August 2013 – Data Protection & Security

5the

The 7 foundational principles of privacy by design

Dr. Ann Cavoukian, Information and Privacy Commissioner of Ontario, Canada, provides extremely informative insights on Privacy by Design on her website. The objectives of Privacy by Design — ensuring privacy and gaining personal control over one’s information and, for organizations, gaining a sustainable competitive advantage, she states, may be accomplished by practicing the following seven foundational […]

The 7 foundational principles of privacy by design Read More »

3social

The pros and cons of anonymity: how to make social media integration privacy compliant

Discussions on privacy or surveillance on the Internet are hotly debated these days, often thumping the right to remain anonymous. Just look at the recent disclosures by Edward Snowden that triggered the whole NSA dilemma and confronted people with the new reality of surveillance by states quite plainly.

The pros and cons of anonymity: how to make social media integration privacy compliant Read More »

2prolexis

Prolexic publishes media guide to counter DDoS cyberthreats

Prolexic just released its brand new “Distributed Denial of Service (DDoS) Media Guide”, we‘d like to give you an overview of. According to Prolexic, DDoS attacks have become one of the most common and destructive forms of online hacking, and these malicious attempts to take down websites continue to escalate.

Prolexic publishes media guide to counter DDoS cyberthreats Read More »

4mcafee

McAfee report warns of sms-stealing banking malware and data-stealing apps

Each quarter, the McAfee Lab team, consisting of 500 multidisciplinary researchers from 30 countries, is following threats in real time, identifying application vulnerabilities, analyzing and correlating risks, and enabling instant remediation to protect enterprises and the public. The wholly owned subsidiary of Intel Corporation has just released its McAfee Threats Report: Second Quarter 2013, which

McAfee report warns of sms-stealing banking malware and data-stealing apps Read More »

1data

Data privacy trends in Asia Pacific‘s highly fragmented legislative environment

Forrester‘s senior analyst, Masami Kashiwagi, has been researching data privacy laws in Asia Pacific (AP) and spoke to a wealth of different professionals across all kinds of industries, in order to understand the ever-evolving data privacy regulations and policies across 15 different jurisdictions in the region.

Data privacy trends in Asia Pacific‘s highly fragmented legislative environment Read More »

4steps

Your 8 step defense strategy to protect your system against targeted attacks

According to Trustwave‘s 22 page eBook „Inside a Hacker‘s Playbook: 10 Targeted Techniques that will break your Security“, concerted attacks are successful because they are stealthy, specific and disarmingly personal. Advanced attackers can quietly infiltrate a network and steal data or information at will for months or even years. With a little bit of research,

Your 8 step defense strategy to protect your system against targeted attacks Read More »

2secure

Secure exchange of data is the cornerstone of the Shareconomy

“Shareconomy” describes the sharing and collective use of information that can lead to increased transparency within a company by providing a broader access to content such as analyses, proposals or customer reports. Besides, it can save time, while boosting efficiency, and enhance the emergence of numerous new business models. All these advantages, driven by the

Secure exchange of data is the cornerstone of the Shareconomy Read More »

3hotspot

Hotspot security?! Don‘t give cybercriminals the hotspot opportunity!

Mobile surfing has become cheaper, since data roaming prices have fallen. However, if you want to use your smartphone, tablet computer or notebook on vacation, and want to download or send large amounts of data, or make use of video telephony, you can do that at low cost via public Wi-Fi hotspots. Such wireless internet

Hotspot security?! Don‘t give cybercriminals the hotspot opportunity! Read More »

5cybercriminals

If cybercriminals have a business model, CISOs need one too!

According to Forrester’s 2012 report „Determine The Business Value of an Effective Security Program – Information Security Economics 101“, it is almost impossible for chief information security officers (CISOs) to meet all of the modern organization’s security demands. CISO are evaluated not only on technical performance, but also on how he or she manages information

If cybercriminals have a business model, CISOs need one too! Read More »