By
Meghan CoyleFebruary 12, 2015
The Obama administration announced Tuesday that it will establish a new agency tasked with protecting the U.S. from cyberattacks. The Cyber Threat Intelligence Integration Center will gather intelligence from both the Central Intelligence Agency and the National Security Agency to help prevent hackers from stealing information. This announcement comes on the heels of a major security breach last week, when hackers broke into the system of health insurance company Anthem. Continue reading White House Creates Cybersecurity Agency to Combat Threats
By
Debra KaufmanFebruary 11, 2015
During an HPA Tech Retreat panel yesterday on “Cyber and Content Security: Time for a Strategy Change,” moderated by NSS Labs Sales Director Kari Grubin, panelists asked the important questions: Who are the perpetrators? How easy is it to gain access? How can we understand the risks to our specific companies? And how can we architect against risks? Grubin was joined by Frank Artes of NSS Labs, Theresa Miller of Lionsgate, Bryan Ellenburg of the CDSA, and Ted Harrington of Independent Security Evaluators. Continue reading HPA Tech Retreat: Cybersecurity in Today’s Media Industry
By
ETCentricJanuary 30, 2015
The Hollywood Post Alliance has announced the final schedule for the 2015 HPA Tech Retreat, February 9-13 in Indian Wells, California. The Tech Retreat is a gathering where engineering, tech and strategic business leaders join top creative talent to explore and debate the most compelling topics facing the media and entertainment industry today. This year’s event will feature more than 45 sessions, 75 breakfast roundtables, 100 speakers and 30 new product demos. Pre-conference registration closes Monday, February 2. Continue reading 2015 HPA Tech Retreat Unveils Expanded Session Schedule
By
Meghan CoyleJanuary 15, 2015
President Barack Obama proposed a series of new regulations that intend to help protect the country from cyberattacks. In the wake of a series of significant hacks last year, Obama is asking Congress to increase prosecution and toughen the penalties of people committing cybercrimes. He also wants companies to be able to share their information about hacks. In other news, President Obama wants to increase broadband competition by ending the laws in 19 states that limit municipal broadband. Continue reading President Obama Calls for New Improvements to Cybersecurity
In a speech at CES earlier this week, Edith Ramirez, chairwoman of the Federal Trade Commission addressed her concerns about the current state of privacy regulations related to companies that rely on the collection of consumer data. Ramirez urges tech companies to spend more time developing security measures to ensure consumer data remains protected from potential hackers. Ramirez also advises companies to take careful precautions now and be more transparent about their use of data. Continue reading FTC Chairwoman Concerned About Data Security and Privacy
By
Meghan CoyleDecember 4, 2014
The U.S. Government Accountability Office warns that data caps may drive the prices of Internet service up for everyone, instead of keeping costs low for the people who only use a small amount of data. Internet service providers do not have enough competition in some places, which would make it easier for ISPs to abuse a usage-based pricing system. The GAO recommends that the Federal Communications Commission develop a voluntary code of conduct for ISPs. Continue reading Data Caps May Result in Higher Prices for Internet Customers
By
Meghan CoyleMay 7, 2014
Companies such as IBM and Symantec are investing in new technologies to detect viruses and hackers and make stealing customer data more difficult. The companies believe that traditional antivirus software that erect barriers to keep out threats is becoming increasingly ineffective as hackers around the world regularly create novel bugs. IBM plans to analyze behavior in computer network data to detect irregularities. Symantec is launching its own division that will help hacked businesses respond to security breaches. Continue reading Cybersecurity Focus Shifts From Blocking to Spotting Threats
By
Debra KaufmanFebruary 24, 2014
Disruptive content creation models and the resulting vulnerability of content assets were recurring themes at the 2014 HPA Tech Retreat last week, and the topics of discussion on the event’s last day. NSS Labs Sales Director Kari Grubin moderated a panel on “Breaking the Model” that took a look at both issues. She recounted her own “aha moment” at last year’s Tech Retreat, during an ETC panel featuring USC students talking about their media consumption patterns. Continue reading HPA Tech Retreat Wraps With a Look at “Breaking the Model”
By
Rob ScottApril 24, 2013
The Associated Press Twitter account was hacked yesterday with a false report involving explosions at the White House. The account was quickly suspended, but not before the news had been retweeted thousands of times, resulting in a temporary yet sharp drop in the Dow and news outfits clamoring to ascertain details. Although the account is active again, the news agency has nearly 2 million less followers, which Twitter explains could take up to 24 hours to repair. Continue reading AP Twitter Account Hacked: Underlines Need for Security
By
Rob ScottApril 19, 2013
In a 288 to 127 vote, the U.S. House of Representatives has passed the Cyber Intelligence Sharing and Protect Act (CISPA), which encourages businesses to share cyberthreat information with the government. Privacy advocates have been fighting passage of the act, concerned that it allows agencies to conduct warrantless searches of data collected from e-mail and Internet providers. The bill overrides current privacy and wiretap laws. Continue reading CISPA: House of Representatives Passes Controversial Bill
By
Rob ScottApril 19, 2013
Rather than crawl websites like a traditional search engine, Shodan navigates back channels tracking servers, webcams, printers, routers and other devices connected to the Internet. Each month, it gathers information on roughly 500 million connected devices and services. CNNMoney calls Shodan “the scariest search engine on the Internet.” As we move closer to the Internet of Things, it raises questions about how easy it may be to hack anything that is connected to the Internet. Continue reading Search Engine Exposes Vulnerability of Connected Devices
By
emeadowsMarch 19, 2013
As the result of a two-pronged campaign coming out of China against Western media and the technology companies that create devices from which the Chinese access news and entertainment, it may become increasingly difficult for outside companies to operate within the country. As part of the ongoing campaign, Chinese state-fun broadcaster CCTV aired a critical documentary last week regarding Apple’s customer service. Continue reading China Campaigns Against Western Media and Tech Firms
By
emeadowsMarch 15, 2013
President Obama met with a group of 13 corporate executives at the White House on Wednesday to discuss growing cybersecurity concerns and to enlist support for his proposed legislation to combat the threat of computer warfare and corporate espionage. Among the chief execs were Rex W. Tillerson of Exxon Mobil, Randall L. Stephenson of AT&T, Brian T. Moynihan of Bank of America and Jamie Dimon of JPMorgan Chase. Continue reading Obama Seeks Corporate Support for Cybersecurity Initiative
By
emeadowsMarch 11, 2013
Some cybersecurity experts say that Chinese hackers have invaded Hollywood’s computers, much like they did to the systems of Facebook, Apple, The New York Times and many others. The root of the problem, according to The Hollywood Reporter, is China’s contempt for intellectual property. In a country where most video and software is pirated, the culture of copying runs deep. Continue reading China Hacking Hollywood Computers, Say Security Experts
By
emeadowsFebruary 21, 2013
After U.S. computer-security firm Mandiant Corp. accused China of stealing large swaths of data from U.S. companies, China flatly denied the accusation. In a 74-page report, the firm claims a group attached to China’s People’s Liberation Army stole data from 141 companies since 2006, 115 of which were in the U.S., spanning industries like information technology, telecommunications, aerospace and energy. Continue reading China Denies Cyberattack Allegations from Mandiant Report