Blog Posts Tagged with "Monitoring"

9426edcb04ba15a57df6d674f1c74db9

Why Is Digital Property Monitored Less than Physical Property?

March 09, 2017 Added by:Ajit Singh

If we were to place as much emphasis on monitoring events that take place on our IT systems as we do monitoring spending habits and shoplifting, many of the data breaches we hear about today could be largely mitigated.

Comments  (0)

E6258b956c06d8dbabbde10d4919e5ef

Three Compliance Trends to Watch in 2015

January 26, 2015 Added by:Mav Turner

Continuous compliance involves constantly reviewing processes and quickly making any necessary updates as a result of deviations from their intended performance. However, despite the fact that continuous compliance is effective at eliminating the gaps between compliance and security, it also greatly increases the complexity of managing compliance.

Comments  (2)

44a2e0804995faf8d2e3b084a1e2db1d

Trojans for the Bundestag – German PD acquired Finfisher

January 29, 2013 Added by:Don Eijndhoven

German political platform NetzPolitik.org has now uncovered secret documents belonging to the Ministry of Finance, that the Ministry of the Interior sent to the Bundestag (the political seat of Germany) that reveals the German Federal Police’s intention to use Gamma Group’s Finfisher spyware...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Russia deploys a massive surveillance network system

November 03, 2012 Added by:Pierluigi Paganini

DPI is most advanced and intrusive category of inspection tools, it is able to analyze every packet in traffic filtering particular services or contents. Remeber that DPI systems have been adopted by various regimes such Iran and also China used the technology to implement its Great Firewall project...

Comments  (0)

B1c4090e84dcfac820a2b8ebe6eee82b

SMTP Dialects: How to Detect Bots Looking at SMTP Conversations

October 03, 2012 Added by:Gianluca Stringhini

We need new techniques to detect and block spam. Current techniques mostly fall in two categories: content analysis and origin analysis. Content analysis techniques look at what is being sent, and typically analyze the content of an email to see if it is indicative of spam...

Comments  (6)

7ddc1f3000a13e4dfec28074e9e7b658

Creating a Surveillance-Free Internet

September 20, 2012 Added by:Electronic Frontier Foundation

Since its origins in 2008, Freedom Not Fear has developed the general message: fundamental rights like privacy, free expression, due process, and democratic participation are jeopardized when reactionary, fear-driven surveillance systems penetrate our societies...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Don’t Wait for UK Snoopers’ Charter: Encrypt Wikipedia Now

September 17, 2012 Added by:Electronic Frontier Foundation

Rather than waiting for bad legislation, Wikipedians should take this opportunity to make one relatively small technical change that could serve as a bulwark against all kinds of government surveillance, filtering and data retention laws...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Are Your Mobile Apps Up To No Good?

September 06, 2012 Added by:Robert Siciliano

Why would an app to monitor your battery need to know your location via your GPS? How come gaming apps ask users for their phone numbers? Mobile applications, especially free ones, require your personal data to supplement development costs. This means “free” isn’t exactly free...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

These Drones are Made for Watchin'

August 19, 2012 Added by:Electronic Frontier Foundation

The public has been pushing back on broad use of drones by law enforcement. At the request of reporters, advocacy organizations and city councils, public agencies have been required to justify their drone purchases and develop clear policies on when and under what conditions they will use drones for surveillance...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Relating Responsibility and Liability: At the Core of BYOD

August 15, 2012 Added by:Rafal Los

Does it make sense to repurpose "security awareness" to be inclusive of corporate and personal responsibility? Should we have users sign agreements that make them aware they are responsible, personally, when bad things happen as a result of their actions? Should there be HR actions against users who are reckless?

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

A Victory Over Cyber Spying

August 04, 2012 Added by:Electronic Frontier Foundation

Congress has been working to pass cybersecurity legislation for years – and EFF has fought to ensure that civil liberties weren’t sacrificed in the process. This year was the hardest: Congress got closer than ever to enacting a bill that could threaten the privacy of online communications. We fought back...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Why the NSA Can’t Be Trusted to Run Cybersecurity Programs

August 01, 2012 Added by:Electronic Frontier Foundation

Senators John McCain and Kay Bailey Hutchison have proposed amendments that would hand the reins of our nation’s cybersecurity systems to the NSA. The agency's dark history, flouting of domestic law, and resistance to transparency makes it clear that the nation's cybersecurity should not be in its hands...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Is There a Risk in Using My Personal Device for Work?

July 24, 2012 Added by:Robert Siciliano

“Bring your own device” (BYOD) has become widely adopted to refer to workers bringing their personal mobile devices, such as smartphones, tablets and PDAs, into the workplace for use and connectivity. Because your employer is liable for potentially lost data, if you BYOD, plan on giving up some liberties...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Cybersecurity, Scare Tactics, and Sacrificing Privacy

July 13, 2012 Added by:Electronic Frontier Foundation

Efforts to break the partisan stalemate over the Cybersecurity Act, a bill that would allow Internet companies to monitor the communications of users and pass that data to the government without any judicial oversight, have backers of the bill attempting to drum up fears about catastrophic cyberattacks...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Obama Administration Won't Discuss NSA Email Surveillance

July 10, 2012 Added by:Electronic Frontier Foundation

A few members of Congress have been trying to get the Obama administration to answer a question: How many Americans’ phone calls or emails have been and are being collected without a warrant under the FISA Amendments Act of 2008? Unfortunately, no one else in the government seems to want that question answered...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

I Know What You Tweeted Last Summer...

July 04, 2012 Added by:Theresa Payton

We have mentioned before that Twitter will send every tweet to the National Archives and the Library of Congress, so watch what you tweet. Now new tools unleash a trove of data in moments. For the 140 million and growing user base that tweets over 400 million tweets per day, this might be a little more than alarming...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »