judgment on the Cybersecurity Information Sharing Act until the bill is scheduled for a Senate floor vote. But no one is saying if or when that will happen.
FireEye has just appointed a privacy officer and handed him a big mission: Launch a new global privacy program. What is Shane McGee's strategy for this new role, and what will be his top challenges?
Schools are embracing the use of technology to cut costs, to perform research, roll out computer-based classes and exercises and to compete for students. At the same time, the school administration is being asked by parents, state, local, regional or even federal governments to make sure that students and faculty are...
Secure file sharing, syncing and associated productivity requirements impose pressing technical and operational challenges on organizations. Data must be secure. File sharing must adhere to company policies and industry regulations. At the same time, employees need fast, convenient access to content to be...
The consumerization of IT and the popularity of BYOD (Bring Your Own Device) are jeopardizing the security and integrity of business data. Seeking an easy way to share files across smartphones, tablets, and desktops, employees are signing up for free public cloud file sharing services that lack rigorous security and...
The Obama administration has reached a deal with EU representatives, pending Congressional approval, to give EU citizens the right to file lawsuits, in certain circumstances, if the U.S. has violated their privacy rights.
If the NSA's meddling in NIST cryptography standards soiled the reputation of the National Institute of Standards and Technology, an amendment approved by the House of Representatives could help restore it.
A privacy activist's case against Facebook for allegedly sharing Europeans' personal data with the NSA in violation of EU data protection rules has been referred to the European Court of Justice for review.
The Senate Intelligence Committee next week will consider long-awaited legislation that's designed to encourage businesses to share cyberthreat information with the federal government and each other.
The U.K. government's legal justification for spying en masse on British residents' online communications - Google searches, Facebook posts, Webmail - is questioned by privacy and Internet law experts as part of a case triggered by Edward Snowden's leaks.
Consumer rights advocates have applauded Apple's preview of iOS 8 privacy changes, including randomizing MAC addresses to help block retail analytics and unauthorized forms of device tracking.
Microsoft moves to quash a search warrant granting U.S. investigators the right to request copies of an overseas customer's e-mails that are stored in a data center in Ireland.
The FTC is urging Congress to enact privacy legislation that would provide consumers with more transparency about the activities of data brokers that collect sensitive health and financial data.
Internet users in the European Union can ask Google and other search engines to remove certain sensitive information from Internet search results, Europe's highest court ruled on May 13. ENISA praised the "landmark decision" on privacy.
Financial institutions are increasingly able to leverage mobile devices to empower customers to better secure online transactions, and to defeat malicious fraud attacks that attempt to highjack customer accounts. Join us to learn how mobility can best be used to bolster the security efforts of financial...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.