Businesses have always outsourced work. It used to be plumbers and what were referred to as “the trades”. Now it is programmers and manufacturing. What is different now is the degree of connectedness that those suppliers have. A couple of examples: Target uses HVAC contractors to maintain the refrigeration in their stores. It used to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Billboard is reporting that Sony and the employees suing them as a result of the breach last year have come to a tentative agreement. The employees were suing for negligence and privacy violations. If the settlement is approved, The employees will get $2 million – up to $1,000 each – for preventative measures taken against […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Price Waterhouse surveyed 10,000 CEOs, CFOs, CIOs and other executives and amazingly only 45% said their boards participated in cybersecurity strategy. While that is up from 42%, it should be close to 100%. The PwC study respondents reported a 38% uptick in cyber-assaults since 2014, with the boards spending $77 billion on tools and processes […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
First, the European Court of Justice (ECJ) rules that the 15 year old Safe Harbor agreement which allowed companies to transfer data between the E.U. and the U.S. was invalid. Effective immediately. Then the Article 29 Working Group (who is responsible for Safe Harbor) met and said that if the E.U. and U.S. don’t come […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Google interviewed and/or surveyed hundreds of users and experts to see how they thought on security issues. Not completely surprisingly, there were many differences. Here are a few: The #1 difference between experts and real people is in INSTALLING UPDATES. Experts rated that as the most important thing to do to improve security. 35% of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Wired and other media are reporting the the head of the CIA, John Brennan, had his personal email account hacked. The hacker, a teenager, talked to Wired about how he did it. It points to general weaknesses in commercial online services security that you should understand. It is less of a surprise that Brennan’s commercial, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]