The recent U.S. Court of Appeals for D.C. ruling in Verizon Communications v. the FCC may have profound implications for what is now considered Net Neutrality. One of many questions being asked is how this will affect business enterprises that rely on the Internet for its employees and how access usage polices will be enforced.
Although the FCC’s 2010 Open Internet Order set out level playing field rules meant to govern Internet providers, Verizon Communications countered by saying that the FCC doesn’t have the authority to regulate the Internet. The court found that broad... [More]
Although BYOD is a landscape that is constantly in flux under the feet of businesses and institutions, developing a BYOD policy is a critical first step in stabilizing that ground. Businesses and institutions need to understand that there are many things that they can do to create a strong security policy. This can be accomplished by realizing that there are a number of fundamental policy concepts that can provide a framework that will accommodate the changing landscape.
Since employees desire to use all manner of mobile devices in the workplace, security is the primary concer... [More]
Pearl Software is showing the love this weekend with a 20% discount on licenses. Discount will be applied to all orders and quotations requested through Monday, February 17th.
Please mention coupon code "Valentine" when ordering or requesting pricing.
Every day seems to bring some new threat or incursion that costs businesses, corporations and institutions money in the form of customers, reputation and data. As technology becomes more sophisticated along with the threats that exploit new vulnerabilities, the world’s businesses, corporations and institutions are straining to keep pace.
According to a new market research report from U.S.-based global market research and consulting company MarketsandMarkets, the cyber security market is expected to reach $120.1 billion by 2017. Although spending on cybersecurity is rapidly advan... [More]
The recent malware infection of Adverts on Yahoo's homepage affecting more than two million PC’s across Europe and some potential incursion into U.S. territory was the latest reminder of advertising network vulnerabilities. Of course, the story was everywhere that the malware infection was designed to mine the Bitcoin virtual currency turning computers into Bitcoin mining... [More]
According to an Israeli National News article, the Israeli government recently held a vote to pass a law requiring the State’s ISPs to provide their customers with free Internet filtering programs and education on how to use them. A little digging into Israel’s relationship with the Internet shows that this appears to be just the latest addition to their search for a workable overall Internet policy that balances openness, security and choice.
Like many countries around the world, Israel has a complicated history when it comes to the Internet and Internet filtering. For ex... [More]
Clearly, there is no putting the BYOD genie back in the bottle as far as employees and businesses are concerned. Mobility products such as tablets, smartphones, laptops and other connected devices are already a major security and policy concern for businesses and corporations that are adopting BYOD, even with mobile monitoring software in place. As most businesses struggle with the current crop of mobile technology, the era of wearable technology like Google Glass and Smart watches will have an almost immediate effect on BYOD.
Both Google Glass and Smart watches are wearable devices that can ... [More]
While the U.S. has always placed the burden of Web filtering on end users, governments around the world are increasingly censoring Internet use in varied forms.
Currently, more than 44 countries implement some form of filtering or censorship of the Internet. The 2013 Freedom House Report entitled “Freedom on the Net 2013” provides details on how these and other countries are engaging in Web filtering or blatant forms of Internet censorship. As Internet censorship grows around the world, it contrasts the United States’ general approach to let end users utilize commercially av... [More]
With Facebook studying the instances of users that type messages and posts that they do not send, the sophistication of Internet monitoring has grown from being able to monitor what we say to what we don’t say.
While Internet monitoring software has become quite sophisticated, Facebook has upped the ante by tracking what its users do not say. As part of a recent study, the social media giant began collecting and analyzing the data of users that typed messages that they did not send. By doing so, the company has learned a great deal about how its users self-censor themselves.
Facebook s... [More]
As India asks the U.S. for help in monitoring online message service communications, it further highlights the current grey area of Internet monitoring boundaries, personal communications, and governments.Every day seems to bring some new Internet monitoring story with the latest being India’s Union Home Ministry requesting that the U.S. help them monitor Web chats from several online messaging services. The Indian governmental agency is requesting that the U.S. share its encryption keys so that they can monitor online messaging services such as Viber, WhatsApp, Skype, and WeChat for hat... [More]