93 Results for:reciprocity

  • Sort by: 

Mobile Security and Privacy

25 Jul 2017

In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity in terms of mathematics. Read More

RSAC16: US works on data access agreement with UK

By Warwick Ashford 01 Mar 2016

The US is negotiating with the UK to establish a new framework that will permit UK authorities to access electronic communications directly from US companies Read More

Intel Security warns of six social engineering techniques targeting businesses

By Warwick Ashford 19 Feb 2015

An Intel Security report encourages businesses to address and educate employees on “six levers of influence” used by hackers Read More

How threat actors weaponized Mia Ash for a social media attack

By Rob Wright 11 Aug 2017

Dell SecureWorks researchers detected suspicious activity on social media accounts of Mia Ash. When they dug deeper, they discovered a new, complex social engineering attack. Read More

Implementing a 21st century approach to digital identity

By Jerry Fishenden 08 Jan 2020

The government’s attempts at digital identity have failed – it is time for a new, modern approach Read More

Best Practices for Active Directory forest trusts

By Jonathan Hassell 01 Nov 2011

The more domains you manage, the more you rely on forest trusts. Follow these tips to manage your AD infrastructure – and maintain your sanity. Read More

IBM celebrates 100th birthday as workers send video calling for improved conditions

By Warwick Ashford 14 Jun 2011

International Business Machines (IBM) is celebrating its 100th birthday, founded as the Computing Tabulating Recording Corporation through a merger of four companies in 1911. Read More

UK intelligence agencies ‘unlawfully’ sharing sensitive personal data, court hears

17 Oct 2017

A secret court will decide whether Intelligence agencies are “unlawfully” sharing huge datasets containing sensitive information about the population with industry, government departments and overseas intelligence ... Read More

FISMA Compliance Handbook

14 Apr 2014

In this excerpt from chapter 3 of the FISMA Compliance Handbook, author Laura P. Taylor discusses the five methodologies that agencies use as a basis to carry out FISMA compliance. Read More

Facebook’s privacy game – how Zuckerberg backtracked on promises to protect personal data

01 Jul 2019

Facebook promised its users privacy then quietly abandoned its promises in pursuit of profits. Now it faces antitrust regulation Read More