You are the content you publish.
Sign up with Facebook
Sign up with Twitter
I don't have a Facebook or a Twitter account
Start a free trial of Scoop.it Business
Lance Spitzner (SANS) ran some numbers at privacyrights.org; over 40% of the records breached are actually the result of the human.
Are you sure you want to delete this scoop?
Plans to favor some Internet packets over others threaten consumers’ hard-won right to use encryption, a digital privacy advocate says.
Activists and tech companies fended off efforts in the U.S. in the 1990s to ban Internet encryption or give the government ways around it, but an even bigger battle over cryptography is brewing now, according to Sascha Meinrath, director of X-Lab, a digital civil-rights think tank launched earlier this year. One of the most contested issues in that battle will be net neutrality, Meinrath said.
It was probably legal. But was it ethical?
June 25, 2014 Hearing on Student Data Privacy (USHR13 Education and the Workforce Committee)
An NYU graduate student explores what it means to expose ourselves online by creating a dress that translates data sharing into real-life exposure.
Unsecure Wi-Fi networks have been a well-known vulnerability in the tech industry for years. They can let even an unsophisticated hacker capture your traffic and possibly steal your identity.
We looked at 15 top companies and services that handle your email or store your data every day to see what steps they take to keep it from prying eyes. See how they stack up.
The online-education boom has made technology vendors powerful. So powerful, in fact, that some university officials say it’s getting harder and harder to update their technology without placing themselves under the sway of outside companies.
Now four major research universities are trying to promote strength in numbers. They are creating a consortium, called Unizin, that they hope will help member institutions innovate on their own terms.
“Unizin is a strategic move by universities to assert greater control and influence over the digital-learning landscape than would otherwise be possible by any single institution,” the founders write in a news release. The four institutions are Colorado State University, Indiana University, the University of Florida, and the University of Michigan.
Unizin will negotiate contracts with technology vendors for products and services that many universities already buy individually. But instead of implementing the technologies locally, member institutions will get a set of “sewn-together services” from Unizin in exchange for dues, says Bradley C. Wheeler, vice president for information technology at Indiana.
Target. The University of Maryland. EBay. Just a few of the organizations that have been hit with major, headline-grabbing data breaches. And that’s only in the past six months.
Breaches—both minuscule and major—are now so common that it’s hard not to think fatigue will soon set in—if it hasn’t already. I’m finding that friends and family—generally people not involved in the privacy profession—are becoming more aware of these events, which is great, but will the public eventually begin to ignore them?
During the summer of 2010, Symplicity Corporation knew it wasn’t keeping up with the competition.
Trying to stand out in the small world of technology companies that supply colleges with software to track student disciplinary cases, Symplicity CEO Ariel Manuel Friedler noticed more colleges and universities picking its main competitor, Maxient, because its software “feels like a website,” he emailed to employees. “We are bleeding ... we have lost close to a dozen [clients] this year.”
To win back colleges, Symplicity’s top leader and two other employees hacked their way into Maxient’s servers to stock up on the competitor’s product design, new features and software layout.
US Department of Justice Press Release: http://www.justice.gov/usao/vae/news/2014/05/20140521friedlernr.html
Chief privacy officers are common in the commercial world and at the agency level. Is there a role for a statewide CPO?
Spurred by a desire to better control who is moving in and out of campus facilities, colleges are adopting sophisticated online access systems at a steady clip. The systems, which support arrays of hard-wired and wireless locks, are being applied to interior doors, such as those in residence halls and labs, in addition to exterior doors. In some places they are being installed in concert with other security features, like video surveillance technology. The migration is such that traditional keys on college campuses could soon become as quaint as typewriters.
Online building-access systems deliver a certain "wow" factor. They allow administrators to monitor and control individual doors using a dedicated workstation or browser-based interface. User-friendly features include doors that can be unlocked by contactless "tap" cards and mobile devices.
On Monday May 12th 2014 sometime during the 169th Commencement Exercises of Emory University, what best could be called a career limiting move, a Windows 7 deployment image was accidentally sent to all Windows machines, (approximately 2000+ machines) including laptops, desktops, and even servers. This image started with a repartition / reformat set of tasks.
