Privacy

Back to Topic page

Why You Deserve More for Your Data

Unless you live in a cave and have never touched a smartphone or computer, you will already know that it’s impossible not to leave a personal data trail while navigating the digital world. Invisible cookies are constantly watching our activities and algorithms making suggestions for the benefit of the digital economy. ...

Should Companies Do Most of Their Computing in the Cloud? (Part 2)

Let me start by describing two approaches to the cloud.Most of the students I meet at Harvard University live their lives in the cloud. Their e-mail, documents, contacts, calendars, photos and everything else are stored on servers belonging to large internet companies in America and elsewhere. They use cloud ...

Can a Company Remotely Wipe an Ex-Employee's Device?

One of my favourite sayings about cyber risk is "an ounce of prevention is cheaper than the very first day of litigation." A recent case provides a nice example of exactly what I mean. In this case, an effective BYOD policy could have saved this company tens of thousands ...

Internet of Things: Can we Afford to Lose on Privacy and Security?

For over a week I have been super emphasizing on the Internet of Things (IoT) and its possible implications on various sorts of industries, businesses. While the buzz of IoT bringing a 'wave of change' is a mix of reality and hype, we also have to be aware of and ...

Interview: Charles Weaver, CEO of MSPAlliance

In today's interview, Jack Koziol of the InfoSec Institute talks with Charles Weaver, the co-founder and CEO of the MSPAlliance. In addition to running the daily operational operations of the association, he writes and speaks extensively around the world on issues and topics related to the managed services industry.Prior to founding the ...

InfoSec to Revolve Around Politics, Crime and Encryption in 2014

The year 2014 will be a year of continued change in the ICT security world. It will be a year in which some very fundamental, unfinished business that originated in 2013 and earlier years will be carried forward and will be heading for an outcome. Making any prediction for the ...

Mobile Network Developers Pressured to Weaken Encryption

The Edward Snowden leaks pertaining to data collection by intelligence agencies has thrown a spotlight on government surveillance over-reach, and most would believe that the impetus for the enhanced monitoring was in reaction to the infamous September 11, 2001 attacks that brought down the World Trade Centers in New York, ...

Will Restrictive BYOD Management Lead to Failure?

Bring Your Own Device (BYOD) is becoming a rule rather than the exception in most corporate environments. Supporters of BYOD emphasize on increased productivity, employee satisfaction and retention as some of the key benefits.A recent report titled Global State of Enterprise Mobility for the Past, Present and Future gives ...

Exploit Risks for Competitive Advantage

Late last month Grey Head Media and Ernst & Young India co-organized its first Dynamic CISO Summit in Mumbai with a clear focus to get real-life teachings from top security practitioners in the country.During the conference, few CISOs from more evolved organizations were of the view that dependence only on technical ...

Majority of Mobile Apps Allow Access to Private Data

Researchers report that the vast majority of mobile applications tested allow access to users' private data stored on the device, leaving users at risk of data loss from vulnerabilities. After scanning 2,107 applications that are offered by 601 different developers, the researchers found that 97% were designed to access private ...

When Data Breaches Go Unreported

A blind survey of 200 of malware analysts reveals that the majority acknowledge that they have participated in investigations or security incident response activities for data breaches that were never disclosed the affected organization. This would indicate that the 621 reported data breaches in 2012 that were included in Verizon's 2013 Data Breach ...

Over-sharing Riskier Than Government Snooping

Lately, there has been an uproar over disclosures regarding the rather ambitious US program known as PRISM and the harvesting of metadata from mobile phone calls, both programs administered by the NSA which are designed to gain access to what we would like to think is private information.While the widespread rage ...

What We Think of Privacy is all Wrong

The New York Times has a good feature article on the work of Alessandro Acquisti, a professor specializing in behavioral economics at Carnegie Mellon University. His work has long fascinated me, and he continually produces new studies that defeat our cherished assumptions about privacy. I'm delighted that the New York Times has chosen ...