Insurance Companies Are Monitoring Personal Telemetry

|
Insurance companies are pairing technology, incentives and science to inform and reward customers to make healthy choices every day. But is there a dark side to this increasingly intrusive personal monitoring? Christopher Burgess investigates ... Read More

Secure Communications and the Militarization of Space

|
With the growing proliferation of anti-satellite (ASAT) weapons, the militarization of space has begun. So, what of service providers? How are they protecting their communications infrastructure and the data within? ... Read More
Hamas is Using Apps for Social Engineering

Hamas is Using Apps for Social Engineering

|
Hamas, the largest of the Palestinian militant Islamist groups, is creating malicious apps specifically targeted at the Israeli soldier. Using the reach of Facebook and WhatsApp, they have been promoting sports and dating apps to “commercially” targeted audiences with the intent of eliciting personal and professional information ... Read More

You and Your Devices at the United States Border

|
Traveling for business with your employer’s devices? Here's what you need to know regarding Customs and Border Patrol officers' searches of your electronic gadgets ... Read More

Consumer Security: What Are They Experiencing?

|
A new report by the Federal Trade Commission (FTC) reveals that the top three cybersecurity issues affecting consumers are identity theft, debt collection and imposter scams. What can our industry and government do to help protect our consumers? ... Read More

What Infosec Can Learn from Pro Sports

Absent a national draft for bringing new talent into infosec teams and without a transparent free agency, we have social networks like LinkedIn where talent quietly signals they are ready for a change and recruiters act in a sub rosa manner to get key talent into open positions. The opposite ... Read More

Food Security and Smart Packaging

Companies throughout the world are required to track the food we consume from farm to table. In this blog, we discuss the importance of protecting our food supply, both current and future, for the benefit and safety of each and every one of us ... Read More

Don’t Throw the Baby Out With the Bath Water

Lack of interest in managing the IT asset disposal process is putting companies both large and small at risk. We discuss how a company can ensure their retired devices are cleanly wiped or fully destroyed so that sensitive corporate data is not inadvertently exposed ... Read More

The Phisher Kings

It’s unanimous: the Phisher Kings are alive and well. Industry threat and intelligence reports reveal that time and again, you, your employees, your customers and your friends and family are all potential targets. We take a look at some of the latest reports, and discuss how to mitigate this threat ... Read More

Social Networks and Operational Security

Do your executives and employees post on social networks? Here’s the lowdown on how (and why) all companies should provide basic guidance on responsible social media usage to every employee ... Read More
Loading...