Security and Privacy

Latest Headlines

Latest Headlines

Spotlight: Chinese military members caught hacking US companies

A grand jury in the Western District of Pennsylvania indicted five members of the Chinese military on charges of hacking and economic espionage.

Big data moving slowly ahead in human resources

While big data was introduced to the general public on the heels of the Snowden revelations with alarm and warning sirens, big data projects in the private sector have become so commonplace that they no longer see much fanfare. One of the quietest fronts is in human resources.

Along came the Data Transparency Coalition to clear things up

The international trade group is celebrating the success of its top legislative priority: President Obama's signature on the Digital Accountability and Transparency Act, or DATA Act in May.

Security firm warns of 'massive' malware infections impacting WordPress sites

Security firm Sucuri is warning WordPress admins that a "massive" malware infection is wreaking havoc on WordPress websites. Sites with outdated plugins or weak passwords are particularly at risk.    

When to hire--and forgive--a CISO

A growing awareness of cyber threats has many organizations adding the role of chief security officer or chief information security officer. Bob West shares his thoughts on when you need one, and what you should hold them accountable for.

News Scan: Female IT execs earn $25,000 less than male counterparts; Utility IT leaders report no sense of cyber security; more

The top news stories for July 22, 2014.

Microsoft: Ditch password managers and strong passwords

Rather than trying to use unique, complex passwords for every single Web service or computer system, a paper from Microsoft suggests you use simple password for sites and services that don't provide access to sensitive or valuable data.

EFF unveils hacking contest to make small business, home routers more secure

Working together with the company Independent Security Evaluators, the Electronic Freedom Foundation is running a security bug-finding competition at the Defcon 22 security conference that will be held in Las Vegas next month.

Bon appetit: Restaurants can document who you're dining with

Restaurant chains tout them as a customer convenience that you can use to order your food, pay your tab, and even buy games to keep your kids occupied at the table. But there's one more thing those tablets can be used for that you should be mindful of--they can collect data on your visit from pictures or videos of who you sat down at the table with to what you ate and drank to who paid the bill.

Announcing my new book Data Divination: Big Data Strategies

Data Divination: Big Data Strategies was written to focus entirely on strategy from how to accurately calculate ROI, present a winning business case and empower your workforce from the CEO down, to developing overall and project-specific strategies that actually work.