Remove 2013 Remove Information Security Remove Surveillance Remove Technology
article thumbnail

Cisco to pay $8.6 million fine for selling flawed surveillance technology to the US Gov

Security Affairs

Back in 2008, a whistle-blower identifies a vulnerability in Cisco video surveillance software, but the tech giant continued to sell the software to US agencies until July 2013. Cisco finally addressed the flaws in 2013 and stopped selling Cisco Video Surveillance Manager (VSM) in 2014. Cisco is going to pay $8.6

article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. I wrote the essay below in September 2013. Those of us in the information security community had long assumed that the NSA was doing things like this.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Challenges Facing the Passwordless Future

eSecurity Planet

In 2013, for example, the FIDO Alliance was created to solve the world’s password problem by replacing login technology. But beyond these cases, how advanced is the implementation of the technology that wants to end passwords once and for all? The Challenges of New Authentication Technologies.

Passwords 117
article thumbnail

Why become certified to ISO 27001?

BH Consulting

One way to do this is to become certified to the ISO 27001 information security standard. It’s not a technology product or service but a way of demonstrating security by applying repeatable policies and documented procedures to manage risk. It is not limited to IT and is not a security checklist or risk analysis method.

Risk 52
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

His approachable style and his desire to teach others what he’s learned about information security has resulted in a massive following of half a million subscribers. So, in 2013, I also started working as a penetration tester doing web application penetration tests or application security tests, mostly code audits, code review.

Media 52
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

His approachable style and his desire to teach others what he’s learned about information security has resulted in a massive following of half a million subscribers. So, in 2013, I also started working as a penetration tester doing web application penetration tests or application security tests, mostly code audits, code review.

Media 52