SEOUL -- The solution to privacy concerns lies not in data localization, but in the development of secure systems and the proper use of encryption. Data storage actually means the continuous transfer of data between users, with no regard for Westphalian borders. Policies born of confusion, chaos and confrontation have no place in this new world of opportunities.
Yet another massive data break example, the TalkTalk data breach of "significant and sustained proportions" as quoted from the CEO Chief Executive Dido Harding, is cold comfort for customers, but what lessons must we keep learning?
Marina Kaljurand is Estonia's Minister of Foreign Affairs. Prior to becoming Foreign Minister in July 2015, she was a long-time Estonian diplomat, and an ambassador to the United States, Mexico, Canada, Russia, Kazakhstan and Israel.
How can your company learn from the U.S. Secret Service's mistakes? Start by developing basic information security guidelines with respect to who can access sensitive data (such as personnel files or other confidential data) within your organization.
We live in a time when databases have started to include a terrifying amount of extremely intimate information about illnesses, diagnoses, treatments and health issues that nobody should have to fear might become reading material for criminals or their customers.
As much as possible, never use simple passwords or, worse, use the same one on all of your accounts. Even if they are complicated, some websites have less security in protecting passwords. It is hard to memorize many passwords, but this is for your own good and the protection of your identity.
E-, virtual, online, and net are gradually disappearing: This is the conclusion reached by the prefix monitoring of ongoing UN-based negotiations on global digital policy (negotiations on the 10-year review of WSIS, the World Summit on the Information Society).
The holiday shopping season is just around the corner, but businesses aren't the only ones that will be profiting from the uptick in consumer spending - cybercriminals will be making plenty of money too.
By: Joe McGauley Credit: Shutterstock No one takes the time to actuall...
Cyberweaponry requires cyberdeterrence and new types of internet shields. Major U.S. corporations spend millions repairing damage from cyber infiltration, but devote hardly any resources to assessing potential risk sources and pre-emptive mitigation.
Steve Jobs is back all over the media and movie screens these days - as Hollywood portrays its take of his genius and his warts. At the end of the day (not the movie), Jobs' greatest notoriety may indeed be elevating Tim Cook to be his successor.
If you're like most people, Big Data may not mean much to you yet. It might even just make your eyes glaze over. Like the cloud or cybersecurity or bioprinting, it's just one more thing you don't have to know about -- until you do.
Computers, smart phones and other internet-enabled mobile devices are the primary vehicles we use to communicate and exchange information. Although this exposes us to potential cyber security risks, there are ways to limit the negative impact of a security breach.
The email fraud landscape is a constantly evolving one. Cybercriminals are always coming up with new and sophisticated ways to leverage email to do ha...
Increasingly, the virtual world of the Internet is converging with the physical world through the Internet of Things. As more physical devices connect to the Internet, hackers' reach and breadth expands exponentially. Today, Internet-enabled devices include TVs, home security systems, kitchen appliances, thermostats, and more.
Marc Goodman recently shared his top strategies for how entrepreneurs can thwart cyber criminals -- and prevent our most sensitive and important assets from getting hacked.