Apple to stop ad firms hacking HTTPS protections to track iPhone users
Apple has rolled out a new version of Safari's cross-site tracking defenses and new mitigations for techniques that ad firms were using to bypass the privacy protocols.
Apple has rolled out a new version of Safari's cross-site tracking defenses and new mitigations for techniques that ad firms were using to bypass the privacy protocols.
How do you get high-end security-monitoring skills without the high-end price? Industrial giant BlueScope recently found out after its CSO worked with a key service provider to build a robust, |global security operations centre (SOC) using open-source components.
David Braue | 02 Nov | Read more
Dutch SIM card maker Gemalto says its SIM cards are “secure” despite a report that US and UK spies hacked the company and stole encryption keys that would allow them to intercept mobile communications.
Whether driven by hackers becoming more aggressive, or by new regulations increasing visibility around an ongoing problem, growing reports of data theft are prompting organisations to take urgent and proactive measures to protect business documents during every stage of their life cycle.
David Braue | 22 Jul | Read more
A string of high-profile data breaches in 2012, from LinkedIn to Global Payments, have kept enterprise data security in the limelight. But most organizations still tend to be reactive and focus on firefighting when it comes to data security, rather than implementing a more effective long-term strategy. Let's examine the four most common pitfalls of this short-sighted approach.
Ashvin Kamaraju, VP product development and partner management, Vormetric | 24 Dec | Read more