While Office 365® offers a significant and useful set of productivity, collaboration and other services, it is not the only solution that most organizations will need to satisfy their archiving, data security, encryption, and in particular, their e-discovery requirements.
Download this detailed Osterman Research...
Australia's Parliament has passed new laws enabling it to compel technology companies to break their own encryption. Although the government argued the laws are needed to combat criminal activity and terrorism, opponents argued the powers could creep beyond their scope and weaken the security of all software.
Email is the most used business communication tool. This means the vulnerabilities of email should not be overlooked. Implementing the right email encryption solution can help secure sensitive corporate data, avoid the costs associated with breaches and meet regulatory obligations.
Download this eBook to learn more...
With the proliferation of applications - mobile, in-house, cloud - comes staggering amounts of data. And not just any data, but encrypted data. In fact, half of all current web traffic is encrypted data, with an anticipated rise to 75% by 2019. What is an organization to do?
While protecting data and mitigating...
Once again, a supposedly secure service allegedly marketed to criminals has proven to have limits. Dutch police have busted a "cryptophone" operation, allowing them to decrypt more than 258,000 encrypted chat messages, leading to a drug lab bust, 14 arrests and the seizure of cash, drugs and weapons.
The disagreements continue over Australia's efforts to pass legislation that would help law enforcement counter encryption. Technology companies and civil liberties organizations contend the latest draft of legislation would allow for too much secrecy and imperil privacy and security.
Massive, well-resourced companies are still using live customer data - including their plaintext passwords - in testing environments, violating not just good development practices but also privacy laws. That's yet another security failure takeaway from last year's massive Equifax breach.
Credit bureau Equifax has been hit with the maximum possible fine under U.K. law for "multiple failures" that contributed to its massive 2017 data breach, including its failure to act on a critical vulnerability alert issued by the U.S. Department of Homeland Security.
Intel has had a challenging time lately on the vulnerability front. It has issued yet another patch for its Management Engine after a researcher was able to extract two types of encryption keys. The problem was a repeat of one that Intel patched just last year.
A newly released report from the U.S. Government Accountability Office on the massive 2017 Equifax data breach provides a postmortem look at what went wrong, centering on the credit bureau's identification, detection, segmentation and data governance, as well as a failure to rate-limit database requests.
Canada, which has a head start on the adoption of digital payments, has learned some valuable security lessons that could be beneficial to the U.S., says Gord Jamieson of Visa. He'll be a featured speaker at ISMG's Fraud & Breach Prevention Summit: Toronto, to be held Sept. 11-12.
The global digital transformation is impacting the financial services industry profoundly. Changing customer
expectations, demand and behaviors are driving a wave of digital innovation by new disruptors and veteran
financial institutions alike.
Financial institutions are shifting from traditional perimeter IT...
It's déjà vu "FBI vs. Apple" all over again, as Reuters reports that the Justice Department is seeking to compel Facebook to build a backdoor into its Messenger app to help the FBI monitor an MS-13 suspect's voice communications.