Menu

Security / Opinions

Privacy and the data toothpaste problem

Two prominent appellate courts have ruled in two unrelated privacy cases and dealt dual blows to privacy. A New York state appeals court said that Facebook had no right to resist coughing up extensive details about what its users are saying, while a federal appeals court said that anyone who unintentionally telephones someone -- a pocket-dial, sometimes known a bit more impolitely -- can't expect the listener to not listen and use the information.

Written by Evan Schuman28 July 15 20:04

Office romances are affairs to avoid

Most of us have heard the warning: "Don't date anyone you work with." If you've been in the workplace for a while you have likely either been in an office romance, had someone that worked for you get into one or watched a co-worker destroyed by one.

Written by Rob Enderle25 July 15 03:09

Traction Watch: A look at why 5 tech startups failed

Let's face it, not every company will succeed. Sometimes there's a fine line between success and failure. Many factors can stop a good idea in its tracks – sometimes it's just dumb luck. There are countless examples of failed business attempts that you can learn from, but we've picked five notable businesses from Autopsy - Lessons from Failed Startups -- a website that documents the demise of startups and the reasons they fail -- that seemingly had it all but couldn't gain traction with their customers.

Written by Mike Houghton22 July 15 00:17

Tech policy belongs on the 2016 campaign agenda

The next race for the White House is already well under way, with candidates in each party formally announcing their intention to run for the presidency on a regular basis. The issues that will dominate the political discourse as we move from the primaries to the general election have yet to be determined, although economics and economic opportunity seem to be good bets to loom large in the campaign. Of course, many interest groups will attempt to inject their key issues into the discussion about where the country is and where it should be going.

Written by By Richard Adler15 July 15 23:49

How should an underage cyberthief be dealt with?

Sometimes, emotions make it difficult to see the most effective way of accomplishing an objective. And emotions can definitely arise when the subject is underage cyberthieves.

Written by Evan Schuman14 July 15 21:10

Labor laws are a mismatch with the sharing economy

A recent finding by the California Labor Commission highlights this disconnect. The commission determined that Barbara Berwick, a San Francisco driver, was an employee of Uber rather than an independent contractor. While the decision does not set a precedent, it may be reversed by courts and might be made moot by Uber making minor changes to its standard contract, this conflict nonetheless highlights the difficulty of applying antiquated laws to new and rapidly evolving industries. Current labor laws were written at a time when large companies were regarded as permanent fixtures in the economy, workers tended to stay with one employer for many years, employees had one full-time job, and many industries were heavily unionized. Those conditions no longer exist. As a result, our laws are increasingly ineffective in giving

Written by By Joe Kennedy10 July 15 01:40

Why it's right for Google to resist the 'right to be forgotten'

I'm a fan of the nonprofit Consumer Watchdog, a group that generally lives up to that name, but its recent effort to push Google into an Orwellian form of censorship, the so-called "right to be forgotten," is a massive mistake.

Written by Bill Snyder09 July 15 23:55

The OPM lawsuit will only make the lawyers rich

Sensitive data pertaining to millions of people was compromised in the data breach at the U.S. Office of Personnel Management. I suspect that millions of those people smiled when they heard about the filing of a class-action lawsuit filed against the OPM. They would like some recompense for the incredible hassle that data breach caused them. And they probably want to see the OPM pay for its mistakes. Unfortunately, those smiles are probably about all they will get out of the lawsuit.

Written by By Ira Winkler09 July 15 03:14

Security threats and why you never want to name anything

There is a bit of a name fight going on with a new class of security software. Traditionally, this has been called UBA, for User Based Analysis or Analytics. However, recently newer firms are coming to market arguing that the name should have more to do with the benefit the technology provides and reflect that the breadth of analysis goes well beyond users. Thus, you have ABD, or Active Breach Detection, and this could as easily be DBD, or Dynamic Breach Detection, or even SJIASSFYCAWCTYWTAAWTAS or Some Jerk Is Already Stealing Stuff From Your Company And We Can Tell You Who They Are And What They Are Stealing.

Written by Rob Enderle04 July 15 01:57

Spotting vulnerabilities takes many eyes

Vulnerabilities can take many forms, and you can't expect to uncover them all unless you have a diverse portfolio of tools to help you in the hunt.

Written by By Mathias Thurman03 July 15 04:47

A laser focus on PCI compliance

For the past few weeks, I've been knee-deep in PCI compliance. I have previously mentioned that although my company's current credit card transaction volume doesn't require a full PCI audit, we have made a business decision to get the full PCI Report on Compliance, which entails hiring a qualified security assessor (QSA), submitting evidence, conducting a variety of qualified penetration tests and assessment scans and ultimately having an auditor spend about a week on site reviewing evidence and conducting in-depth testing of the 400-plus controls.

Written by By Mathias Thurman24 June 15 03:07

IT funding potholes

Organizations should know how to budget and pay for IT products and services -- they've been doing so for more than 50 years. This is not rocket science. Unfortunately, many organizations continue to make the same mistakes year after year.

Written by Bart Perkins23 June 15 03:49

Market Place

Computerworld
ARN
Techworld
CMO