Managing Online Risk’s Monthly Recap (May 2014) – Stories Relating to Online Security & Risk

Concept of Hand with Electronic Fingerprints

Welcome to our monthly recap of stories relating to Online Security and Risk. This month’s stories cover many issues including: eBay data breach; cyber security certification; China’s hacker army; 12 tips to cope with a data breach; more on net neutrality; selfies boosting mobile security; 11 essentials to enterprise security; FFIEC & cyber security assessments; DropBox leaking data on Google; White House releases Big Data Report; and more.

These are some of the articles, reports, posts, etc. that caught our attention this week. We originally send them out through our twitter account @DGOnlineSec, so follow us to get them as we find them. But many of them are such great resources we don’t want you to miss them, so we’ve decided to put them as a weekly recap. The links will take you to their original sources, whether Lexology, PC Mag, SC Mag, NLR, and/or others. Enjoy and let us know some of the stories you’ve found interesting this week. Just share in the comments below.

  • State attorneys general commence probe of eBay data breach that hit 145 million users: Tech Times http://ow.ly/xiXKH
  • Interview W Federal Trade Commission’s Edith Ramirez, Who Is Fighting for Data Security & Privacy http://ow.ly/xiX2l
  • What The EBay Data Breach Will Signal About The Future Of Cyber Security | http://Investing.com http://ow.ly/xgQ0l
  • 10 tips on how to protect your personal data online, AsiaOne Digital1 News http://ow.ly/xgPqU
  • Password Do’s & Don’ts: 6 Ways to Stay Safe Online – NBC http://News.com http://ow.ly/xgPk2
  • Belgium Desperately Seeking Cybersecurity Czar – Digits – WSJ http://ow.ly/xdUb8
  • Magid: Internet security is a global issue that requires global cooperation http://ow.ly/xdU7j
  • IT Security Journal | How to Evaluate a Cyber Security Certification Program http://ow.ly/xcyNV
  • Bill lets schools create cyber-bullying policies – http://chicagotribune.com http://ow.ly/xcwvk
  • A Surveillance Bill That Falls Short – http://NYTimes.com http://ow.ly/xbc0E
  • U.S. Case Offers Glimpse Into China’s Hacker Army – http://NYTimes.com http://ow.ly/xbbv9
  • Facebook Fights Malware With Free Security Software – InformationWeek http://ow.ly/xbaT0
  • PasswordBox Wins 2014 Appy Award for Best Privacy/Online Security App – MarketWatch http://ow.ly/xbaLo
  • IoT, cloud computing, nation-state threats redefining enterprise security, panelists say | PCWorld http://ow.ly/xb9Kv
  • 12 Tips to Cope With a Data Breach | Law Technology News http://ow.ly/xb9no
  • Big Data Security Analytics Meets Identity and Access Management http://ow.ly/x2Xn4
  • Edward Snowden ally says he’ll reveal more GCHQ secrets | Mail Online http://ow.ly/x2Xdz
  • U.S. Charges Five Chinese Military Officers With Spying – Bloomberg http://ow.ly/x2X4R
  • Does a Mobile Internet Demand a New Regulatory Scheme | Law Technology News http://ow.ly/x2X0R
  • Online Retail Security Breaches, Mobile Malware Threats Grow http://ow.ly/x0l0K
  • Google readies automated tool for those wanting to disappear from search results | Security – InfoWorld http://ow.ly/x0kPa
  • Bipartisan support growing in support of federal data protection legislation http://ow.ly/x0kIL
  • LifeLock Pulls Wallet App And Deletes Data Over Security Concerns http://ow.ly/x0g4X
  • What’s Next for Net Neutrality? – Room for Debate – http://NYTimes.com http://ow.ly/wUXaF
  • Searching for Fairness on the Internet – http://NYTimes.com http://ow.ly/wUX5P
  • Security in the Internet of Things :: Smarter Computing :: Midsize Insider http://ow.ly/wUWnu
  • How the “selfie” is boosting mobile security http://ow.ly/wSieB
