Join the Community

23,408
Expert opinions
42,308
Total members
280
New members (last 30 days)
171
New opinions (last 30 days)
29,114
Total comments

Latest expert opinions

clear
clear

4358 Results from /regulation

Retired Member

Retired Member 

Cybercrime Czar? Government bailout for cybercrime?

Barack Obama announced last week that there will be a new Cybercrime Czar in the US reporting directly to the president. We wonder what, if any good that will do. Can he/she be more than a figurehead when the crimes they want to stop originate in the Ukraine or Bulgaria or Indonesia? Will they attempt to burden us with more ineffective regulation?...

/security /regulation Information Security

Keith Appleyard

Keith Appleyard IT Consultant at available for hire

Does Merrick have a case against Savvis?

Merrick Bank has launched a multi-million dollar lawsuit against Savvis, accusing the vendor of erroneously telling it that CardSystems Solutions complied with Visa and MasterCard security regulations. However, do they have a case? The PCI Data Security Standard Self-Assessment Questionnaire (SAQ) is a validation tool intended to assist merchants a...

/regulation Whatever...

Retired Member

Retired Member 

Thinking and Awareness Needed to Stop Crime, Not Just Tech

Recently, a targeted crime spree hit Staten Island with 250 Sovereign Bank customers caught up in a never-ending technological arms race between criminals and the rest of us. This time it wasn’t the latest hacker sitting at a far away computer in the middle of the night. Rather it was a small gang that used skimming technology and video cameras...

/security /regulation Information Security

Gary Wright

Gary Wright Analyst at BISS Research

Data Security Myth

There has been no end of stories over recent years about the ability of companies and organisations to maintain their data security. Bad news always travels faster than good and we will only ever know about the instances where data security is breached rather than the majority of occasions when data is secure but the quest to achieve total securit...

/regulation /retail Data Management 101

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Typosquatting on Twitter and other social networks

Typosquatting, which is also known as URL hijacking, is a for of cybersquatting that targets Internet users who accidentally type a website address into their web browser incorrectly. When users make a typographical error while entering the website address, they may be led to an alternative website owned by a cybersquatter. This can lead to fina

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

How to prevent social media identity theft

Two words: you can’t. However, there are several things you can and should do in order to manage your social media identity, which may prevent social media identity theft. What exactly is social media identity theft? It’s a form of cybersquatting using social media sites. If you’ve ever attempted to join a social media, more commonly known as a

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

ATM Skimming Foiled By Evangelist

It's very disheartening when an ATM user has to explain to a bank branch manager what ATM skimming is. I met a charismatic gent on FOX and Friends named Sean Seibel. Sean has a unique job title at Microsoft: User Experience Evangelist. Sean’s job is to be on top of what's new and what's next in technology, in the next 5-7 years. He’s a futurist.

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Botherders have taken control of 12 million new IP addresses

Lexis Nexis, which owns ChoicePoint, an information broker I recently blogged about that was hacked in 2005, was just hacked again this week. On Friday, LexisNexis Group notified more than 32,000 people that their information may have been stolen and used in a credit card scam that involved stealing names, birth dates and Social Security numbers ...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Information Security, Lies and Social Engineering

Social engineering is the act of manipulating people into performing certain actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes fac...

/security /regulation

Retired Member

Retired Member 

Bad Data is Out of Fashion

Every day, I get email and snail-mail delivered faithfully, eagerly and hopefully into my mailbox by some organization that has spent time and money with the singular goal of delivering their message to little ol' me. They have either dedicated resources or paid to find my name and my address. Unfortunately, these same resources haven't bothere...

/regulation /wholesale Women in Technology

Now Hiring