Blog Posts Tagged with "Monitoring"

0a8cae998f9c51e3b3c0ccbaddf521aa

Understanding DevOps vs NoOps

April 14, 2012 Added by:Rafal Los

DevOps represents a fundamental shift in how applications are being delivered to the new 'web' via cloud, mobile and other channels. NoOps, as some understand it, effectively spells the end of the formal silos built around development, operations and quality testing teams...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Governments and Gaming Platforms: It's Time for Warfare

April 10, 2012 Added by:Plagiarist Paganini

The U.S. Navy has reported that scope of the project is to hack into consoles to access to sensitive information exchanged through their messaging services. They have offered guarantees that the spying technology will be used only on nations overseas...

Comments  (11)

7ddc1f3000a13e4dfec28074e9e7b658

UK Proposes Monitoring Every Email, Call, and Text Message

April 10, 2012 Added by:Electronic Frontier Foundation

Law enforcement would have access to IP addresses, email addresses, when you send an email, and corresponding data for phone calls and text messages. The government has claimed this is needed to fight terrorism, but it would be available to law enforcement for all purposes...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

NSA Denies Warrantless Wiretaps Despite Evidence

March 27, 2012 Added by:Electronic Frontier Foundation

The NSA claims it only has access to emails and phone calls of non-U.S. citizens overseas, but many previous reports that the program targets US based email records. In the 11 years since 9/11, Binney estimates 15 to 20 trillion transactions have been collected and stored by the NSA...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Digital Posse Comitatus: Generals Obfuscate and Inveigle Congress

March 21, 2012 Added by:Infosec Island Admin

9/11 opened the floodgates to the world of warrantless wiretaps and surveillance culture we now have and diminished the lines between military and civilian agencies collection and alleged sharing of data. In the case of the NSA though, the abilities were always there...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

CIA and the Intelligence Components of Security

March 16, 2012 Added by:Plagiarist Paganini

We must approach with care the diffusion of technology, and correctly size up the potential threats. As there has been increased media attention on vulnerabilities within critical structures, the same approach must be followed to manage issues with commonly used devices...

Comments  (0)

39728eff8ac87a48cfb050f0df29ceaa

IBM Got it Wrong: It’s Not about Adding Another Data Source

March 13, 2012 Added by:John Linkous

For the majority of organizations, information security is more post mortem than critical care. Regardless of how many billions you spend on security tools, until you fix this inherent problem in traditional SIEM tools, large organizations will continue to be breached...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

To the Cloud: Cloud Powering an Enterprise

March 10, 2012 Added by:Ben Rothke

Moving services to a public cloud means increasing your exposure to malicious attacks. This is not a potential increase, rather a definite increase. It is important to determine how well a cloud provider handles both technical and security requirements...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Google Circumvents Browser Privacy - Why We Need Do Not Track

February 26, 2012 Added by:Electronic Frontier Foundation

One way that Google can prove itself as a good actor is by providing meaningful ways for users to limit what data is collected. It’s time Google's third-party web servers start respecting Do Not Track requests, and time for Google to offer a built-in Do Not Track option...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Social Media Monitoring: A Rubric for Control

February 21, 2012 Added by:Infosec Island Admin

We have become a watched commodity via all means of communication. Programs have been put together with the veneer of protecting us from another 9/11 and perhaps some of them were made with the best of intentions, but this idea of monitoring social media is half baked...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Researchers Demonstrate Cell Phone Tracking Vulnerability

February 20, 2012 Added by:Headlines

Researchers at the University of Minnesota’s College of Science and Engineering have revealed a technique that could allow an unauthorized third-party to track the location of a cell phone using data available from cellular networks...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

A Better Path for Applications: Respecting Users

February 20, 2012 Added by:Electronic Frontier Foundation

Even with industry standard security practices in place, data is still vulnerable to a breach or a subpoena. Companies collecting personal data have an obligation to keep as little personally identifiable data as necessary to provide their services...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Google Wants to Get to Know You Better... Uh-Oh

February 19, 2012 Added by:Kelly Colgan

The company that started out as a little search engine has grown into a behemoth that dabbles in everything from social networking to picture sharing to 3D modeling. And it plans to integrate information pulled from all of those Google services you use to learn more about you...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Anonymous Now Interested in the Great Firewall of China

February 17, 2012 Added by:Plagiarist Paganini

Why have they not targeted China before? Hypothetically, the structure of Anonymous could have been infiltrated and directed against the Chinese as part of a strategy defined by the West, or perhaps someone is using the name Anonymous to conduct undercover operations...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Intelligence Committee Continues Probe into Chinese Telecoms

February 17, 2012 Added by:Headlines

Chairman Rogers initiated the probe last fall after a preliminary inquiry into Chinese espionage operations determined the need for further investigation into threats aimed at the U.S. technology supply chain, critical infrastructure, and proprietary information...

Comments  (0)

37d5f81e2277051bc17116221040d51c

One in Three Massachusetts Residents’ Records Breached

February 15, 2012 Added by:Robert Siciliano

Massachusetts has one of the most stringent data protection laws on the books. Companies are now reporting when even a single individual’s information has been compromised. Despite strict security requirements, companies are continually being hacked in record numbers....

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »