When attorney Ronald Raether started his career, he was breaking new legal ground in technology and security. But today, with so much case law and so many regulations in these sectors, the demands for legal pros are significantly greater, and the bar is high, he notes.
Two months after the OpenSSL flaw known as Heartbleed was discovered, remediation efforts have slowed. But several security experts laud businesses' rapid response to the threat, noting that they've installed related fixes more quickly than usual.
A DDoS attack and subsequent data breach that led to the shuttering of source code hosting firm Code Spaces offers an eye-opening reminder to be aware of attacks used as a diversionary tactic to draw attention away from devastating hacking.
A global study conducted by data storage firm EMC to identify privacy attitudes worldwide found consumers in India are more willing to sacrifice privacy for online convenience than those in other nations.
A privacy activist's case against Facebook for allegedly sharing Europeans' personal data with the NSA in violation of EU data protection rules has been referred to the European Court of Justice for review.
The U.K. government's legal justification for spying en masse on British residents' online communications - Google searches, Facebook posts, Webmail - is questioned by privacy and Internet law experts as part of a case triggered by Edward Snowden's leaks.
While P.F. Chang's China Bistro has warned customers that their card information may have been compromised in a data breach, several fraud experts say they have yet to see a related increase in fraud. Learn the latest developments.
A new study shows the accuracy of facial recognition algorithms has markedly improved over the past three years, though one of the report's authors suggests they're not at the level to be a highly reliable form of authentication.
Although restaurant chain P.F. Chang's has not yet confirmed a breach, several researchers say they believe the chain suffered a malware attack similar to those that compromised Target, Neiman Marcus and Sally Beauty.
Breaking down silos should help organizations mitigate vulnerabilities introduced into their systems from the information and communications technology supply chain, says the co-author of new guidance from NIST.