Sumit Suman recently visited a site, did not sign up for anything, did not connect via social media, but got a personal email from the site the next day.I’ve learned that there is a “website intelligence” network that tracks form submissions across their customer network. So, if a visitors fills out a form on Site A with their name and email, Site B knows their name and email too as soon as they land on the site.It all started 2 weeks ago when I got a promotional email (anonymized to avoid promotion) offering toI get B2B marketing emails all the time but what caught my eye was the inclusion of a report snapshot for 42Floors.com showing names,
REDMOND, Wash., and OVERLAND PARK, Kan. — Oct. 4, 2012 — Microsoft Corp. and PhoneFactor Inc. today announced that Microsoft has acquired PhoneFactor, a recognized leader in multifactor authentication (MFA) solutions.“The acquisition of PhoneFactor will help Microsoft bring effective and easy-to-use multifactor authentication to our cloud services and on-premises applications,” said Bharat Shah, corporate vice president, Server and Tools Division for Microsoft. “In addition, PhoneFactor’s solutions will help Microsoft customers, partners and developers enhance the security of almost any authentication scenario.” Founded in 2001, PhoneFactor is
ExploitShield has been marketed as offering protection “against all known and unknown 0-day day vulnerability exploits, protecting users where traditional anti-virus and security products fail.” I found this assertion quite extraordinary and exciting! Vulnerabilities in software applications are real problems for computer users worldwide. So far, we have been pretty bad at providing actual technology to help individual users defend against vulnerabilities in software.In my opinion, Microsoft has made the best advances with their Enhanced Mitigation Experience Toolkit. EMET changes the behavior of the operating system to increase the effort attackers
Veracode’s security research team and our Chief Scientist will be at the Vegas cons in force this year engaging in the usual roguery.
We’ll also have a booth (#229) for the first time. Here’s when you can stop by and speak with members of the research team, assuming you don’t bump into them in the hallway first.
Finally, I asked everyone to look at the BlackHat schedule this year and pick out the
Cybersecurity is a major issue in all aspects of life today; individuals, companies, and even governments all have to worry about being attacked and having sensitive information stolen. As the 2012 US Presidential election approaches you should have as much information about the two candidates and party opinions as possible. In this infographic we detail the candidates’ opinions and actions, the recent bills that have been presented to the House and Senate, and how the candidates and their parties are tackling these important issues. After you have read this infographic, please take part in our poll and let us know if your opinion of national
- I Can See Clearly Now - E2 Conference Boston
- Get practical strategies to build a solid plan for profitability and success - Mobile Commerce World - Mobile Commerce World
- Learn how to enage customers through mobility - Mobile Commerce World - Mobile Commerce World
- Learn how to best integrate mobile commerce with your current systems -- Mobile Commerce World - Mobile Commerce World
- How to Choose a SaaS Vendor - E2 Conference Boston
This Week's Issue
Free Print SubscriptionSubscribe
Current Government Issue
- The Government CIO 25: These influential and accomplished government IT leaders are finding ways to be cost efficient and still innovate.
- Rethink Video Surveillance: It's not just about networked cameras anymore. New technology provides analytics, automation, facial recognition, real-time alerts and situational-awareness capabilities.
- Read the Current Issue