On Chinese-Owned Technology Platforms
Schneier on Security
FEBRUARY 25, 2021
I am a co-author on a report published by the Hoover Institution: “ Chinese Technology Platforms Operating in the United States.”
Schneier on Security
FEBRUARY 25, 2021
I am a co-author on a report published by the Hoover Institution: “ Chinese Technology Platforms Operating in the United States.”
Schneier on Security
FEBRUARY 21, 2020
I teach cybersecurity policy and technology at the Harvard Kennedy School of Government. My most recent two books, Data and Goliath -- about surveillance -- and Click Here to Kill Everybody -- about IoT security -- are really about the policy implications of technology.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Schneier on Security
DECEMBER 2, 2022
Technology changes the amplitude of the noise. The risks we face today are existential in a way they never have been before. The magnifying effects of technology enable short-term damage to cause long-term planet-wide systemic damage.
Schneier on Security
DECEMBER 14, 2020
But as with many things, technology is fundamentally changing the nature of persuasion. Democratic societies, in particular, are in dire need of a frank conversation about the role persuasion plays in them and how technologies are enabling powerful interests to target audiences.
Security Boulevard
MARCH 21, 2023
Digital fraud and cybersecurity risks are always with us, and they’re constantly changing as businesses open new channels and adopt new technologies that criminals work to exploit.
Joseph Steinberg
DECEMBER 2, 2022
Patent number US 11,438,334 entitled Systems and Methods for Securing Social Media for Users and Businesses and Rewarding for Enhancing Security , discloses a robust invention that addresses the risks that posts to social media may pose to businesses and individuals alike.
Security Boulevard
MAY 16, 2022
Recently, Google demonstrated a new smart glasses technology. The post Privacy As Enabling Technology appeared first on Security Boulevard.
Schneier on Security
OCTOBER 30, 2020
Sunoo Park and Kendra Albert have published “ A Researcher’s Guide to Some Legal Risks of Security Research.” Our Guide gives the most comprehensive presentation to date of this landscape of legal risks, with an eye to both legal and technical nuance.
Security Boulevard
JUNE 10, 2021
Operational technology, or OT, is hardware and software technologies that monitor and control a variety of physical operations including, but not limited to processes, devices, and even various infrastructures like public rail transportation.
Security Boulevard
APRIL 27, 2021
Cigent Technology today launched Cigent Data Defense, an offering that combines existing multifactor authentication and encryption capabilities to secure sensitive data residing on solid-state drives (SSDs).
Joseph Steinberg
OCTOBER 12, 2022
Join Bonnie Stith, former Director of the CIA’s Center for Cyber Intelligence , and and Joseph Steinberg, renowned cybersecurity expert witness and columnist , for a special, free educational webinar, Best Practices for Asset Risk Management in Hospitals.
Security Boulevard
JANUARY 18, 2022
Not unlike the rest of the Internet Technology universe, the Insider Risk solutions landscape is cluttered with an alphabet of acronyms representing government agencies and technologies.
eSecurity Planet
FEBRUARY 11, 2022
Risk management is a concept that has been around as long as companies have had assets to protect. This article looks at cybersecurity risk management, how to establish a risk management system, and best practices for building resilience. What is Cybersecurity Risk Management?
Approachable Cyber Threats
FEBRUARY 1, 2023
They also know that technology plays a vital role in delivering that standard of care. > COMPLEXITY Modern healthcare organizations continuously adopt cutting edge technology and integrate it with legacy technology.
CyberSecurity Insiders
JANUARY 5, 2022
Technology in healthcare has the potential to make all the difference in terms of safety outcomes. But technology isn’t always safe. However, technology ultimately is doing more good than bad in healthcare. This blog was written by an independent guest blogger.
Security Boulevard
OCTOBER 30, 2022
Rafal Los, host of the popular Down the Security Rabbithole Podcast, joins us to discuss CISO liability risk and the ongoing discussion in the cybersecurity community about CISOs going to jail.
Security Boulevard
SEPTEMBER 23, 2022
Earlier this month, the Health Sector Cybersecurity Coordination Center (HC3) issued a grave warning about the security implications of emerging technology in the healthcare sector. The post The Increasing Insider Risk of Emerging Healthcare Technology appeared first on DTEX Systems Inc.
CyberSecurity Insiders
AUGUST 23, 2022
Did you catch The ‘Hottest’ IT Security Technologies in 2022 webinar? This webinar focused on which security technologies are most widely deployed and most planned for acquisition in 2022. Deception technology / distributed honeypots. Deception technology / honeypots.
Schneier on Security
MARCH 1, 2021
The company outsourced much of its software engineering to cheaper programmers overseas, even though that typically increases the risk of security vulnerabilities. In other words, the risk of a cyberattack can be transferred to the customers.
Security Boulevard
AUGUST 5, 2022
RiskLens , the leading provider of cyber risk quantification (CRQ) and cyber risk management software and services, has been awarded top honors as 2022 Cyber Risk/Security solution of the year by Risk.net in its annual Risk Technology Awards.
Security Boulevard
APRIL 8, 2021
New Acquisition Adds Comprehensive Cyber, Privacy & Data Protection Solutions April 08, 2021 08:00 ET | Source: StrikeForce Technologies, Inc. April 08, 2021 (GLOBE NEWSWIRE) — StrikeForce Technologies, Inc.
