Managing Online Risk’s Monthly Recap (Mar. 2014) – Stories Relating to Online Security & Risk

working like a dog

Welcome to our monthly recap of stories relating to Online Security and Risk. This month’s stories cover many issues including: banking safely online; 6 cyber security myths; ISACA launches digital badges; this drone can steal what is on your phone; security & metadata; cyber security skills; Digital Life 2025; data breach notification requirements; the Snowden phone; Colbert explains cloud fog; and more.

These are some of the articles, reports, posts, etc. that caught our attention this week. We originally send them out through our twitter account @DGOnlineSec, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a weekly recap. The links will take you to their original sources, whether Lexology, PC Mag, SC Mag, NLR, and/or others. Enjoy and let us know some of the stories you’ve found interesting this week. Just share in the comments below.

  • 10 Simple Tips to Bank Safely Online | Robert Siciliano http://ow.ly/v9Yec
  • Journalists “need to wake up” to online security | Media news http://ow.ly/v9Ybh
  • Fandango, Credit Karma Settle FTC Charges Over Data Security – http://WSJ.com http://ow.ly/v9Y5r
  • 6 greatest cybersecurity myths and why you should not trust them — Defense Systems http://ow.ly/v2ZA0
  • FTC Renews Call for Data Security Legislation – ACA International http://ow.ly/v2Zla
  • FDAnews Announces: Software and Cybersecurity Risk Management for Medical Devices, May 21-22 – Press Release – Digital Journal…
  • Info sec industry still struggles to attract women – CSO Online – Security and Risk http://ow.ly/uZ7OA
  • White House, Treasury officials to appear at SEC cyber security event | Reuters http://ow.ly/uWmfE
  • Obama to Call for End to N.S.A.’s Bulk Data Collection – http://NYTimes.com http://ow.ly/uWl4r
  • Infosecurity – ISACA Launches Digital Badges for Credential Verification http://ow.ly/uTFwS
  • European hackers gather in Geneva to test their skills – Taipei Times http://ow.ly/uTEJ3
  • Be Your Family’s Chief Security Officer | Robert Siciliano http://ow.ly/uTDNQ
  • Big data analytics boosts security | ITWeb http://ow.ly/uTDBw
  • Five reasons why risk managers should be social http://ow.ly/uTDli
  • The Illustrated History of Twitter http://ow.ly/uTBfO
  • This drone can steal what’s on your phone – Mar. 20, 2014 http://ow.ly/uQRNq
  • Full-Disclosure Listserv Suspends Operations: Very Sad Day for Internet Security http://ow.ly/uQREt
  • How to Secure Your Social Media Accounts – News – Wicked Local West Roxbury – Needham, MA http://ow.ly/uQQG9
  • Don’t shun the Internet of Things over privacy and security worries- The Inquirer http://ow.ly/uQQzT
  • New data protection guidance for app developers | Briefings | The Lawyer http://ow.ly/uQQwv
  • Security, Privacy and Metadata – The Data Center Journal http://ow.ly/uKgkt
  • Internet Of Things Meets Cars: Security Threats Ahead – InformationWeek http://ow.ly/uKg4F
  • Nearly half of identity thefts involve medical data – MarketWatch http://ow.ly/uKfIj
  • Eight cyber security tips I learned from The Walking Dead http://ow.ly/uHM6f
  • Help bring online/mobile privacy laws into the 21st century. Sign petition to get action on updating ECPA http://ow.ly/rGAge
  • A recent report found “small investments in cybersecurity preparedness can yield significant risk reductions” http://smg.io/1cR1XIt
