Last month, I wrote an article on the Emergence of Smartphones as a Key Platform for Security Industry that discussed the growing ubiquity of smartphones within the workplace and the increasing number of mobile apps that have the ability to collect information from its environment such as video streams, audio streams, indoor location and information from other sensors.
The U.S. Justice Department is creating a unit within the criminal division to advise on electronic surveillance in cyber investigations and work with the private sector to prevent online crime.
Over the past three years, most healthcare data breaches were the result of lost or stolen devices, not hacking (only 23 percent). For records breached, 76 percent were the result of a loss or theft.
Sixty-one percent of Americans believethat their data is not secure, according to a survey from PKWARE. Theft of financial and identity information causes the most concern among respondents, with the leading data at risk cited as Social Security numbers and banking information, including credit cards.
Traditional network security risk management techniques are often inadequate to meet the specialized needs of enterprises' control systems. The good news is that a host of free resources exists to cover this important field of security, risk management, compliance and operational continuity.
Coca-Cola is facing a potential class-action lawsuit after one of the people whose personal data was on one of a clutch of laptops stolen from the company says he suffered identity theft as a result of the breach.
Data security used to be relatively simple. Office buildings and areas within them presented clear “perimeters” that companies could protect with locks, alarms, and if necessary, searches of belongings.