'An individual has no reasonable expectation of privacy in information voluntarily disclosed' is the premise being taken to the US Supreme Court Wednesday, to clarify if law enforcement must obtain warrants to access wireless data
Cyber threats are evolving quickly. Fortunately, so is incident detection and response (IDR), powered by data explains Eric Sun, with techniques such as honeypots identifying suspect behaviour.
There has been speculation about the impact of incoming GDPR on government schemes that monitise the data of citizens given to them for the delivery of a service, which is then sold on without the data owner's consent.
We now see 'weaponisation' of personal data against civilian groups largely indifferent to observation; as we live our lives online, criminal methods get easier, and rewards greater, cyber-crime is getting organised warns Peter Groucutt.
Don't simply reload backup data or even re-image the machine and then reload - it should undergo complete data sanitsation as progressive malware can leave behind elements that cause even more damage says Richard Stiennon.
Moving to the cloud? Don't neglect the security challenges. Ensure you have a security policy that works seamlessly across on-premise and cloud says Dave Nicholson
Formatting old devices or deleting old information and selling it to third parties is common, says Sunil Chandna but data is not permanently removed and destruction or, preferably, true erasure of data is necessary.
Before you start looking at GDPR you need to understand what PII data you have, where it is, who has access, who it is shared with, and ultimately, how you can best manage it according to GDPR requirements says Julian Cook.
The underlying principles of blockchains are perfect for creating data integrity across an enterprise's value chain, and, says Ian Smith, there are firms developing these 'enterprise blockchains': private, permission-based ledgers.
As organisations continue to embrace the benefits offered by diverse multi-cloud environments, it's essential that they're aware of how best to achieve both compliance and control says Peter Galvin.
Protecting this data goes beyond your internal data governance processes says Jim Kaskade, it tests how well the business governs customer data beyond the firewall.
All organisations based at least partially online and handling data across the EU must comply with the new GDPR rules yet 69 percent of UK businesses are not ready. Being unprepared is dangerous warns Dr Jamie Graves.
In Case You Missed It: Spyware in 1,000 apps; US global data grab; NSA tools used to hack hotels; Warcraft DDoS'd; Students narrow skills gap
Two US judges rule against Microsoft Ireland decision in cases pitting Google against DOJ
After eight years as an astronomer Dr Leila Powell, a security data scientist at Panaseer, switched careers to cyber-security. SC's Tony Morbin asks, why? how did it work out, and did it make any difference being a woman in this male-dominated world?
Data Privacy Day 2017 is here, and we're reminded once again of the need to raise awareness and promote privacy and data protection best practices.
ICYMI: 2017 predictions; Post-Brexit; Trusting employees; Card Phish scam; WhatsApp delivers malware
In Case You Missed it this week includes: CyberSec 2017 predictions; Brexit data implications; Employees too trusting; Credit card details phished; Mobile malware via WhatsApp
Dave Nicholson discusses how businesses can ensure their data is moved securely to the cloud.
Jason Hart discusses how data manipulation will be the biggest threat to businesses and public figures in the future
Jan Rochat, CTO of AET technologies, reminded an ISSE 2016 audience that the security boundaries of critical infrastructure are not quite as concrete at they seem
In the last year, 66.2 percent of financial services institutions have faced at least one cyber-attack.
Yahoo! has confirmed a major data breach of its systems, with the number of users affected standing at 500 million. It is currently suspected to be a state-sponsored attack, as it has similarities to other Russian attacks.
Scientific news service EurekAlert suffered a breach which saw the login details of thousands of journalists stolen. The company has now reformed the technology behind its website and is promising a brand new login system.
Conservatives within the Greater London Assembly have called for a higher standard of data security in the capital, with a Mayoral seal of approval for those that adhere to it.
Tony Anscombe discusses the biggest mistakes companies make when moving to the cloud and tips to reap the benefits
Two critical reports showed a lack of public trust in NHS security and confidentiality handling patient records causing the government to scrap plans for a unified doctor and hosptial patient database.
Ron Arden takes a data-centric approach to security where the focus is on protecting the data within a system, and not just the system itself
Nick Ioannou, head of IT for the Ratcliffe Groves Partnership, draws on his 26 years of experience in IT to claim using a combination of 26 different cloud based services means the company has IT power which could "compete with the big boys" in his industry.