As soon as the accident was discovered, the SCCM server was powered off – however, by that time, the SCCM server itself had been repartitioned and reformatted.
Restoration of Emory.edu servers began immediately, but the process took far longer than expected, The Emory Information Technology team started using consultants to help validate the health of the SCCM servers and that work only completed only recently.
A proposal for a detailed federal database of all college students has once again surfaced, the brainchild of researchers who believe that a major purpose of colleges is to serve as data sources for their own studies, and of policy wonks who think that any nationwide effort worth doing must be owned and operated by the federal government. The proposed database is a bad idea for at least three reasons...
A California company has found as way to turn energy-saving LED bulbs into smart networks that can collect and feed data
Police cannot generally search cellphones without a warrant when they are arresting someone, the U.S. Supreme Court ruled in a unanimous decision Wednesday that weighs heavily in favor of Fourth Amendment and privacy rights.
In an age of surveillance anxiety, the notion of leaving your Wi-Fi network open and unprotected seems dangerously naive. But one group of activists says it can help you open up your wireless internet and not only maintain your privacy, but actually increase it in the process.
At the Hackers on Planet Earth conference next month, the Electronic Frontier Foundation plans to release software designed to let you share a portion of your Wi-Fi network, password-free, with anyone nearby. The initiative, part of the OpenWireless.org campaign, will maintain its own flavor of free, open-source router firmware called Open Wireless Router. Good Samaritans can install this firmware on a cheap Wi-Fi router, creating a public slice of bandwidth that can dialed up or down with a simple smartphone interface.
A new global survey of consumers found that businesses — more than hackers or government — are seen as a threat to the privacy of personal information.
When Apple releases iOS 8 in the fall, corporate employees who use their iPhones and iPads for work will have better privacy protection when walking in places with Wi-Fi networks.
Another privacy feature being added to iOS 8 is to make DuckDuckGo the default search engine in the Safari browser. DuckDuckGo is considered more secure than competitors because it does not track users or collect and store personal information.
The concept of a career roadmap is something with which we are extremely familiar. We are both retired military intelligence professionals with a combined 60 years of service to the United States. We grew up in a system that consisted of an enterprise-wide, tiered certification process, which laid out a set of minimum skills and experience levels required at certain waypoints in our career. We have also witnessed the benefits of a structured career roadmap during our tenures in the U.S. government’s civilian career service. Entry-level employees understand exactly what knowledge, skills and abilities they must acquire to compete successfully at the middle and senior technical and management levels. Aspiring U.S. government civilian senior executives, positions comparable to corporate-level executives, also have structured career roadmaps that define executive core competencies they must possess in order to compete successfully at this level.
This is why we are proposing a career roadmap for privacy professionals.
Over the past year, we've learned a lot about what the National Security Agency can do. Our technology correspondent allowed his phone and Internet activities to be monitored to see what was revealed.
This is one of the juiciest and most prestigious accidental data dumps we've seen yet. Which law school did it?
More than 20 colleges in the Boston area have “largely agreed” to disclose the addresses of students who live off campus after meeting on Tuesday with Mayor Martin Walsh, The Boston Globe reported.
The mayor said he planned to use the addresses to build a database in an effort to single out overcrowded properties for inspection.
Boston institutions have long resisted releasing student addresses, but Mr. Walsh said he had heard no objections at the meeting and several representatives promised speedy compliance.
Boston College, however, later said it still was concerned that releasing student data might violate federal privacy law. It is studying the mayor’s request.
A landmark “right to be forgotten” ruling against Google in Europe risks damaging the next generation of internet start-ups and strengthening the hand of repressive governments looking to restrict online communications, Larry Page, the search company's chief executive officer, has warned.
For decades, companies have attempted to educate employees on security awareness. However, these efforts have largely failed. Instead of merely seeking to give workers knowledge, you need to embed behaviors that reduce information security risk.
This “Just in Time” research is in response to recent discussions on the EDUCAUSE Higher Education Information Security Council (HEISC) discussion list about data breaches in higher education. Using data from the Privacy Rights Clearinghouse, this free report compares higher ed to other sectors to help you assess risk.