
Cybersecurity economics
Our colleagues researched economic aspects of cybersecurity and reported on the dominant trends.
24 articles
Our colleagues researched economic aspects of cybersecurity and reported on the dominant trends.
A few stories about how easy it is to accidentally leak sensitive information into the public domain.
This week Dave and Jeff take a look at a leaked Google Doc that the NHS would like to take back, unemployment scams in the US, a Star Wars–Top Gun mash-up, and more.
Ransomware makers seem to be following a new trend, publishing data from companies that refuse to pay them.
In this post we explain why digital clutter can cost you your job.
Jeff and Dave discuss a fake Fortnite app, China visiting the dark side of the moon, Facebook breakup, Teensafe, and more.
Even very popular apps display ads using third-party code, which can transmit personal data unencrypted.
In this podcast, Jeff and Dave discuss the Facebook and Cambridge Analytica debacle, hackers making bomb threats, and more.
Most of those leaks could have been prevented with a timely audit of the IT infrastructure.
In this roundup, we talk about five true leaks and some lessons to be learned from them.
Journalists and their whistle-blowers managed to keep the biggest data leak in secret. How did they do it?
Devices that have functions of special importance, or that contain top-secret information, are not usually connected to the Internet. However, going offline is not the ultimate protection.
Internal and external threats may be quite different in nature, but they demand equal attention from the IT staff in order for the protection to be complete.
Wrapping up our Big Data Week, in this post we talk about potential of abuse of Big Data, which is arguably extreme.
Big Data means increased risks: a large-scale leak may lead to tremendous reputational damages, so cyber-resilience is extremely important.
Media called 2013 the ‘year of personal data leaks’, and for a good reason: last year credentials of hundreds of people fell into the wrong hands. In this post, we
It’s no wonder that every major figure in show business is not simply an artist, but is an entire business infrastructure. This type of infrastructure is comprised of marketing, sales
Apple Developer Center down for a week It took Apple about a week to restore the functions of the Apple Developer Center following its crash on July 18. After about
Using leased infrastructure for storing large amounts of data has been typical for several years. Leased capacities provide an advantage by allowing businesses to greatly reduce the cost of tending
California Attorney General Kamala D. Harris recently published a report on data breaches in 2012. One might ask why the Attorney General is concerned with data security issues so much