  • Pulling Big Brother’s Strings Instead – Video – http://NYTimes.com http://ow.ly/wPIYi
  • Further security issues keep Facebook under a microscope – Binghamton online marketing | http://Examiner.com http://ow.ly/wPIhj
  • One law to rule all data breaches — but let’s make it a real law | ITworld http://ow.ly/wPDYW
  • Five Essential Tips for Small Business Data Security | Guy Chiarello http://ow.ly/wPDMl
  • A Long Way to Privacy Safeguards – http://NYTimes.com http://ow.ly/wJR4Q
  • What keeps senior IT security pros up at night? It’s not what you think http://ow.ly/wJQwA
  • Infosecurity – Twitter Tweaks Password Security as Account Hacks Continue http://ow.ly/wJQ2w
  • The 11 Essentials of Enterprise Security http://ow.ly/wIuya
  • Bitly says users are safe after its data breach, 2-factor logins coming soon – The Next Web http://ow.ly/wIuo6
  • Social media poses grave danger to companies’ confidential information http://ow.ly/wHeqB
  • 7 Surprising Findings From Check Point’s 2014 Security Report http://ow.ly/wHe1m
  • Aligning Compliance Risk Management to Business Priorities – Deloitte Risk & Compliance – WSJ http://ow.ly/wFxwk
  • FFIEC Plans Cybersecurity Assessments – BankInfoSecurity http://ow.ly/wFxkv
  • Cloud Infographic: Corporate IT Security Stats – http://CloudTweaks.com : Cloud Information http://ow.ly/wFx1L
  • Dropbox Leaking Sensitive Data on Google – The State of Security http://ow.ly/wA1F9
  • 5 ways the new EU data protection regulations will affect your business – Computer Business Review http://ow.ly/wA1rr
  • Connections: Artificial Intelligence, Online Security, and Tracking Trends on Twitter | WXXI News http://ow.ly/wwTrh
  • How to present cyber security issues to the board – CIO http://ow.ly/wwSOH
  • IBM Advances Fight against Cyber Threats with Comprehensive Threat Protection System and Critical Data Protection Services – MarketWatch…
  • Behind The Blackphone: The Future Of Mobile Security? – Page: 1 | CRN http://ow.ly/wt2j3
  • Will This Fly?: A Primer on Drone Laws http://ow.ly/wt2gP
  • When Hitting ‘Find My iPhone’ Takes You to a Thief’s Doorstep – http://NYTimes.com http://ow.ly/wt216
  • Research Report on Smartphone Security Market Trends and Forecast, 2012-2018 – Digital Journal http://ow.ly/wt1Wy
  • Apple, Google, Microsoft Increase Transparency Of Government Data Demands http://ow.ly/wt1Nx
  • Call for Limits on Web Data of Customers – http://NYTimes.com http://ow.ly/wp6JT
  • Cyber security insurance: Insuring success – SC Magazine http://ow.ly/wp5CV
  • IoT security requirements will reshape enterprise IT security programs http://ow.ly/wp5uJ
  • Missing Links in the Proposed EU Data Protection Regulation and Cloud Computing Scenarios: A Brief Overview — jipitec http://ow.ly/wp5oH
  • White House releases Big Data Report | The Secure Times http://ow.ly/wp4S8
  • Kentucky Enacts Data Breach Notice Law That Adds Extra Protection for Student Information while inBloom Withers : Privacy and Security…
  • Most Enterprises Lack Basic Assets to Fight Off Data Theft http://ow.ly/wp4Kc
  • Organizations no more certain of data security in the cloud than on-premise, says Ponemon – FierceEnterpriseCommunications…
  • ‘G20+20 Cyber Stability Board’. Interesting proposition to deal with potential #cyber shocks http://ow.ly/weAtP  via @AtlanticCouncil
  • Happy May! Check out our April monthly roundup of security news: #Heartbleed, #Banking malware, #WindowsXP and more http://ow.ly/wngt2
  • Infosecurity – Infosecurity Europe 2014; Big Data is No Universal Solution for Security Intelligence http://ow.ly/wmJ8r

 

Buy Managing Online Risk Now button

Leave a Reply

Your email address will not be published. Required fields are marked *