  • ‘No business is too small to be at threat from cybercriminals’: @emm_david blogs for @HuffPostUKTech http://www.huffingtonpost.co.uk/david-emm/no-business-too-small-to-be-at-threat-from-cybercriminals_b_4965491.html … #SMB #security
  • System Accounts: #Password Dos and Don’ts
  • @FidSecSys http://www.threatgeek.com/2014/03/system-accounts-password-dos-and-donts–1.html …
  • 4 female leaders in the #tech industry: http://ow.ly/uBIiu
  • Check out this #infographic from the McAfee Labs Threats Report: Fourth Quarter 2013: http://ow.ly/uFMbz via @McAfee
  • WhatsApp flaw allows hackers to steal private Chats on Android devices http://lnkd.in/d44R94g
  • Experian security lapse have just exposed over 200 mn consumer IDs : BIZ TECH : Tech Times http://ow.ly/uAmmy
  • Cybersecurity Skills Haves and Have Nots http://ow.ly/uAmfa
  • Cyber Security Rises as Concern in Risk: Survey – The CFO Report – WSJ http://ow.ly/uAm9b
  • Sophisticated Mobile Apps Are Reshaping Campus Safety – Technology – The Chronicle of Higher Education http://ow.ly/uAl33
  • Here’s What The Internet Could Look Like In 2025 http://ow.ly/uxRZX
  • Terebrate: Books You Should Have Read By Now on Security http://ow.ly/uxRHG
  • Full List of Information Security Conferences in 2014 http://ow.ly/uvd1k
  • Elray Gaming Provides Security Outline for Bitcoin and Virtual Currency Holdings – http://WSJ.com http://ow.ly/uvceB
  • Businesses need federal terrorism risk insurance reauthorized – Richmond Times-Dispatch: Economic News http://ow.ly/uvc39
  • Data Breach Consumer Notification Requirements Vary | Law Technology News http://ow.ly/uvb90
  • Best Practices For Gramm-Leach-Bliley Compliance Re: Data Security and Customer Privacy | The National Law Review http://ow.ly/usNoC
  • Cyber-Security Creates New Pressures for IT Pros http://ow.ly/usLFV
  • 10 Ways to Build a Better Big Data Security Strategy – CSO Online – Security and Risk http://ow.ly/usKT5
  • Cyber Security Risk: Perception vs. Reality in Corporate America | Innovation Insights | http://Wired.com http://ow.ly/usK0Y
  • Barrett Brown hyperlink charges dropped | Naked Security http://ow.ly/ulom5
  • IT security for the daily life: Withdrawing money at cash machines with Google Glass | Science Codex http://ow.ly/ulkyI
  • Our 10 most important security takeaways from the RSA Conference | http://ITProPortal.com  http://ow.ly/ulkjr
  • FreedomPop Snowden Phone 10 Facts About This Secure Handset http://ow.ly/ulkgG
  • Bitcoin’s Mysterious Creator Is Said to Be Identified – http://NYTimes.com http://ow.ly/ulfJi
  • Maintaining Electronically Stored Information Forever Is Risky Business | Law Technology News http://ow.ly/uiJ0U
  • 10 Things You Need to Know About Digital Security http://ow.ly/ugj95
  • Has Privacy Become a Luxury Good? – http://NYTimes.com http://ow.ly/udBtJ
  • Hackers stole $473M of ‘Tinker Toy currency’ bitcoins | New York Post http://ow.ly/udBll
  • Daily Report: Lax Data Security a Problem for Many Start-Ups – http://NYTimes.com http://ow.ly/udAXX
  • Meet the seven people who hold the keys to worldwide internet security – HITC Tech http://ow.ly/ubdKJ
  • Can we protect ourselves from online privacy threats? – The Globe and Mail http://ow.ly/ubddn
  • Stephen Colbert explains Cloud Fog: part cloud, part fog, all security http://ow.ly/ubd2d

