The Stay Safe Online Blog

May 28, 2014 7:36pm
A recent PwC paper points out that not only does the NIST Cybersecurity Framework comprise “leading practices from various standards bodies that have proved to be successful when implemented,” but also “may deliver regulatory and legal advantages that extend well beyond improved cybersecurity for organizations that adopt it early.”
May 14, 2014 1:00pm
From a series of university data breaches to the recent settlement a teen student received after school officials demanded her Facebook password, student privacy is the one of the hottest topics in 2014.
May 12, 2014 7:00am
The RE: View is a bimonthly look back at the headlines that caught the attention of our RE: Cyber contributors that senior executives and Board members should consider when assessing and managing cyber risk.
May 8, 2014 7:00am
Data privacy is something that can be built into systems, taught to users of systems and valued by good old fashioned entrepreneurial techniques. All it takes is a little know how, creativity and the desire to build respect for data about people into technical solutions and organizations.
May 7, 2014 12:07pm
In honor of World Password Day, STOP. THINK. CONNECT. held a password Twitter chat with Intel Security, McAfee, Microsoft and other guests.
May 5, 2014 8:00am
Cloud computing is used by virtually every organization because it's a convenient way to use applications and share data in a web-based environment. But there are also risks to consider, says Private WiFi's Jared Howe.
Apr 28, 2014 11:01am
Consumers are becoming less naive regarding data about them being collected and shared, but they should become more knowledgeable about how those processes work and the risks involved, NCSA executive director Michael Kaiser told the Privacy Piracy Radio Show on 88.9 FM KUCI in Irvine, CA.
Apr 18, 2014 1:30pm
The RE: View is a bimonthly look back at the headlines that caught the attention of our RE: Cyber contributors that senior executives and Board members should consider when assessing and managing cyber risk.
Apr 14, 2014 8:03am
William J. Brunkhardt, chief technology strategist at Cyber Sciences Corporation, reviews what we know and what companies should be aware of regarding the Heartbleed bug.
Apr 9, 2014 3:00pm
Leading identity theft experts from The Identity Theft Council, National Consumers League, ID Theft Resource Center, PRIVATE WIFI and NCSA discussed the steps you can take to protect your personal information and how to respond if you become a victim of identity theft.
Apr 7, 2014 8:30am
Private WiFi's Jillian Ryan delves into the data from its latest study by Harris Poll identifying WiFi users, practices and risks, and shares it all in a new infographic. A version of this blog appeared on Private WiFi's blog on April 3.
Mar 24, 2014 6:30pm
By now, we hope you know that hackers can steal your sensitive information any time you connect to a public WiFi network. But what you may not know is how fast they can do it. That's what WAFB 9 demonstrated in a hacking experiment on a university hotspot in Baton Rouge, Louisiana. What happened should be a wakeup call for hotspot users everywhere.
Mar 12, 2014 4:00pm
The ever-changing ways kids interact online has made it difficult for parents to keep pace with the latest safety and security advice. PRIVO, Savvy Cyber Kids, iKeepSafe, the FTC and the Center on Media and Child Health joined NCSA to discuss tips for parents and share resources.
Mar 11, 2014 2:30pm
Recent surveys have revealed how generations view and address online safety and security concerns differently, writes Private WiFi's Jared Howe. A version of this blog originally appeared on Private WiFi's blog on March 6, 2014.
Mar 6, 2014 7:15am
One dilemma for companies may be the way "cyber" is used as an umbrella term for a vast set of threats, says John Glowacki, chief strategy and information officer at Protexit. Originally posted January 23, 2014.
Feb 25, 2014 1:00pm
The National Cyber Security Alliance, RSA Conference, U.S. Dept. of Homeland Security, Microsoft, McAfee, Juniper Security and others discussed public-private efforts to promote online safety education and resources, live from the RSA Conference 2014 in San Francisco.
Feb 20, 2014 9:10am
To help understand how shoppers are behaving in their stores, retailers are contracting statistical modeling firms that collect and analyze data many shoppers may not even realize they're providing through their smartphones. The growth of the Mobile Location Analytics (MLA) industry has raised questions about the specific information being collected, how it’s being used, and to what extent, if at all, consumers are aware this is happening.
Feb 13, 2014 5:00am
Regular investments in cybersecurity are as essential today as stone walls were to a medieval city, says Eric Brown, CIO, NCI Building Systems, Inc.
Feb 6, 2014 7:15am
"Smiling feels easy and natural. However, this action is quite elaborate from a structural point of view," writes Jetico CEO Michael Waksman. "So the key to making data privacy more accessible would be to use software that allows encryption to be performed easily and naturally without even thinking about it."
Feb 4, 2014 7:00am
David Hoffman was one of the driving forces behind the observation of Data Privacy Day in the United States and Canada in 2008, so it should come as no surprise Intel's global privacy officer delivered one of the most memorable comments of the 2014 Data Privacy Day Kickoff Event Jan. 28 at The Pew Charitable Trusts in Washington, D.C.

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25