As companies begin submitting their regulatory filings and financial reports from 2011, the SEC is pushing for more comprehensive data breach, cyber attack, and general risk-assessment disclosures.
Browsing Category: Compliance
While lawmakers in the U.S. debate new laws that would give media companies powerful new legal weapons to stop the distribution of copyrighted content online, a new survey of Americans finds that most admit to having pirated content themselves – and don’t see any problem with it.
Microsoft announced today it is suing Britain’s second-largest electronics retailer Comet for allegedly creating and selling more than 94,000 back-up discs of its Windows Vista and Windows XP product.
Shari Lawrence Pfleeger wrote the book on cyber security – or should we say “books.” The longtime researcher and expert has authored numerous textbooks on everything from software engineering, to the application of metrics in software development, to computer security. The head of research for the Institute for Information Infrastructure Protection (I3P) at Dartmouth College, Pfleeger says that many of the biggest challenges facing organizations in the realm of cyber security are social, and not technological.
An audit of Facebook’s operations by the Office of the Data Protection Commissioner in Ireland will result in major changes to the way the social networking giant manages user data.
As the public debate over the merits and drawbacks of the SOPA bill continues, consumers and privacy advocates already are looking for ways to get around the provisions in the proposed anti-piracy law that they see as unreasonable and oppressive. In one example, a developer has published an extension for Firefox that helps users circumvent SOPA’s domain blacklisting.
by Fergal Glynn, Director of Marketing, VeracodeI recently read a blog post by CloudFlare and Shawn Graham that asked a fantastic (and timely) question: “Do Hackers Take The Holidays Off?” CloudFlare sees traffic for hundreds of thousands of websites and was able to answer the question. They looked at the average percentage of requests that constitute threats, graphed the deviation, and then overlaid any events happening on those days. Their conclusion: it depends on the holiday.
Be careful of what you ask for. That’s a lesson that Max Schrems of Vienna, Austria, learned the hard way when he sent a formal request to Facebook citing European law and asking for a copy of every piece of personal information that the world’s largest social network had collected on him.
A class action lawsuit filed in U.S. District Court in California against Hewlett-Packard could have wide ranging implications for software makers, should the court agree with the plaintiff’s claim that the company violated the state’s consumer protection laws by failing to disclose a serious vulnerability in the software that runs some of its printers.
The Office of Science and Technology Policy (OSTP) released a new report yesterday that details plans to complement the nation’s existing cybersecurity policy, according to a blog entry on the office’s site co-authored by U.S. Chief Technology Officer Aneesh Chopra and Cybersecurity Coordinator Howard Schmidt.