Managing Online Risk’s Monthly Recap (Feb. 2014) – Stories Relating to Online Security & Risk

network security

Welcome to our monthly recap of stories relating to Online Security and Risk. This month’s stories cover many issues including: call for new cyber security laws; regulating Bitcion; investigating Internet crimes; password security tips form experts; FCC & net neutrality; social media is new online security battleground; NIST security framework; connected cars & liability; and more.

These are some of the articles, reports, posts, etc. that caught our attention this week. We originally send them out through our twitter account @DGOnlineSec, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a weekly recap. The links will take you to their original sources, whether Lexology, PC Mag, SC Mag, NLR, and/or others. Enjoy and let us know some of the stories you’ve found interesting this week. Just share in the comments below.

  • Lawmakers Call for New Cyber Security Laws | DoD Buzz http://ow.ly/u5ZfS
  • China’s President Will Lead a New Effort on Cybersecurity – http://NYTimes.com http://ow.ly/u5YNL
  • HootSuite Launches Managed Social Media Security & Compliance Service for Enterprises – BWWGeeksWorld http://ow.ly/u3CRE
  • Computer Fraud With Digital Identity Theft Or Improper Use. Italian Law – Data Protection – Italy http://ow.ly/u3C7q
  • Now, Nations Mull the Ways to Regulate Bitcoin – http://NYTimes.com http://ow.ly/u3B2p
  • How to Secure Your Mac From Potential Theft http://ow.ly/u3Axu
  • Securing Your Mac Against Theft – ProfHacker – Blogs – The Chronicle of Higher Education http://ow.ly/u3Asn
  • Know and Control the Information About You in Big Data | Law Technology News http://ow.ly/u3Aj4
  • Apple Getting a Handle on Security Problems | Law Technology News http://ow.ly/u3A9J
  • Why The Next Wave Of Cyber Attacks Will Be Much Harder To Stop – Business Insider http://ow.ly/tYAlT
  • Social media users’ tips to avoid STIs | The Citizen http://ow.ly/tYzUA
  • The F.C.C. Tries Again – http://NYTimes.com http://ow.ly/tUhFm
  • Book Excerpt: Investigating Internet Crimes http://ow.ly/tToi2
  • Weapons of mass data destruction | IT PRO http://ow.ly/tT7Q2
  • 5 Simple Password Security Tips from Experts – Digits – WSJ http://ow.ly/tR7Ty
  • Data Security In 4 (Relatively) Easy Steps — Dark Reading http://ow.ly/tR7ks
  • Microsoft: Social Media Reputation Repair Costing Users Billions http://ow.ly/tR795
  • The Privacy/Security Clash’s Unexpected Consequence | Law Technology News http://ow.ly/tR5mS
  • F.C.C. Seeks a New Path on ‘Net Neutrality’ Rules – http://NYTimes.com http://ow.ly/tOLvT
  • Hackers Make Off With 300,000 Personnel Records at U. of Maryland – The Ticker – Blogs – The Chronicle of Higher Education…
  • Homeland: E-Security – http://DAWN.COM http://ow.ly/tMoSN
  • [Infographic] The Alarming Rate of Data Breaches | The Art of Data Protection http://ow.ly/tMowv
  • Why retailers aren’t protecting you from hackers – Feb. 18, 2014 http://ow.ly/tMo9x
  • Social media: The new Internet security battleground | http://ITProPortal.com http://ow.ly/tJS1P
  • Tightening up Security Is Everyone’s Responsibility | Robert Siciliano http://ow.ly/tJRmq
  • Smart cities are here today — and getting smarter – Computerworld http://ow.ly/tHBJT
  • Data Security Dos & Donts From The Target Breach – InformationWeek http://ow.ly/tHAVr
  • The Securitization of Social Media in China | Modern Tokyo Times http://ow.ly/tHAqS
  • Infographic: Drivers And Barries To BYOD Investing http://ow.ly/tHAaj
  • How the NIST cybersecurity framework can help secure the enterprise | PCWorld http://ow.ly/tHzdP
  • Types of Internet Security Threats and Its Prevention http://ow.ly/tHyy3
  • Ninth Circuit Rules Against Spokeo On FCRA Claim – Data Protection – United States http://ow.ly/tHydn
  • Bitcoin triggers security startups | The Journal Gazette http://ow.ly/tHxMx
  • FIDO Alliance Standard to Boost Authentication, Eliminate Passwords http://ow.ly/tHxI1
  • Why security pros should care about Bitcoin's troubles – CSO Online – Security and Risk http://ow.ly/tHxBU
  • “Connected cars” phenomenon raises data ownership and liability issues, says expert http://ow.ly/tHx02
  • Google Buys Another Security Startup SlickLogin To Protect Internet Users In New Ways : News : Headlines & Global News…
  • Android vs. iOS Security http://ow.ly/tHvpz
  • Kickstarter confirms data stolen in security breach – Tech News – Digital Spy http://ow.ly/tHv02
  • Is Social Media Putting Your Credit Card Data at Risk? http://ow.ly/tHuxD
  • Cybersecurity Framework http://ow.ly/tHs91
  • The Day the Internet Fights Back | Law Technology News http://ow.ly/txYpo
  • 10 Mobile Security Issues That Should Worry You http://ow.ly/txXJw
  • Building the security bridge to the Millennials – CSO Online – Security and Risk http://ow.ly/tvtzJ
  • Former NSA Security Architect Pushes Email Encryption For The Masses – Forbes http://ow.ly/tvt46
  • Personal Data Protection and Breach Accountability Act of 2014 would enact criminal penalties for “intentionally or willfully”
  • Reddit, Mozilla, Tumblr and Wikia to join anti-NSA online protest tomorrow http://ow.ly/tsDpr
  • Target, Neiman-Marcus, Michaels: How PCI data security standards are failing us | VentureBeat | Security | by Slava Gomzin, security and…
  • Mobile security from heartbeat to be used by Bitcoin – QR Code Press http://ow.ly/trxVE
  • FTC Approves Final Order Settling Charges Against TRENDnet, Inc http://ow.ly/trxHc
  • The 7 Deadly Sins of Application Security – InformationWeek http://ow.ly/tnNgQ
  • Security tips for social media sites | http://ITProPortal.com http://ow.ly/tlxKl
  • Social Media Security Infographic http://ow.ly/tlwHj
  • FTC Testifies on Data Security before Senate Banking Subcommittee http://ow.ly/tltqy

 

Managing Online Risk’s Monthly Recap (Jan. 2014) – Stories Relating to Online Security & Risk

MP900387754

Welcome to our monthly recap of stories relating to Online Security and Risk. This month’s stories cover many issues including: stolen Coke employee data; 10 years of mobile malware; Data Privacy Day; SEA hack on CNN; compliance crisis in IT security; Data protection; evolution of spying; cyber liability policies; privacy files; judge upholds NSA’s bulk data collection; and more.

These are some of the articles, reports, posts, etc. that caught our attention this week. We originally send them out through our twitter account @DGOnlineSec, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a weekly recap. The links will take you to their original sources, whether Lexology, PC Mag, SC Mag, NLR, and/or others. Enjoy and let us know some of the stories you’ve found interesting this week. Just share in the comments below.