Home Tags Sensitive Information

Tag: Sensitive Information

Regulators Question Wells Fargo Regarding Data Breach

Scrutiny a result of a lawyer's unauthorized release of sensitive information on tens of thousands of wealthy Well Fargo customers.

Cybercriminal with Ties to Exclusive Russian Hacking Forums Sentenced to Prison

L.A. resident is sentenced to 110 months in prison for stealing and trafficking sensitive information on exclusive Russian-speaking cybercriminal forums.

Automobile Association under fire for car-crash handling of data breach

Motoring org denies sensitive information was exposed Breakdown and car insurance outfit AA has been scolded for its handling of a data breach that spilled customer email addresses and partial credit card numbers.…

California may restore broadband privacy rules killed by Congress and Trump

State law could protect customers' browsing history, but FCC rule is still dead.

BrandPost: Moving Toward a Thinking Cloud

I went to IBM InterConnect* this spring, and therersquo;s great newsmdash;the cloud is becoming bigger, faster, and more secure.

And most exciting, itrsquo;s becoming smarter. Wersquo;re working with IBM to combine Intel technologies and expertise with IBM Cloud to create a cloud-native architecture that drives machine efficiency, maximizes resource utilization, and enables the creation of vastly scalable and powerful new applications like artificial intelligence (AI) and cognitive computing.Irsquo;ll explain how thatrsquo;s happening, but first let me tell you about bigger, faster, and more secure.

Those are advances you can use today to take control over your data to meet performance, security or data sovereignty regulation, protecting sensitive information in the cloud.To read this article in full or to leave a comment, please click here

Internet of snitches: anyone who can sniff ‘Thing’ traffic knows what...

'Smart' home IoT devices reveal dumb amounts of what they're up to every time they go online Princeton boffins reckon the Internet of woefully insecure things yields sensitive information about connected homes with nothing more than a bit of network traffic analysis.…

Vera Branching Out to Integrate with Duo Security, RSA SecureID, Twilio

Verarsquo;s job is to bolster usersrsquo; ability to ensure that only trusted individuals can access sensitive information in real time, regardless of its location.

Hack the server room! No tech required

As we are all painfully aware, IT security comes in many forms, from technical details to physical barriers.

But a word of advice: Double-check all your new security measures.

Then step back and think through anything that could be related to the changes you put in place.

Finally, check to make sure those, too, are secured adequately.I worked at one company some years ago where I was given an office near a server room. Not long before then, the IT execs had asked for measures to be taken to better secure the servers.[ Have a tech story to share? If we publish it, we’ll send you a $50 American Express gift card—and keep you anonymous.
Send it to offtherecord@infoworld.com. | We've all been there: 7 hardware horror stories from the help desk. | Follow Off the Record on Twitter and subscribe to the newsletter. ]
The concern arose because this server stored data for a billion-dollar operation that contained sensitive information we were required to preserve.

They wanted to tightly control access to the room.To read this article in full or to leave a comment, please click here

Hacker leaks Orange is the New Black new season after ransom...

Breach of post-production company poses potential threat to many networks' shows.

Chrome, Firefox, and Opera users beware: This isn’t the apple.com you...

Unicode sleight of hand makes it hard for even savvy users to detect impostor sites.

Flaws let attackers hijack multiple Linksys router models

Two dozen Linksys router models are vulnerable to attacks that could extract sensitive information from their configurations, cause them to become unresponsive and even completely take them over.The vulnerabilities were discovered by senior security...

Tanium exposed hospital’s IT while using its network in sales demos

CEO used client hospital's network in demo "hundreds of times," reports WSJ.