FBI director floats international framework on access to encrypted data

FBI director James Comey has suggested that an international agreement between governments could ease fears about IT products with government-mandated backdoors, but privacy advocates are doubtful. Speaking on Thursday, Comey suggested that the U.S. might work with other countries on a “framework” for creating legal access to encrypted tech devices.

Healthcare IT pros believe data is safer in the cloud

Healthcare IT professionals and executives believe overwhelmingly that when facing hardware malfunctions and environmental disasters, their organization’s data is safer in the cloud than on premises, according to Evolve IP. The survey also revealed a preference for private over public clouds with about 60 percent preferring private cloud infrastructure over public clouds for data security.

Senate votes to kill FCC’s broadband privacy rules

The U.S. Senate has voted to kill broadband provider privacy regulations prohibiting them from selling customers’ web-browsing histories and other data without their permission. The Senate’s 50-48 vote Thursday on a resolution of disapproval would roll back Federal Communications Commission rules requiring broadband providers to receive opt-in customer permission to share sensitive personal information, including…

What modern cyber attacks actually look like

Sometimes, your data protection tools may actually be providing a false sense of security. A Venafi survey of 500 CIOs found that they were wasting millions of dollars on cyber security solutions that couldn’t differentiate between malicious and authorized keys and certificates, Information Age reported. As a result, 90 percent of respondents said they expect their organization to…

BrandPost: Protecting against IoT-powered cyberthreats

Last October, long-standing predictions that the burgeoning Internet of Things (IoT) would form a launching pad for new cyberattacks hit home in a big way. As many as 100,000 malware-infected IoT devices flooded two major internet service providers with superfluous traffic in a broad distributed denial of service (DDoS) attack. Among the many commercial websites impacted were Twitter, Amazon and Netflix.

Five Steps to Protect Your Critical Data From Insider Threats

As companies around the world turn their attention to advanced threats endangering their most sensitive data, one category is commanding much-deserved attention: insider threats. With 44.5 percent of attacks perpetrated by malicious insiders, guarding against these incidents is becoming a pressing concern. An effective way to tackle insider threats is with an integrated approach that…

Debunking 5 Myths About DNS

From the boardroom to IT and the end user, the Domain Name System is often misunderstood, which can leave organizations vulnerable to attacks. The Domain Name System (DNS) is the common denominator for all communication on the Internet. It touches everyone. Every online transaction – good or bad – begins with a DNS lookup. Despite…

Cyber espionage topping the list of largest security concerns

20 percent of global organizations rank cyber espionage as the most serious threat to their business, with 26 percent struggling to keep up with the rapidly evolving threat landscape. In addition, one in five U.S. organizations have suffered a cyber espionage-related attack in the last year. The Trend Micro research, which surveyed 2,402 enterprise IT…

A new age of digital signatures is upon us

The increased adoption of digital signatures should not come as a surprise: many businesses are trying to digitalise their everyday processes, and digital signatures are both reliable and secure due to several features, and are increasingly easy to use. The term “digital signature” is often used interchangeably with that of “electronic signature”, but they are…