Access "Internet privacy tools only go so far"
This article is part of the September 2010 issue of 2010 Security Readers' Choice Awards
Earlier this decade, public criticism halted the Big Brother-esque initiative from the U.S. government to create a massive database of personal information collected from a wide range of sources, everything from emails to credit card purchases. And we've certainly come a long way from the infamous and long-ago abandoned government plan to embed surveillance chips in consumer electronics. Or have we? Moxie Marlinspike, a noted independent security researcher, says the private sector has taken up the cause. Websites like Google, Facebook and others offer free services that are designed to help people take part in society, but at a hefty cost: You volunteer your personal information to companies and that valuable data accumulates. "If there's one thing Google has excelled at doing, it's making sense of large repositories of data," says Marlinspike. "Make no mistake about it, they are in the surveillance business and the effect is the same." Managing online privacy was one of the themes that surfaced at Black Hat 2010, with a session track devoted to the issue. ... Access >>>
Premium Content for Free.
2010 Information Security magazine Readers' Choice Awards
For the fifth consecutive year, Information Security readers voted to determine the best security products. Nearly 1,500 voters participated this year, rating products in 14 different categories.
PCI update could mean clarity or confusion
What you can expect from this fall's update to the Payment Card Industry Data Security Standard.
- 2010 Information Security magazine Readers' Choice Awards
Web 2.0 security threats and how to defend against them
by David Sherry
The collaborative nature of Web 2.0 introduces myriad threats to data that must be proactively countered.
Internet privacy tools only go so far
Tools help protect privacy but safeguarding personal data in the age of Google and Facebook is getting harder.
- Web 2.0 security threats and how to defend against them by David Sherry
Intel acquision of McAfee a head-scratcher
Embedding security in hardware isn't new, but is it worth an $8 billion investment? Time will tell on the Intel-McAfee acquisition.
How to develop a data breach response strategy
by Kim Getgen and John W. Woods
Targeted attacks on corporations and their crown jewels have become routine. Companies need to be prepared.
Should enterprises give in to IT consumerization at the expense of security?
Bruce Schneier and Marcus Ranum debate the risks associated with employees using personal computing devices.
- Intel acquision of McAfee a head-scratcher
More Premium Content Accessible For Free
The rapid evolution of MDM solutions
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Enterprise network security visibility: Beyond traditional defenses
Organizations have implemented various network security technologies to gain better visibility into their networks. However, these security ...
Compliance and risk modeling
You can fight compliance or embrace it, but one way or the other, you can’t escape it. Increasingly, smart organizations are not just accepting ...