04/13/2013 - Join Martin Drew, CPP, of iView Systems for a May 22 Webinar on applying advanced data analytics to identify significant variations from the “norm” and to quantify regions of risk. Drew will be joined by Dean Correia, Emeritus Faculty, Security Executive Council. They will also discuss Industry research related to incident reporting.
03/29/2013 - It's not so easy to compile cell phone databases that can be used without revealing the original sources. A new virus appearing across the country locks victims computers and makes them think it's been done by the Department of Homeland Security or the FBI and can't be unlocked until they pay a fine. A look at decriminalization of drugs in Portugal twelve years after the change in policy. And more.
03/28/2013 - For a few hundred dollars in start-up money and a few hundred more a month, anyone can buy the tools and services they need to build and run a malicious botnet. That's just one of the reasons the cyberlandscape is so hard to police.
02/27/2013 - Security industry professionals have made tremendous headway in developing and improving secure technologies over the past few decades. Creating more sophisticated methods of authentication, combating malware and spam, and battling the threat of cybercrime head-on are just a few of the advancements in the industry lauded by Scott Charney, corporate vice president of trustworthy computing at Microsoft. He spoke on Tuesday at the RSA Conference in San Francisco, California.
02/06/2013 - Concerns are being raised about the European Commission's new cybersecurity strategy. Estonia is the poster child for cybersecurity. Homeland Security Secretary Napolitano says insistence that the border be secured before immigration reform is a flawed argument. A new GAO report says that the FCC was lax in security control for the Enhanced Secured Network Project.
12/19/2012 - An appeals court ruled that healthcare customers who suffered identity theft may sue the company after laptops containing customer data were stolen. The company argued that the customers had no standing.
12/19/2012 - An employee who downloaded confidential documents before going to a competitor did not violate the Computer Fraud and Abuse Act. The law, ruled the court, applies to those who access data without authorization.