Recent Entries

Privacy and the Right to be Forgotten
Video Thumbnail: Privacy and the Right to be Forgotten

Privacy and the Right to...

Earlier this month there was a very interesting decision out of the European Court of Justice. The decision established what can be called the “right to be forgotten”. People can now ask search engines like Google to remove links from search results about them. So, for example, say you are now a successful businessman. However, the first search results for your name is a slightly embarrassing incident that took place in your youth. Now, you can ask Google to “forget” about that incident so it won’t show up first when someone searches for your name. You can debate whether this is a good idea or not. Europeans like myself tend to think this is a good idea – after all, who else should control but you, right? Americans tend to look at it as a free speech issue. There is a cultural...
Data Gathering Is a Two-Way Street
Video Thumbnail: Data Gathering Is a Two-Way Street

Data Gathering Is a Two-...

Today’s technology is becoming better and better at an exponential clip. It was only a few decades ago that we had cellphones the size of bricks and Internet the speed of which is only a fraction of a single percent of today’s connections. Now we carry powerful computers in our pockets as well as wear them for watches, and we can download entire libraries in less than a couple of moments. But with all benefits there are prices to pay for such convenience. One of them is how the companies behind such conveniences use them to collect data from their customers – how they use the service, when and where and who and why. The fact is, these companies never reveal the fact that they do so readily – more often than not, it is discovered by someone who bothers to look, and whenever they do...
Advice for Enterprises in 2014: Protect Your Core Data
Video Thumbnail: Advice for Enterprises in 2014: Protect Your Core Data

Advice for Enterprises i...

It is an interesting time to be in IT security today. PRISM and Edward Snowden taught many lessons about how companies should secure their data. There’s been a lot of discussion about the surveillance aspect of this, but consider this whole affair from the side of the NSA. To the NSA, this was a data breach of unprecedented proportions. All indications are that Snowden was able to exfiltrate a significant amount of classified data; what has been published so far represents a relatively small proportion of what he was able to access. Consider that Snowden technically wasn’t even an employee – he was just a contractor. How did he do this? How could a contractor access this much information? Some companies may think – “if it can happen to a spy agency, there’s nothing we could...
Mobile Banking and the Risks
Video Thumbnail: Mobile Banking and the Risks

Mobile Banking and the R...

There is no doubt that mobile banking is going to become very significant in 2014, if it isn’t already. In the United States, a quarter of all people selecting a bank say mobile banking is a “must-have”. In parts of the developing world, mobile banking is even the dominant form of banking. There is no doubt anymore that mobile banking is a big part of the banking landscape – which means, of course, that it is bound to become a big part of the threat landscape as well. In the past, smartphones were generally used to help protect normal online banking transactions. Banks would send users a Transaction Authorization Number (TAN) via SMS that they would have to enter on their PCs to verify that a transaction was valid. It’s essentially a form of two-factor authorization that...