IAM in a shifting environment

IAM in a shifting environment

The fourth annual Identity Management Day (April 9) brought the opportunity to assess and evaluate the shifting environment plaguing Identity and Access Management (IAM). Identity plays a pivotal role in all facets of business functions. Overseeing identity and access presents challenges in determining who should have access to what. This process requires a contextual understanding of the roles and duties of numerous individuals within an organization, ranging from system owners…

toilet paper, safe, gold value

Why your data isn’t as safe as you think and what it could cost you

We’ve all been guilty of not backing up important files, only learning our lesson after losing family photos, documents or homework. But for businesses, not backing up data can be a costly mistake.

This content requires that you purchase additional access. The price is $1.00 or free for our Premium members.

Purchase this Content ($1.00) Choose a Membership Level

Book Review: AI Doctor, take the money and run

When we received an invitation to review AI Doctor we were quite excited to get a look inside what a serial entrepreneur, investor, and cardiologist thinks about dealing with those vulnerabilities.

You must first purchase a membership level before purchasing this content.

Click here to choose a membership level.

TikTok CEO testifies before Congress

Social media hangs itself in TikTok legislation

The debate over the appropriateness of the Congressional action against TikTok can be debated for a long time and probably will until the Senate takes action—which could be weeks. What is less debatable is TikTok’s, and pretty much all of the social media industry’s contribution to the situation. In essence, social media has hung itself with its own lifeline.

The industry has long embraced Section 230, a section of Title 47 of the United States Code that classifies them as part of the telecommunications industry. That particular law immunizes social media platforms and users from legal liability for online information provided by third parties. The section also protects web hosts from liability for voluntarily and in good faith editing or restricting access to objectionable material, even if the material is constitutionally protected. These protections do not apply to what is traditionally known as “the media.” That is an important distinction.

The FCC also regulates related to the foreign ownership of telecommunications companies, broadcast, and cable companies, in that it is not allowed. If TikTok expects protection under Section 230, it has to abide by all the FCC regulations, including ownership. In that case, the legislation is consistent with US law.

News media or Telecom?

However, the CEO of TikTok has made the case that the legislation infringes on the First Amendment rights of the company, creators, and users because… wait for it … TikTok is a major source of news for users. In other words, it is a news medium. According to TikTok, 43 percent of users rely on the app for daily news. But that sets up an entirely different problem.

Print, broadcast, and cable media are bound by ethics and laws to print truth. If they knowingly publish defamatory and untrue information, they can be sued by the injured party. That was most recently and famously demonstrated in the lawsuits against Fox News and Rudy Guiliani for intentionally spreading lies about election technology related to the 2020 US election.

Those same lies were and still are spread on social media platforms, including TikTok, with impunity under the protection of Section 230. But if they are a news medium, the protections of Section 230 go away and TikTok and creators who spread disinformation can now be held accountable for libel and slander.
Social media companies can adjust algorithms limiting what kind of information can be distributed on their networks and they reluctantly apply those restrictions when they are pushed to. But they can’t be sued for disseminating that information under Section 230. If they

This content requires that you purchase additional access. The price is $1.00 or free for our Premium members.

Purchase this Content ($1.00) Choose a Membership Level

Thief stealing a credit card from a hidden pocket

Scam Bucket: Credit card fraud is inevitable

You can do everything right, but credit card fraud is inevitable.

In recent weeks, Cyber Protection Magazine has fielded calls and emails from people who have followed all the best-known techniques for securing banking, debit, and credit card information. That includes bank notifications every time the card is used, multi-factor authentication (MFA), biometrics, and limiting the use of a card for specific transactions. These readers still experienced unauthorized use of their payment cards

How does that happen?

The market for criminal use of legitimate credit cards is a well-known “secret.” The most common sites are found on the DarkWeb, but occasionally they pop up on Meta sites, where they can reap thousands of dollars before Meta gets around to kicking them off, generally without prosecution.

The criminals collect most of this information through phishing attacks using email, but also on Facebook and Instagram, and falling for a phishing scam may negate victims’ claims they “did everything right.” Criminals, however, are getting more sophisticated. Enterprises selling the card information gather it by sending fraudulent emails or text messages, posing as legitimate entities, and tricking individuals into providing their credit card information. Then there is basic social engineering, manipulating victims into revealing their credit card information through phone calls, and QR codes.

Even more sophisticated, criminals will install skimming devices on ATMs, gas pumps, or point-of-sale terminals to capture credit card information when cards are swiped or inserted. While it may not be obvious that the skimmers have been added to the terminal, it is fairly easy to determine if it is legitimate. Legitimate card readers cannot be easily removed, while skimmers may be held on with a simple adhesive. Some locations, like Costco fueling stations, place tape over the reader and, if broken, can alert users and the vendor that there may have been a breach.

No one is completely safe

But by and large, data breaches are the most common source of stolen credit card information, and that is something most victims cannot do anything about.

By hacking into databases of companies or financial institutions criminals steal terabytes of credit card information. Employees of companies or financial institutions may access and sell credit card information, posting the information of those above, carding forums. Criminals exchange...

This content requires that you purchase additional access. The price is $1.00 or free for our Premium members.

Purchase this Content ($1.00) Choose a Membership Level

Keystone cops in wrecked car turning a corner

Turning the corner on cyber insurance

It seems like the insurance industry is turning the corner on cyber insurance and making a decent profit in the process. But not every industry watcher is optimistic.

This content requires that you purchase additional access. The price is $1.00 or free for our Premium members.

Purchase this Content ($1.00) Choose a Membership Level

Mark Zuckerberg, Elon Musk and Sundar Pichai are the faces of misinformation

Opinion: Deprioritize social media for peace

Finding content from legacy media is getting difficult in social media by design of the management of social media companies, while information from radicalized groups, hostile nation states, and paid political consultants currently makes up the bulk of information that these users call “news.”

7 Most Dangerous Cybersecurity Threats

In the ever-evolving landscape of technology, each year brings a new set of cybersecurity threats that can put your digital life and sensitive information at risk. As you navigate the digital world, staying informed about the latest dangers lurking in the shadows is crucial.

From Coders to Protectors: Women’s Influence in Cybersecurity

The need for knowledgeable people to safeguard our online environment has increased. In this context, women have become significant influences in cybersecurity.

AI under siege

AI is at war with itself

It almost seems that the AI market is an industry at war with itself.

Generative AI security weaknesses

Security issues, regulation, reality dull AI hype

In the last year the tech world has seen some spectacular expectation resets on “revolutionary” technology. Social media has gone from a boon to democracy to a hellscape of mediocre and abusive content. Cryptocurrency and NFT swallowed more fortunes than

We keep advertising at a minimum to maintain independence. That means we need support from our readers.

How about you buy us a coffee?

cicada, insect, dry

Like Digital Cicadas, Cybercriminals Lie In Wait Before Unleashing Their Presence

A curious parallel can be drawn between cybercriminals and the intriguing phenomenon of Cicadas. Akin to the periodic insects that emerge from the ground after years of dormancy, cybercriminals often resurface with renewed vigor, unleashing their disruptive activities on unsuspecting organizations.

This content requires that you purchase additional access. The price is $1.00 or free for our Premium members.

Purchase this Content ($1.00) Choose a Membership Level

Breaking Barriers, Building Bridges: Inspiring Inclusion on International Women’s Day

The tech industry has made significant progress in bringing more women and girls into the field throughout the recent years. International Women’s Day highlights this growth, yet also acts as an indicator that there is still lots to be done in order to reach the level of gender equality we are striving for.

Secretary Mayorkas next to a Chinese flag and an image of a semiconductor

Biden data EO a step forward

President Joe Biden took a step forward in protecting American's data this week and issued an executive order (EO) to protect Americans’ personal information from hostile governments.

This content is for Free members only.
Login Join Now
Vijay Balasubramaniyan, CEO of Pindrop

Bad month for Cybercrime

It has been a bad month for cybercrime. Yes, attacks are on the way up. Yes, they are still extorting money and causing infrastructure chaos. But there is a massive, shadow-busting spotlight on them right where they live. Defense technology…...

This content is for Free members only.
Login Join Now

Navigating AI as a Double-Edged Sword

The landscape of cyber threats is poised to become more treacherous due to the advancing use of AI in code writing and the dissemination of malicious techniques.  The race between cyber attackers and defenders will intensify, with AI at the centre of this escalating arms race.

This content is for Free and Premium members only.
Login Join Now

Dissecting the Anatomy of Ransomware

Most people understand by now the impact that ransomware can have on their systems if infected. But what precedes this critical point? Is the deployment of ransomware a gradual process, or does it occur in a single, quick action? Ransomware…...

This content is for Free and Premium members only.
Login Join Now

Biometrics and payment cards?

Biometric multi-factor authentication is all the rage in security. And yet it is also the cause of terror for security-minded folk. For every breakthrough we get a news story about how it has caused harm. But is it a good…...

This content is for Free members only.
Login Join Now
security guard standing on the gray floor

How serious do companies take cybersecurity?

Cybersecurity in an organisation is primarily a proactive effort. Whilst it does have a reactive component as well, a response to a cyberattack may only be successful with proper planning and preparation. The hope with a crisis response plan is…...

This content requires that you purchase additional access. The price is $1.00 or free for our Premium members.

Purchase this Content ($1.00) Choose a Membership Level

white and brown human robot illustration

The Era of AI-Powered Cyberthreats?

From our predictions issue: AI is rapidly infiltrating the business world and our daily lives. While revolutionizing how – and how efficiently – work gets done, it also introduces a new set of cybersecurity challenges.

You must first purchase a membership level before purchasing this content.

Click here to choose a membership level.

Breach affects half of France

French regulators recently warned that a January 2024 cyber-attack on two major healthcare sector companies caused over 33 million people’s data to be compromised. The data includes sensitive personal information, which threat actors could exploit in phishing campaigns and financial…...

This content is for Free members only.
Login Join Now
a person holding a glass ball in their hand

Cyber Threats Impacting Enterprises in 2024

From our predictions issue: With the new year, CIOs must educate and prepare themselves for the upcoming obstacles they may face in the future and implement ways to stay ahead and double down to protect themselves and their clients from potential vulnerabilities.

This content requires that you purchase additional access. The price is $1.00 or free for our Premium members.

Purchase this Content ($1.00) Choose a Membership Level