background preloader

Krebs on Security

In the wake of long-overdue media attention to revelations that a business unit of credit bureau Experian sold consumer personal data directly to an online service that catered to identity thieves, Experian is rightfully trying to explain its side of the story by releasing a series of talking points. This blog post is an attempt to add more context and fact-checking to those talking points. Experian has posted several articles on its Web properties that lament the existence of “inaccurate information about Experian circulating in news outlets and other Web sites.” “It’s no surprise that cybercrime and data breaches are hot topics for media and bloggers these days,” wrote Gerry Tschopp, senior vice president of public affairs at Experian. “Unfortunately, because of all the attention paid to these topics, we’ve seen some inaccurate information about Experian circulating in news outlets and other Web sites. I want to take a moment to clarify the facts and events.”

http://krebsonsecurity.com/

Related:  Security InformationAlltagsHilfencyber securityMy Best SourcesCyber Security

Cloud Controls Matrix (CCM) Download the Cloud Controls Matrix About the CSA Cloud Controls Matrix The Cloud Security Alliance Cloud Controls Matrix (CCM) is specifically designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider. The CSA CCM provides a controls framework that gives detailed understanding of security concepts and principles that are aligned to the Cloud Security Alliance guidance in 13 domains.

Cyber security - small firms now in the firing line Small businesses need to upgrade their awareness of - and abilities in - cyber security if they are to avoid becoming the 'soft underbelly' of the UK's fights against hackers and cyber threats. Media Reports about IT security breaches resulting in data loss and other compromises to corporate data integrity usually only make headline news when big name brands are hit. Resultant concerns about reputational damage have spurred many medium-to-large enterprises (MLEs) into reviewing their cyber-security strategies and redoubling their efforts to ensure that their ICT is properly protected - or at least as protected as possible within the context of their risk assessments and IT budgets. Because of their size a lot of the damage can over time be 'managed'. Disproportionate riches The 'Black Hat' intelligentsia are wise to the fact that start-up SMEs often have data assets of a value disproportionate to their company size on their systems.

World Population Clock: 7 Billion People (2014) World Population: Past, Present, and Future (move and expand the bar at the bottom of the chart to navigate through time) The chart above illustrates how world population has changed throughout history. View the full tabulated data. At the dawn of agriculture, about 8000 B.C., the population of the world was approximately 5 million. Over the 8,000-year period up to 1 A.D. it grew to 200 million (some estimate 300 million or even 600, suggesting how imprecise population estimates of early historical periods can be), with a growth rate of under 0.05% per year. Security - doxo doxo Provides Financial-Grade Security doxo utilizes security technologies and methods that meet or in many cases exceed those used by banks, brokerages, and other financial institutions. Critical data and documents are always encrypted and stored securely. doxo systems are built by a team with deep experience developing secure, highly reliable transaction processing systems – systems that have processed billions of online and mobile transactions. doxo is designed to increase the security and privacy of your data.

5 Information Security Trends That Will Dominate 2015 In information security circles, 2014 has been a year of what seems like a never-ending stream of cyberthreats and data breaches, affecting retailers, banks, gaming networks, governments and more. The calendar year may be drawing to a close, but we can expect that the size, severity and complexity of cyber threats to continue increasing, says Steve Durbin, managing director of the Information Security Forum (ISF), a nonprofit association that assesses security and risk management issues on behalf of its members. Looking ahead to 2015, Durbin says the ISF sees five security trends that will dominate the year. "For me, there's not a huge amount that's spectacularly new," Durbin says. "What is new is the increase in complexity and sophistication."

Security Notice Update: July 10, 2015 @ 8:00 PM EST Thank you for taking the time to read our posts and follow our recommended actions after the recent events. Behind-the-scenes, our response has been ongoing. As we mentioned before, we’ve engaged security experts and firms to help us, and we’re working with the authorities to take the appropriate actions. These events have put our systems to the test, and we’re more secure as a result. Security is an ongoing back-and-forth. Rick Falkvinge, Author at TorrentFreak For teenagers today, the copyright monopoly is something that the establishment uses to punish them for enjoying culture and science, to censor their protests and voices, and to prevent their art from reaching an audience. As these people grow older and come into policymaking positions, at what point will they… Throughout the debate on sharing culture and knowledge in violation of the copyright monopoly, one question keeps popping up. But it's not a question as much as an insult to all artists.

Your Place for Tech Questions Welcome to What the Tech - Register now for FREE A community of volunteers who share their knowledge, and answer your tech questions. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Human Factors in Information Security Management Systems It is hard to accept that nowadays, organizations get along without having an astute and decisive information system. Providing a reliable and coherence information system requires a solid security framework that ensures confidentiality, integrity, availability, and authenticity of the critical organizational assets. Information Security Management System (ISMS) defines to setup a solid security framework and regulates systematic way which information technology can use resources. But technical advancements of ISMS do not always guarantee to secure overall organizational environment.

Introduction to Cyber Security: More free resources from The Open University Copyrighted image Copyright: © Oksipix 4 | Dreamstime.com 5 - Cyber Security Photo About the course Do you want to better understand online security and protect your digital life, whether at home or work? Perhaps you would like to be able to recognise the threats that could harm you online and the steps you can take to reduce the chances that they will happen to you?

Related:  ShadowCybersecurityActualités Info - Techblogs - magazines