Governments are rapidly adopting AI surveillance technology to advance political goals, according to a new report from the Carnegie Endowment for International Peace. While Chinese suppliers dominate, liberal democracies and authoritarian regimes alike are developing and procuring such technology.
Ignoring a breach disclosure can have ugly consequences. Case in point: Lumin PDF, a PDF editing tool, which saw data for much of its user base - about 24.3 million - published in an online forum late Monday. Data breach expert Troy Hunt says it's sign of the dysfunction in the breach disclosure process.
The U.S. Justice Department has sued Edward Snowden over his new memoir, claiming that the former NSA contractor violated a nondisclosure agreement he signed when he worked for the government before becoming the world's best-known whistleblower. The suit seeks to collect all profits from the book.
U.S. Senators Chuck Schumer, D-N.Y., and Tom Cotton, R-Ark., are asking the Federal Communications Commission to reconsider operating licenses granted to two Chinese telecommunications companies, citing concerns over national security and foreign espionage.
An unsecured database owned by an Ecuadorian consulting company left over 20 million records on the South American country's citizens exposed to the internet, according to a report from two independent security researchers. An official investigation is underway.
The Canadian government has arrested a senior intelligence official on charges of working as a mole. He was reportedly unmasked after investigators found someone had pitched stolen secrets to the CEO of Phantom Secure, a secure smartphone service marketed to criminals that authorities shuttered last year.
The shift to cloud has made perimeter-centric view of security obsolete and led to the creation of Zero Trust. With users accessing corporate resources across a variety of devices, platforms and clients, organizations are seeing an increase in phishing, password spray, brute force and other identity based attacks....
In the face of advanced, never-seen-before, cyber-threats, how can organizations leverage immune system technologies to pre-empt emerging threats and reduce incident response time? In this session, Darktrace's Martha Gray will draw upon real-world examples of subtle, unknown threats that routinely bypass traditional...
Ahead of the release of Edward Snowden's memoirs chronicling his decision to bring illegal "big data" domestic U.S. surveillance programs to light, a former NSA intelligence specialist points out that the U.S. still lacks a whistleblowing law to protect intelligence workers who spot illegal activity.
Veteran security leader Martin Overton tackles cyber insurance with a review of case studies that illustrate genuine benefits ... and subtle pitfalls that may result in no coverage for costly incidents. Overton has over 30 years of hands-on security experience, along with several years working for a major...
Enterprises have endured decades of security policies, programmes, plans, metrics and awareness training ... and yet little has improved. CISOs still complain that people are failing at the cybersecurity basics. This session will explore issues in user awareness training and offer a different approach, including:
Insider threats are difficult to counter. What happens when an employee goes rogue, and how do you catch them? Charles Carmakal of Mandiant, who says his firm is dealing with more insider threat investigations, shares tips for better defenses.
Ransomware-wielding attackers treat infecting endpoints as a business and put customer relationship management principles to work, says Bill Siegel, CEO of ransomware incident response firm Coveware. He notes criminals "go after the low-hanging fruit because it's cheap and the conversion rate is high."