Managing Online Risk’s Monthly Recap (Mar. 2014) – Stories Relating to Online Security & Risk

working like a dog

Welcome to our monthly recap of stories relating to Online Security and Risk. This month’s stories cover many issues including: banking safely online; 6 cyber security myths; ISACA launches digital badges; this drone can steal what is on your phone; security & metadata; cyber security skills; Digital Life 2025; data breach notification requirements; the Snowden phone; Colbert explains cloud fog; and more.

These are some of the articles, reports, posts, etc. that caught our attention this week. We originally send them out through our twitter account @DGOnlineSec, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a weekly recap. The links will take you to their original sources, whether Lexology, PC Mag, SC Mag, NLR, and/or others. Enjoy and let us know some of the stories you’ve found interesting this week. Just share in the comments below.

  • 10 Simple Tips to Bank Safely Online | Robert Siciliano
  • Journalists “need to wake up” to online security | Media news
  • Fandango, Credit Karma Settle FTC Charges Over Data Security –
  • 6 greatest cybersecurity myths and why you should not trust them — Defense Systems
  • FTC Renews Call for Data Security Legislation – ACA International
  • FDAnews Announces: Software and Cybersecurity Risk Management for Medical Devices, May 21-22 – Press Release – Digital Journal…
  • Info sec industry still struggles to attract women – CSO Online – Security and Risk
  • White House, Treasury officials to appear at SEC cyber security event | Reuters
  • Obama to Call for End to N.S.A.’s Bulk Data Collection –
  • Infosecurity – ISACA Launches Digital Badges for Credential Verification
  • European hackers gather in Geneva to test their skills – Taipei Times
  • Be Your Family’s Chief Security Officer | Robert Siciliano
  • Big data analytics boosts security | ITWeb
  • Five reasons why risk managers should be social
  • The Illustrated History of Twitter
  • This drone can steal what’s on your phone – Mar. 20, 2014
  • Full-Disclosure Listserv Suspends Operations: Very Sad Day for Internet Security
  • How to Secure Your Social Media Accounts – News – Wicked Local West Roxbury – Needham, MA
  • Don’t shun the Internet of Things over privacy and security worries- The Inquirer
  • New data protection guidance for app developers | Briefings | The Lawyer
  • Security, Privacy and Metadata – The Data Center Journal
  • Internet Of Things Meets Cars: Security Threats Ahead – InformationWeek
  • Nearly half of identity thefts involve medical data – MarketWatch
  • Eight cyber security tips I learned from The Walking Dead
  • Help bring online/mobile privacy laws into the 21st century. Sign petition to get action on updating ECPA
  • A recent report found “small investments in cybersecurity preparedness can yield significant risk reductions”
  • ‘No business is too small to be at threat from cybercriminals’: @emm_david blogs for @HuffPostUKTech … #SMB #security
  • System Accounts: #Password Dos and Don’ts
  • @FidSecSys–1.html …
  • 4 female leaders in the #tech industry:
  • Check out this #infographic from the McAfee Labs Threats Report: Fourth Quarter 2013: via @McAfee
  • WhatsApp flaw allows hackers to steal private Chats on Android devices
  • Experian security lapse have just exposed over 200 mn consumer IDs : BIZ TECH : Tech Times
  • Cybersecurity Skills Haves and Have Nots
  • Cyber Security Rises as Concern in Risk: Survey – The CFO Report – WSJ
  • Sophisticated Mobile Apps Are Reshaping Campus Safety – Technology – The Chronicle of Higher Education
  • Here’s What The Internet Could Look Like In 2025
  • Terebrate: Books You Should Have Read By Now on Security
  • Full List of Information Security Conferences in 2014
  • Elray Gaming Provides Security Outline for Bitcoin and Virtual Currency Holdings –
  • Businesses need federal terrorism risk insurance reauthorized – Richmond Times-Dispatch: Economic News
  • Data Breach Consumer Notification Requirements Vary | Law Technology News
  • Best Practices For Gramm-Leach-Bliley Compliance Re: Data Security and Customer Privacy | The National Law Review
  • Cyber-Security Creates New Pressures for IT Pros
  • 10 Ways to Build a Better Big Data Security Strategy – CSO Online – Security and Risk
  • Cyber Security Risk: Perception vs. Reality in Corporate America | Innovation Insights |
  • Barrett Brown hyperlink charges dropped | Naked Security
  • IT security for the daily life: Withdrawing money at cash machines with Google Glass | Science Codex
  • Our 10 most important security takeaways from the RSA Conference |
  • FreedomPop Snowden Phone 10 Facts About This Secure Handset
  • Bitcoin’s Mysterious Creator Is Said to Be Identified –
  • Maintaining Electronically Stored Information Forever Is Risky Business | Law Technology News
  • 10 Things You Need to Know About Digital Security
  • Has Privacy Become a Luxury Good? –
  • Hackers stole $473M of ‘Tinker Toy currency’ bitcoins | New York Post
  • Daily Report: Lax Data Security a Problem for Many Start-Ups –
  • Meet the seven people who hold the keys to worldwide internet security – HITC Tech
  • Can we protect ourselves from online privacy threats? – The Globe and Mail
  • Stephen Colbert explains Cloud Fog: part cloud, part fog, all security
Buy Managing Online Risk Now button

Leave a Reply

Your email address will not be published. Required fields are marked *