Internet of Things (IoT) is becoming important to remain competitive for almost every industry out there. Business goals for implementing IoT can range from improving internal operations to offering completely new services to improving regulatory compliance. But who at each company should be responsible for digging into this new world and defining how to implement IoT? We’ve learned that it’s important to have supporters across several groups to develop a truly successful IoT solution:
In the news, researchers say AMD processors have serious vulnerabilities and backdoors, hijacked MailChimp accounts used to distribute malware banking, Voodoo Kali, for Equifax executive charged with insider trading after data breach, & more on this episode of Application Security Weekly!
Building a slide deck, pitch, or presentation? Here are the big takeaways:
Facebook knows a lot about you. And so do the third-party app makers and partners in the social network’s ecosystem.
Quite likely, the single most significant data security educational series of blog posts this year – via the Imperva Cyber Security Blog,written by Elad Erez and Luda Lazar – now in Part 3 of the series (Part 1 and Part 2 are highly recommended as well). Rather than put my spin on what Elad and Luda have presented on the Imperva blog, I’ll let their brilliant speak tell the tale! Today’s highly important Must Reads.
Over the weekend, a series of media reports revealed that a data analytics firm hired by the Trump campaign to target voters, called Cambridge Analytica, obtained information on 50 million people from a researcher who scraped it from Facebook. It wasn’t a breach, but it was a startling reminder of how Facebook as a platform can be made to work against users’ interests without their knowledge.
open a data center in Switzerland to address Western government concerns
In December 2017, Versa Networks in tandem with Dimensional Research conducted a survey examining hundreds of participants across five continents with the primary goal of capturing how companies are managing and securing their network across branch locations. In addition, the research also investigated the expected benefits and challenges of a software-defined WAN (SD-WAN) and revealed trends when compared to a similar survey conducted in 2016.
Researchers at cybersecurity technology and services provider Digital Defense have identified another round of vulnerabilities affecting products from Zoho-owned ManageEngine.
Pandora announced this morning it’s acquiring digital audio ad technology firm AdsWizz for $145 million, as a combination of at least 50 percent cash, with the remaining paid in either cash or stock at Pandora’s discretion. The company, whose technology will be used to upgrade Pandora’s own ad tech capabilities, will continue as a subsidiary headed by CEO Alexis van de Wyer.
The National Institute of Standards and Technology canonical Systems Security Engineering guide SP 800-160 provides a catalog of systems and procedures that developers can use to build secure IT networks from the ground up.
Accelerometers are everywhere. You’ve probably got at least one on your person right now. But today’s run-of-the-mill accelerometers—MEMS devices that measure a minute change in capacitance—just aren’t very sensitive. They’re built to fit into smartwatches and smaller things, and that small size hampers how well they can sense changes. Engineers in Florida have now come up with a new take on the accelerometer that is as much as 1 million times as sensitive as a typical smartphone accelerometer, and it maintains that sensitivity up to a car-crash-scale 100 gs.
Let’s take a journey through a real-life booter and stresser service to better understand the tools, the trade and pricing behind DDoS-as-a-Service.
I’m familiar with Roblox because my 8-year old daughter watches YouTube videos of kids playing the game almost every day. I’m also familiar with Roblox because she whined while we were running errands one weekend that she needed to “get on the internet right now” because she had scheduled a playdate with a friend in Roblox. And I’m familiar with Roblox because the other day, she uttered, “ugh, this obby,” which forced me to turn to Google like the old person I am to find out what the heck an obby was.
With so many different areas of the company involved in our journey to becoming compliant with the General Data Protection Regulation (GDPR) by May 25th, it was essential for us to have a strong program manager mapping our route.
Dropbox said it would be increasing its IPO price range – the range for which it will sell its shares for its initial public offering — from $16-$18 per share to $18-$20 per share, giving the company a valuation that could reach close to $8 billion, according to an updated filing with the Securities and Exchange Commission.
LONDON — Conservative strategist Stephen K. Bannon oversaw Cambridge Analytica’s early efforts to collect troves of Facebook data as part of an ambitious program to build detailed profiles of millions of American voters, a former employee of the data-science firm said Tuesday.
There’s a seemingly never-ending stream of incidents in which data stored in the cloud turns out to have been exposed to the open internet for weeks. Or months. Or years. These leaks aren’t necessarily related to targeted attacks or breaches, but they are dangerous exposures that stem from small setup mistakes. Maybe sensitive information wound up in a cloud repository where it didn’t belong. Or data was stored in the cloud so anyone could access it without authentication controls. Or someone never changed a default password. Now, as part of a broader slew of cloud security announcements, Google Cloud Platforms will offer a potential solution to the chronic problem of misconfigured cloud buckets.