Home Tags Sensitive Information

Tag: Sensitive Information

California may restore broadband privacy rules killed by Congress and Trump

State law could protect customers' browsing history, but FCC rule is still dead.

BrandPost: Moving Toward a Thinking Cloud

I went to IBM InterConnect* this spring, and therersquo;s great newsmdash;the cloud is becoming bigger, faster, and more secure.

And most exciting, itrsquo;s becoming smarter. Wersquo;re working with IBM to combine Intel technologies and expertise with IBM Cloud to create a cloud-native architecture that drives machine efficiency, maximizes resource utilization, and enables the creation of vastly scalable and powerful new applications like artificial intelligence (AI) and cognitive computing.Irsquo;ll explain how thatrsquo;s happening, but first let me tell you about bigger, faster, and more secure.

Those are advances you can use today to take control over your data to meet performance, security or data sovereignty regulation, protecting sensitive information in the cloud.To read this article in full or to leave a comment, please click here

Internet of snitches: anyone who can sniff ‘Thing’ traffic knows what...

'Smart' home IoT devices reveal dumb amounts of what they're up to every time they go online Princeton boffins reckon the Internet of woefully insecure things yields sensitive information about connected homes with nothing more than a bit of network traffic analysis.…

Vera Branching Out to Integrate with Duo Security, RSA SecureID, Twilio

Verarsquo;s job is to bolster usersrsquo; ability to ensure that only trusted individuals can access sensitive information in real time, regardless of its location.

Hack the server room! No tech required

As we are all painfully aware, IT security comes in many forms, from technical details to physical barriers.

But a word of advice: Double-check all your new security measures.

Then step back and think through anything that could be related to the changes you put in place.

Finally, check to make sure those, too, are secured adequately.I worked at one company some years ago where I was given an office near a server room. Not long before then, the IT execs had asked for measures to be taken to better secure the servers.[ Have a tech story to share? If we publish it, we’ll send you a $50 American Express gift card—and keep you anonymous.
Send it to offtherecord@infoworld.com. | We've all been there: 7 hardware horror stories from the help desk. | Follow Off the Record on Twitter and subscribe to the newsletter. ]
The concern arose because this server stored data for a billion-dollar operation that contained sensitive information we were required to preserve.

They wanted to tightly control access to the room.To read this article in full or to leave a comment, please click here

Hacker leaks Orange is the New Black new season after ransom...

Breach of post-production company poses potential threat to many networks' shows.

Chrome, Firefox, and Opera users beware: This isn’t the apple.com you...

Unicode sleight of hand makes it hard for even savvy users to detect impostor sites.

Flaws let attackers hijack multiple Linksys router models

Two dozen Linksys router models are vulnerable to attacks that could extract sensitive information from their configurations, cause them to become unresponsive and even completely take them over.The vulnerabilities were discovered by senior security...

Tanium exposed hospital’s IT while using its network in sales demos

CEO used client hospital's network in demo "hundreds of times," reports WSJ.

Penquin’s Moonlit Maze

Moonlight Maze is the stuff of cyberespionage legend.
In 1996, in the infancy of the Internet, someone was rummaging through military, research, and university networks primarily in the United States, stealing sensitive information on a massive scale.

To say that this historic threat actor is directly related to the modern day Turla would elevate an already formidable modern day attacker to another league altogether.

Doxed by Microsoft’s Docs.com: Users unwittingly shared sensitive docs publicly

Microsoft pulled search bar from site after security researchers raised red flags.

Norfolk County Council sent filing cabinet filled with kids’ info to...

And all it got in return was a £60k fine Updated  Norfolk County Council left files containing sensitive information about children in a cabinet which was dispatched to a second hand shop.…