Identity & Access — News

Researchers crack satellite encryption

Researchers at a university in Bochum, Germany claim to have cracked <a href="http://www.networkworld.com/slideshows/2009/100609-layer8-algorithm.html">encryption algorithms</a> of the European Telecommunications Standards Institute (ETSI) that are used to secure certain civilian satellite phone communications.

Ellen Messmer | 09 Feb | Read more

Brain drain: Protecting your organization's IP

Global healthcare provider Best Doctors employs the most robust technologies and practices available to protect the privacy of its members' personal data—but that's just a part of doing business in this industry. Less obvious but equally important is the degree of vigilance with which the company <a href="http://www.csoonline.com/article/494853/brand-protection-the-expanding-cso-portfolio">protects its brand name</a>, which is trademarked in dozens of countries worldwide.

Lauren Gibbons Paul | 07 Feb | Read more

End-to-End Encryption: The PCI Security Holy Grail

With groups like Anonymous actively looking to embarrass your company, laptops thefts occurring every second, and the recent poor <a href="http://www.cbsnews.com/8301-501465_162-57365004-501465/judge-americans-can-be-forced-to-decrypt-their-laptops/">US District Court ruling</a> on fifth amendment password protection rights, it is time you actually encrypt your data properly.

Ben Rothke and David Mundhenk | 02 Feb | Read more

RFID Credit Cards Are Easy Prey for Hackers, Demo Shows

It's been known for some time that there are security issues associated with the increasing use of <a href="http://www.pcworld.com/article/194177/researchers_work_to_create_secure_rfid_tags.html">RFID tags</a> in credit cards, but this past weekend afforded a fresh demonstration of just how easy it is for hackers to take advantage of them.

Katherine Noyes | 02 Feb | Read more

5 principles of selling security initiatives to executives

In the world of data leaks and cybercrime, why is it that selling information security is considered a hard task? Is it because information security is pitched as a tool—buy software and it will fix everything—or is there a lack of understanding about what a healthy information security posture will achieve for an organisation.

Puneet Kukreja | 11 Jan | Read more

Security roundup for week ending Nov. 11

Is there justice in cyberspace? The U.S. Department of Justice (DOJ) last week offered hope there is, <a href="http://www.networkworld.com/news/2011/110911-doj-charges-seven-in-massive-252945.html">charging seven individuals</a> with 27 counts of wire fraud and other computer-related crimes in connection with a massive "clickfraud" scheme that was based in Estonia.

Ellen Messmer | 12 Nov | Read more

Don't let your data suffer from Miss Taken Identity

Whether you celebrated National Identity Fraud Awareness Week (NIFAW) with a large identity cake or just shrieked 'Who Are You?' and other identity-inspired songs with friends over a beer or four, the campaign has run its course for another year -– and reminded those who were listening that we're still living in a world of trusting, naïve fools.

David Braue | 02 Nov | Read more

Security roundup for Oct. 28: Cloud security holes; Facebook vulnerable?; China hackers lambasted

In last week's news, Amazon Web Services vulnerabilities <a href="http://www.networkworld.com/news/2011/102611-security-cloud-252406.html">were found and fixed</a>, but other cloud service providers are probably susceptible to similar problems <a href="http://www.networkworld.com/news/2011/102611-researchers-demo-cloud-security-issue-252403.html">discovered by a German research team</a> at Ruhr University Bochum.

Ellen Messmer | 29 Oct | Read more