Humera Khan: The communities that are least inclined to engage are often the ones that need the outreach the most.
Dana Tamir: Trusteer's services team discovers massively distributed APT malware such as Dyre and Citadel in virtually every customer environment it works with.
Siobhan Gorman, in 2012: Companies aren't obligated to disclose a breach to another company as part of an acquisition deal, said Jacob Olcott of Good Harbor Consulting, a firm that advises companies on national-security issues. It is up to the acquiring company to ask, he said.
Joel Warner: He's stopped listing his master's degree from Indiana State on his resume. He's been told it's better to have it appear as if he was doing nothing at all during that time than to be associated with a low-prestige school.
Damian Paletta: Mr. Burr said the bill would allow companies to share information with intelligence agencies like the National Security Agency, but only if the data wasn't provided in "electronic form." He didn't provide more details.
Reuters: The measures offer corporations liability protection if they share information with intelligence agencies. Data handed over also would be "scrubbed" twice to remove personal information.
Mark Seaborn: History has shown that issues that are thought to be 'only' reliability issues often have significant security implications.
The Economist: The architecture of Estonia's system is poorly documented, and that rules for classification of data as sensitive, personal, secret or public were not suitable for digital continuity: "frequently only a small number of experts understand the workings of the system," the report notes.
|