Thursday , 19 July 2018
Home >> S >> Security (page 2)

Security

Well, it’s secure, all right…

This small IT consulting outfit gets a contract with a very, very big company — which is a very big deal, says a pilot fish at the consultancy. “On a daily basis, a large text data file needs to get loaded into a very fast database, and that information is used to deal or not deal with certain customers,” fish ... Read More »

Gatwick Airport looking to bolster security by measuring brain waves

Non-malware attacks and ransomware take centre stage This report looks at research from over 1000 organisation, representing more than 2.5 million endpoints, to understand the prevalence and growth of non-malware attacks. Download now to find out more. Download Read More »

How deception technologies use camouflage to attract attackers | Salted Hash Ep 26

CSO Online | May 22, 2018 Host Steve Ragan reports from the show floor at RSA 2018, where talks with Chris Roberts, chief security architect at Acalvio Technologies, about the benefits and misconceptions of deception technologies. Read More »

Microsoft: We’re giving you all Euro-style GDPR rights over how we use your data

Video: To comply with EU, Google simplifies privacy settings. Microsoft has announced it will extend the rights available to Europeans under the EU’s new privacy regulation to all consumers across the world. The General Data Protection Regulation comes into effect this Friday, introducing a range of new Data Subject Rights for EU residents, such as the right to obtain data ... Read More »

Solving a blockchain conundrum: Biometrics could recover lost encryption keys

Blockchain could one day solve the online privacy problem by encrypting or scrambling personally identifiable information and issuing each person a random string of bits – a private key – created explicitly for unscrambling their data. The person holding the blockchain private key could issue various public keys controlling who has access to the personal data on the blockchain. So, for ... Read More »

Basic website flaw reveals real-time locations of most US mobile users

Customers of all of the major mobile US phone carriers could have had their locations tracked by almost anyone with rudimentary web skills thanks a bug in the website of LocationSmart. LocationSmart is a US aggregator of mobile phone location data. It sells this data to businesses to help them keep track of employees and assets and to advertisers to ... Read More »

IBM warns of instant breaking of encryption by quantum computers: ‘Move your data today’

(Image: Churchill Club) Quantum computers will be able to instantly break the encryption of sensitive data protected by today’s strongest security, warns the head of IBM Research. This could happen in a little more than five years because of advances in quantum computer technologies. “Anyone that wants to make sure that their data is protected for longer than 10 years ... Read More »

Tech Talk: Prepping for GDPR

Computerworld | May 18, 2018 CSO’s Michael Nadeau and Steve Ragan join Computerworld’s Ken Mingis and IDG Communications’ Mark Lewis to look at what the new EU privacy rules means. They offer insights on how companies can prepare – and what happens if they don’t. Read More »

Bitcoin now uses as much energy as Ireland and could match Austria by end of 2018

Non-malware attacks and ransomware take centre stage This report looks at research from over 1000 organisation, representing more than 2.5 million endpoints, to understand the prevalence and growth of non-malware attacks. Download now to find out more. Download Read More »

Tech Talk: As GDPR looms, companies rush to comply

For many companies, GDPR has become a four-letter acronym. The European Union’s new General Data Protection Rule – which applies to virtually any kind of data that can be used to identify a person – goes into effect May 25. And companies around the world are rushing to make sure they’re in compliance, or at least can demonstrate that they’re ... Read More »

close
==[ Click Here 1X ] [ Close ]==