Security Boulevard
NOVEMBER 23, 2021
The post Is Ransomware a Technology Pandemic in the Making? Cloud Security Cybersecurity Data Security Governance, Risk & Compliance Malware Security Boulevard (Original) Threat Intelligence Vulnerabilities Health Care Security international cybersecurity Ransomware U.S.
Tech Republic Security
JANUARY 9, 2023
Organizations, regardless of size, face ever-increasing information technology and data security threats. The post Security risk assessment checklist appeared first on TechRepublic. Everything from physical sites to data, applications, networks and systems are under attack.
Adam Shostack
APRIL 29, 2021
It opens “While many forms of data-driven surveillance are now a ‘fact’ of contemporary life amidst datafication, obtaining concrete knowledge of how different institutions exploit data presents an ongoing challenge, requiring the expertise and power to untangle increasingly complex and opaque technological and institutional arrangements.” They’re working on living their lives, and hoping technology helps.
Security Boulevard
JUNE 22, 2022
Security Information Event Management (SIEM) systems are an outdated technology. It’s no longer enough to just manage information – today’s organizations need technology that can proactively detect and respond to dynamic threats as well. Why SIEM technology is no longer enough.
CompTIA on Cybersecurity
APRIL 21, 2022
With compounding cyber risks businesses must begin to take a holistic approach to cybersecurity that starts with people and process—then technology
NSTIC
JULY 5, 2022
Given the increasing reliance of organizations on technologies over the past 50 years, a number of risk disciplines have evolved into full-fledged risk programs. In recent years, cybersecurity, supply chain, and privacy risk management programs have formalized best practices.
Dark Reading
AUGUST 19, 2019
As employees grow more comfortable using new technologies, they could inadvertently be putting their enterprises at risk. And that leaves security teams having to defend an ever-expanding attack surface
Security Boulevard
NOVEMBER 22, 2022
Also, striking a balance between security and people, process and technology versus the risk/reward was something that both security leaders and business leaders need to confront and deal with every day.
Dark Reading
OCTOBER 1, 2021
With the easing of pandemic-related restrictions, enterprise defenders report they are investigating security operations technology to manage new risks that emerged over the past year
SecureWorld News
JANUARY 30, 2023
With the advent of advanced networking technologies, school districts have been able to improve the learning experience and become more efficient. However, these technological advancements also introduce new risks, particularly in the form of cyberattacks.
Troy Hunt
DECEMBER 30, 2018
So here it is - 10 Personal Financial Lessons for Technology Professionals. For example, the ICT industry (Information, Communication, Technology) was the 5th highest paying with an average salary of $104,874 (dollars are Aussie, take off about 30% for USD). Then there's this: Today, the Information & Communication Technology (ICT) industry dominates, with salaries from six roles within the industry featuring in the top 20. Which brings us to risk. Patience.
Security Boulevard
AUGUST 3, 2021
As both customer bases and companies adapt to modern technologies and. The post Data Laundering Poses Privacy, Security Risks appeared first on Security Boulevard.
CompTIA on Cybersecurity
FEBRUARY 23, 2023
Tech companies should be cautious with ChatGPT and other AI chatbot tools—and evaluate possible cyber risks, says CompTIA CEO Todd Thibodeaux
Cisco Security
SEPTEMBER 26, 2022
As Technology Audit Director at Cisco, Jacob Bolotin focuses on assessing Cisco’s technology, business, and strategic risk. Risk Management and Formula One. Risk management, assessment, and assurance are vital to establishing this confidence.
eSecurity Planet
NOVEMBER 5, 2021
Enterprise risk management software can provide risk monitoring, identification, analysis, assessment, and mitigation, all in one solution. . Jump to: Top Risk Management Software Vendors What is Risk Management? Top Risk Management Software Vendors.
Adam Shostack
DECEMBER 11, 2019
The Open Technology Institute has an Open Letter to Law Enforcement in the U.S., UK, and Australia: Weak Encryption Puts Billions of Internet Users at Risk. In closely related news, nominations for the 2020 Caspar Bowden Award for Outstanding Research in Privacy Enhancing Technologies are open. Lastly, the Port of Seattle is considering putting rules in place around facial recognition technology.
SecureWorld News
SEPTEMBER 21, 2020
Major fines and major findings in the Capitol One data breach investigation. Here is what a U.S. regulatory agency revealed about the bank data breach
Tech Republic Security
AUGUST 24, 2021
Risk officers would rather stay in their compliance roles than add data usage to their duties, EY survey says
CyberSecurity Insiders
JANUARY 28, 2022
The technological revolution of agriculture is here. Particularly in the context of climate change and a growing global population , the role of emerging technology in the farming industry will be critical to the success and thriving of future generations.
Adam Levin
SEPTEMBER 9, 2019
Insider risk, supply chain vulnerability and vendor risk all boil down to the same thing: the more people have access to your data, the more vulnerable it is to being leaked or breached. The typical narrative is that someone with inside knowledge of a company or its technology is able to exploit it to some sort of ill purpose. It seems increasingly apparent that risk has as much to do with a company’s HR department as it does its cybersecurity policy.
Bleeping Computer
MARCH 29, 2023
Technology Artificial IntelligenceAI professors and developers have co-signed an open letter to artificial intelligence labs, calling them to pause the development and training of AI systems more powerful than GPT-4 for at least six months. [.]
Security Boulevard
JULY 26, 2022
We are not a patient society, and we are made less patient as technology continues to evolve. The post Employees That Circumvent Access Introduce Risk appeared first on Security Boulevard.
Let's personalize your content