Data Priacy — News

Health Insurer Encrypts All Stored Data

Responding to the <a href="http://www.bcbst.com/about/news/releases/default.asp?release=292">theft of 57 hard drives in 2009</a> , BlueCross BlueShield of Tennessee has completed a $6 million project to encrypt all of its at-rest data.

Lucas Mearian | 22 Aug | Read more

No nyms equals evil

Two weeks ago <a href="http://www.networkworld.com/columnists/2011/080811-backspin.html">I contended</a> that "Freedom and privacy, in any meaningful sense, are dead" and discussed the two types of privacy, "factual" privacy, which concerns "static" data such as your age and cholesterol level, and "lifestream" privacy which is the realtime data about things such as where you go and who you talk to.

Mark Gibbs | 22 Aug | Read more

'Related' Browser Add-On: Handy, But at Cost to Privacy

A nifty Google browser extension called "Google Related" makes finding associated Web content a snap, but for privacy-minded Web surfers the convenience will come with a hefty cost. The Chrome Web browser extension creates a navigation bar at the bottom of the browser, and as you roll your mouse cursor over the bar Google generates content relevant to what's on the page you're viewing.

John P. Mello Jr. | 18 Aug | Read more

Opinion: Breadth First Hacking

Recent publicity for online hacking groups such as Anonymous and Lulzsec has seemed to show that nobody is immune from attack on the Internet. Once targeted, it seems that these groups are capable of breaching security systems and retrieving data, including identity information, from the most secure systems.

Robert Layton | 13 Aug | Read more

App makers may be exposing your sensitive data to hackers

Some popular apps store sensitive data such as user names and passwords and credit card information in plain text on your phone's memory, making the data an easy target for hackers. A Chicago-based mobile forensics company called viaForensics recently found as much after completing an audit of dozens of the most popular apps on both iOS and Android platforms.

Megan Geuss | 10 Aug | Read more

OPINION: Freedom and privacy, R.I.P.

Freedom and privacy, in any meaningful sense, are dead. I know, I know ... I've written about this topic before but that was in the context of our "factual" privacy, which is about access to what you might think of as "static" data about you. Now we have to recognize the death of our "realtime" or "lifestream" privacy: the freedom to go about our business unobserved and anonymously.

Mark Gibbs | 08 Aug | Read more

LulzSec, WikiLeaks, Murdoch: hacking's fourth wave

Wikileaks, hacking incidents like those attributed to LulzSec, and even the UK's News of the World voicemail scandal represent a fourth stage in the evolution of cybercrime, according to Dr Paul Nielsen, director and chief executive officer of the Software Engineering Institute (SEI) at Carnegie Mellon University (CMU) in Pittsburg.

Stilgherrian | 08 Aug | Read more

Creating a cloud SLA from diagnostic data

As a CSO and CIO you may be wondering why I crafted a diagnostic related to understanding your most critical web products. The original purpose of the diagnostic was to discern which applications and how applications are ported successfully to a service provider's cloud. The diagnostic determines which cloud IaaS products (storage components, network components, and virtualization machines) are needed for an application. It addresses the platform components (server/operating system and web server) in the PaaS layer. Lastly, it focuses on the SaaS software application.

Gregory Machler | 05 Aug | Read more