NZ gov’t hosts open data hackathon
Two-day event sparks interest across public and private sectors - there is a waitlist for participants
Two-day event sparks interest across public and private sectors - there is a waitlist for participants
How today’s exception may become tomorrow’s norm, writes Tim Green of Unisys.
Google is planning a series of seven public meetings across Europe to discuss people's right to be forgotten with the public's right to information.
Many of today's mobile and Web applications collect personal data. This makes plenty of users pause before downloading. To ease user's minds -- and to help developers demonstrate that they have legitimate reasons for collecting that information -- MyPermissions has established a permissions certificate process to deem apps 'trustworthy.'
More than three quarters in survey said their organisations had not trained employees to understand the privacy risks of BYOD
A funny thing is happening in the wake of the <a href="http://www.computerworld.com/article/2490179/security0/security0-the-snowden-leaks-a-timeline.html">Edward Snowden NSA revelations</a>, the infamous <a href="http://www.computerworld.com/article/2601905/apple-icloud-take-reputation-hits-after-photo-scandal.html">iCloud hack of celebrity nude photos</a>, and the hit parade of customer data breaches at <a href="http://www.computerworld.com/article/2490637/security0/target-finally-gets-its-first-ciso.html">Target</a>, <a href="http://www.computerworld.com/article/2844491/home-depot-attackers-broke-in-using-a-vendors-stolen-credentials.html">Home Depot</a> and the <a href="http://www.computerworld.com/article/2845621/government/us-postal-service-suffers-breach-of-employee-customer-data.html">U.S. Postal Service</a>. If it's not the government looking at your data, it's bored, lonely teenagers from the Internet or credit card fraudsters.
CIOs think about <a href="http://www.cio.com/article/32306/Privacy_Is_Your_Business">privacy</a> the way some people think about exercise: with a sigh and a sense of impending pain. Outside of regulated industries like health care--where patient privacy is paramount--privacy affects CIOs as a corollary of security when, say, a laptop holding millions of people's records is lost or hackers siphon off customer data.
Accept that sooner or later you’re going to have someone prowling around your network looking to cause damage or steal your critical data. Even the best perimeter defenses can do nothing to stop them, so it's essential to also have strong Active Directory security and governance in place. Here is a how to on combating the insider threat effectively.