The week in security: PRISM backlash reshaping citizen attitudes

access data without court approval.

If statistics are correct, at least 400 of those details would be false: over 12,000 requests during the same period. Google went a step further, pressuring the secret court overseeing US government surveillance programs to more than 50 terrorist plots. Simultaneously, the FBI was investigation of Google Glass (which in itself has launched a raft of compromised Europeans’ trust in the US.

Some said the NSA program could spied on foreign politicians during the G20 meetings in London in 2009. Indeed, the UK may be prepared to tolerate a certain level of perfidy from the US, with the Houses of Parliament called for public policy to fight PRISM, while some were even wondering whether the government might not unprepared to handle data breaches – even those that have been around for years, like the latest Office zero-day, which was spot data breaches in an average of 10 hours. Whether or not this is true, depends on which company you are talking about – but companies like shared some tips for raising IT security’s profile in the boardroom. Another security specialist recommended that security reviewers learn to impeding security efforts through a lack of inaction around IT security, yet another security specialist warned, while a survey pointed out that they’re falling short on the SAP implementations in particular were being introduced without adequate security controls.

Even with the numbers of malware attacks detect malware activity on desktop PCs and Macs, Cybercrims are remains the culprit for most breaches – and new Adobe survey suggesting most consumers don’t believe advertisers want personal details just to improve the relevance of their messages. There were warnings that the increasing tendency to use encrypted SSL traffic is going to degrade network performance because routers have to spend precious compute cycles decrypting and re-encrypting data to check it. New technologies are, after all, security bounty program that would see it paying security researchers that identify new exploits in Windows 8.1 and Internet Explorer 11 Preview. Oracle launched a Java 7 update that fixed 40 new security issues, while Apple pushed out its own Java fix for OS X Snow Leopard.

Join the CSO newsletter!

Error: Please check your email address.

Tags PRISMsecurity

More about Adobe SystemsAppleFBIGCHQGoogleMacsMcAfee AustraliaMicrosoftNSAOracleSAP AustraliaYahoo

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by David Braue

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place