elirosenblatt + oacfe14   19

CIO discovers the 'terrifying' reality of cloud apps running wild
CIO Michael Keithley has held the top tech post at Hollywood talent company Creative Artists Agency for nearly a quarter of a century, so you'd think he knows just about everything going on…
oacfe14  presentation2014  osbcc14  mba14  infosec 
may 2014 by elirosenblatt
Vendor Voice: BYOD Is the No. 1 E-Discovery Challenge for 2014
In a survey of inside counsel at Fortune 1,000 companies, FTI Consulting found that the number one e-discovery challenge listed for the coming years is "bring your own device" to work. Companies,…
oacfe14  osbcc14  mba14  infosec 
may 2014 by elirosenblatt
3 keys to avoiding BYOD breaches
Without question, BYOD, or “bring your own device,” offers benefits to both healthcare employees and employers.  The benefits of BYOD are luring. To name a few, users are familiar…
oacfe14  osbcc14  mba14  infosec 
may 2014 by elirosenblatt
Even the most secure cloud storage may not be so secure, study finds
Some cloud storage providers who hope to be on the leading edge of cloud security adopt a "zero-knowledge" policy in which vendors say it is impossible for customer data to be snooped on. But a…
oacfe14  osbcc14  mba14  infosec 
may 2014 by elirosenblatt
5 Legal Gotchas in the Cloud
Don't sign a cloud computing contract until you consider five areas that are fraught with risk in the cloud. The red flags include not only data security and privacy, but also e-discovery, search…
oacfe14  osbcc14  mba14  infosec 
may 2014 by elirosenblatt
Technology Context From the Verizon Data Breach Investigations Report (DBIR)
By Bob Gourley For a decade now the cyber security community has been treated to important strategic context coordinated by Verizon in their Data Breach Investigations Report (DBIR).  The…
oacfe14  osbcc14  mba14  infosec 
may 2014 by elirosenblatt
Fraud prevention through device intelligence - Matt Tatham | Analytics & Credit Decisions Community
As we discussed in our earlier Heartbleed post, there are several new vulnerabilities online and in the mobile space increasing the challenges that security professionals face. Fraud education is a…
oacfe14  osbcc14  mba14  infosec 
may 2014 by elirosenblatt
Lawyers between a rock (social media) and a hard place (the cloud)
It is well understood that changes in technology present challenges to legal practice that go beyond intellectual property litigation. For example, the growth in electronic discovery over the past…
oacfe14  osbcc14  mba14  infosec 
april 2014 by elirosenblatt
Security Breaches of Personal Information at Federal Agencies More than Doubles Since 2009
Security Breaches of Personal Information at Federal Agencies More than Doubles Since 2009 Millions of individuals who recently entrusted personal, medical, and financial information to the federal…
oacfe14  osbcc14  mba14  infosec 
april 2014 by elirosenblatt
Credit Card Theft increasing for Banks and Retailers
by Robert Siciliano 2013 was the year of 740 million records involving data breaches. And that number may be erring quite on the conservative side, according to the Online Trust Alliance. The records…
oacfe14  osbcc14  mba14  infosec 
april 2014 by elirosenblatt
10 Ways To Fight Digital Theft & Fraud
IBM touts holistic approach to cyber-security, counter-fraud, and compliance efforts. Bankers, security experts, and a former White House CIO offer proactive advice.1 of 11
oacfe14  osbcc14  mba14  infosec 
march 2014 by elirosenblatt

Copy this bookmark:



description:


tags: