Tag: database

Is the data privacy movement waiting for its Cuyahoga River fire or Love Canal? The muted response to the most recent data dumps say "yes." (Image courtesy of Library of Congress.)

Amid More Dumping, Data Privacy Movement Awaits a Spark | Digital Guardian

In-brief: Like Love Canal or the ‘flaming river’ in Cleveland that eventually prompted anti-pollution laws, the casual leak of data on 33 million U.S. professionals is a sign that our online environment is badly compromised. But can we fix it? (Editor’s note: this blog post originally appeared on Digital Guardian’s blog.)

Companies should make life harder for cyber criminals by ceasing the use of valuable, "static" data to authenticate consumers. (Image courtesy of the Library of Congress.)

Opinion: Disrupt Fraud by Devaluing Data

In-brief: companies that want to make life difficult for cyber criminals can start by moving valuable data off the front lines and finding ways to use less valuable information to verify the identity of their customers, writes Keir Breitenfeld, who works for Experian’s Fraud & Identity Solutions group.

Will computers replace human security workers - or just enhance them?

Will Machine Learning and AI create Infosec Super Humans?

In-brief:will computers and artificial intelligence “kill the infosec star” (to paraphrase The Buggles) with algorithms taking the place of workers who buy food, houses, cars and clothing? Maybe not, says Dario Forte of DF Labs in this Security Ledger podcast. 

A database containing 900 gigabytes of customer data and support requests for the Israeli firm Cellebrite was stolen and leaked to the website Motherboard. Cellebrite makes technology that helps law enforcement agencies get data off of mobile devices.

Surveillance Technology Vendor Cellebrite Has Customer Data Stolen

In-brief: Cellebrite, an Israeli firm that sells mobile phone forensic tools, was the victim of a hack that stole information on customers – many of them law enforcement agencies and governments.

The New York Times expose on the hacks of the DNC is a case study in how not to respond to a cyber attack. We talk with Tim Bandos of Digital Guardian about building a cyber threat hunting capability.

Don’t Be The DNC: An Introduction to Enterprise Threat Hunting

In-brief: The New York Times expose on the hack of the Democratic National Committee is a case study in how not to respond to a cyber attack. In this video interview with Tim Bandos of Digital Guardian, we talk about how to do it right. His new ebook on hunting digital threats in the enterprise explains that incident response doesn’t have to cost a fortune.