Government-Funded Hackers Say They’ve Already Defeated Windows 8’s New Security Measures

Last week’s Windows 8 launch wasn’t just a major product release for Microsoft. It seems to have been a banner day for the government-funded hackers who take Microsoft’s software apart, too. On Tuesday the French firm Vupen, whose researchers develop software hacking techniques and sell them to government agency customers, announced that it had already […]

Read More…

California passes strict social media privacy law

Business and colleges barred from requesting access to employees, students personal social media accounts under new law Sept. 28–SACRAMENTO — California, home to many of the world’s social media companies, now has the nation’s strictest privacy laws preventing your boss or college from surfing through the personal information you post on sites like Facebook. It […]

Read More…

5 Mobile Security Lessons From the Department of Defense

Several years ago, the National Security Agency wasted millions on a circuit-switched approach to mobile security strategy. With help from the Department of Defense, the NSA is doing things differently now. Enterprise CIOs can learn a few things from the effort, too. Try this thought experiment. You want to provide smartphones, iPads and other mobile […]

Read More…

Higher retail wages correlate with lower levels of employee theft

A study co-written by a University of Illinois business professor shows that higher wages are associated with lower levels of employee theft, shedding light on the impact that compensation practices have on shaping employee honesty and ethical norms in organizations. Using data sets from the convenience-store industry, Clara Xiaoling Chen, a professor of accountancy, and […]

Read More…

10 Ways Enterprises Can Battle Malware

As malicious code rapidly evolves, the National Institute of Standards and Technology is updating its guidance to reflect changes in the threat malware presents organizations. The “Unlike most malware threats several years ago, which tended to be fast-spreading and easy to notice, many of today’s malware threats are more stealthy, specifically designed to quietly, slowly spread to […]

Read More…

Tech Insight: Speeding Up Incident Response With Continuous Monitoring

Increase speed and effectiveness of incident response through continuous monitoring and enterprise IR tool integration Continuous monitoring is a buzz phrase come back to life thanks to the U.S. Office of Management and Budget and the Homeland Security Department telling government agencies to implement information security continuous monitoring (ISCM). NIST has also released three new […]

Read More…