Managing Online Risk’s Monthly Recap (May 2014) – Stories Relating to Online Security & Risk

Concept of Hand with Electronic Fingerprints

Welcome to our monthly recap of stories relating to Online Security and Risk. This month’s stories cover many issues including: eBay data breach; cyber security certification; China’s hacker army; 12 tips to cope with a data breach; more on net neutrality; selfies boosting mobile security; 11 essentials to enterprise security; FFIEC & cyber security assessments; DropBox leaking data on Google; White House releases Big Data Report; and more.

These are some of the articles, reports, posts, etc. that caught our attention this week. We originally send them out through our twitter account @DGOnlineSec, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a weekly recap. The links will take you to their original sources, whether Lexology, PC Mag, SC Mag, NLR, and/or others. Enjoy and let us know some of the stories you’ve found interesting this week. Just share in the comments below.

  • State attorneys general commence probe of eBay data breach that hit 145 million users: Tech Times
  • Interview W Federal Trade Commission’s Edith Ramirez, Who Is Fighting for Data Security & Privacy
  • What The EBay Data Breach Will Signal About The Future Of Cyber Security |
  • 10 tips on how to protect your personal data online, AsiaOne Digital1 News
  • Password Do’s & Don’ts: 6 Ways to Stay Safe Online – NBC
  • Belgium Desperately Seeking Cybersecurity Czar – Digits – WSJ
  • Magid: Internet security is a global issue that requires global cooperation
  • IT Security Journal | How to Evaluate a Cyber Security Certification Program
  • Bill lets schools create cyber-bullying policies –
  • A Surveillance Bill That Falls Short –
  • U.S. Case Offers Glimpse Into China’s Hacker Army –
  • Facebook Fights Malware With Free Security Software – InformationWeek
  • PasswordBox Wins 2014 Appy Award for Best Privacy/Online Security App – MarketWatch
  • IoT, cloud computing, nation-state threats redefining enterprise security, panelists say | PCWorld
  • 12 Tips to Cope With a Data Breach | Law Technology News
  • Big Data Security Analytics Meets Identity and Access Management
  • Edward Snowden ally says he’ll reveal more GCHQ secrets | Mail Online
  • U.S. Charges Five Chinese Military Officers With Spying – Bloomberg
  • Does a Mobile Internet Demand a New Regulatory Scheme | Law Technology News
  • Online Retail Security Breaches, Mobile Malware Threats Grow
  • Google readies automated tool for those wanting to disappear from search results | Security – InfoWorld
  • Bipartisan support growing in support of federal data protection legislation
  • LifeLock Pulls Wallet App And Deletes Data Over Security Concerns
  • What’s Next for Net Neutrality? – Room for Debate –
  • Searching for Fairness on the Internet –
  • Security in the Internet of Things :: Smarter Computing :: Midsize Insider
  • How the “selfie” is boosting mobile security
  • Pulling Big Brother’s Strings Instead – Video –
  • Further security issues keep Facebook under a microscope – Binghamton online marketing |
  • One law to rule all data breaches — but let’s make it a real law | ITworld
  • Five Essential Tips for Small Business Data Security | Guy Chiarello
  • A Long Way to Privacy Safeguards –
  • What keeps senior IT security pros up at night? It’s not what you think
  • Infosecurity – Twitter Tweaks Password Security as Account Hacks Continue
  • The 11 Essentials of Enterprise Security
  • Bitly says users are safe after its data breach, 2-factor logins coming soon – The Next Web
  • Social media poses grave danger to companies’ confidential information
  • 7 Surprising Findings From Check Point’s 2014 Security Report
  • Aligning Compliance Risk Management to Business Priorities – Deloitte Risk & Compliance – WSJ
  • FFIEC Plans Cybersecurity Assessments – BankInfoSecurity
  • Cloud Infographic: Corporate IT Security Stats – : Cloud Information
  • Dropbox Leaking Sensitive Data on Google – The State of Security
  • 5 ways the new EU data protection regulations will affect your business – Computer Business Review
  • Connections: Artificial Intelligence, Online Security, and Tracking Trends on Twitter | WXXI News
  • How to present cyber security issues to the board – CIO
  • IBM Advances Fight against Cyber Threats with Comprehensive Threat Protection System and Critical Data Protection Services – MarketWatch…
  • Behind The Blackphone: The Future Of Mobile Security? – Page: 1 | CRN
  • Will This Fly?: A Primer on Drone Laws
  • When Hitting ‘Find My iPhone’ Takes You to a Thief’s Doorstep –
  • Research Report on Smartphone Security Market Trends and Forecast, 2012-2018 – Digital Journal
  • Apple, Google, Microsoft Increase Transparency Of Government Data Demands
  • Call for Limits on Web Data of Customers –
  • Cyber security insurance: Insuring success – SC Magazine
  • IoT security requirements will reshape enterprise IT security programs
  • Missing Links in the Proposed EU Data Protection Regulation and Cloud Computing Scenarios: A Brief Overview — jipitec
  • White House releases Big Data Report | The Secure Times
  • Kentucky Enacts Data Breach Notice Law That Adds Extra Protection for Student Information while inBloom Withers : Privacy and Security…
  • Most Enterprises Lack Basic Assets to Fight Off Data Theft
  • Organizations no more certain of data security in the cloud than on-premise, says Ponemon – FierceEnterpriseCommunications…
  • ‘G20+20 Cyber Stability Board’. Interesting proposition to deal with potential #cyber shocks  via @AtlanticCouncil
  • Happy May! Check out our April monthly roundup of security news: #Heartbleed, #Banking malware, #WindowsXP and more
  • Infosecurity – Infosecurity Europe 2014; Big Data is No Universal Solution for Security Intelligence


Buy Managing Online Risk Now button

Leave a Reply

Your email address will not be published. Required fields are marked *