Data Breach, Privacy, and Cyber Insurance: How Insurance Companies Act as “Compliance Managers” for Businesses
While data theft and cyber risk are major threats facing organizations, existing research suggests that most organizations do not have sufficient protection to prevent data breaches, deal with notification responsibilities, and comply with privacy laws. This article explores how insurance companies play a critical, yet unrecognized, role in assisting organizations in complying with privacy laws and dealing with cyber theft.
Read More > Talesh-2018-Law_Social_Inquiry Cyber
INSURANCE COMPANIES AS CORPORATE REGULATORS: THE GOOD, THE BAD, AND THE UGLY
Political scientists, economists, and legal scholars have been debating corporate social responsibility for decades. To that end, the financial crisis, fraud relating to Enron and Worldcom, Occupy Wall Street, and even the 2016 presidential primary debates all raise attention and concern about what corporate social responsibility is and should be in the United States.
Read More > Talesh DePaul Cyber Insurance
ICS Researchers Introduce Thermanator, Revealing a New Threat to Using Keyboards to Enter Passwords and Other Sensitive Information
After entering a password, your regular computer keyboard might appear to look the same as always, but a new approach harvesting thermal energy can illuminate the recently pressed keys, revealing that keyboard-based password entry is even less secure than previously thought. Computer Science Ph.D. students Tyler Kaczmarek and Ercan Ozturk in the Donald Bren School of Information and Computer Sciences (ICS), working with Chancellor’s Professor of Computer Science Gene Tsudik, have exploited thermal residue from human fingertips to introduce a new insider attack — the Thermanator.
Gene Tsudik, Two Computer Science Ph.D. Students Develop Novel De-Authentication Prototype
Chancellor’s Professor of Computer Science Gene Tsudik and two of his Ph.D. students, Tyler Kaczmarek and Ercan Ozturk, have developed a novel technique aimed at mitigating “Lunchtime Attacks.” Such attacks occur when an insider adversary takes over an authenticated state of a careless user who has left his or her computer unattended. Tsudik, Kaczmarek and Ozturk have come up with an unobtrusive and continuous biometic-based “de-authentication,” i.e., a means of quickly terminating the secure session of a previously authenticated user after detecting that user’s absence. They introduce the new biometric, called Assentication, in a paper appearing at the 2018 International Conference on Applied Cryptography and Network Security (ACNS).
Gene Tsudik, ICS Exchange Students on International Team Studying Information Leakage
OC Forum: Cybersecurity Luncheon Video from May 23
Watch the “Cybersecurity: Defending our Digital Domains” luncheon video featuring
UCI’s Bryan Cunningham as a panelist.
CNN: “Trump Ramps Up Personal Cell Phone Use”
Donald Trump is increasingly relying on his personal cell phone to contact outside advisers, multiple sources inside and outside the White House told CNN, as Trump returns to the free-wheeling mode of operation that characterized the earliest days of his administration.
Read the full story at CNN.com
Video: Cybersecurity: Is There Such a Thing?
Watch this Center for Digital Transformation panel on “Cybersecurity: Is There Such a Thing?”
(more…)
C-SPAN: “Election Hacking and the Future of Politics”
James Carville, campaign strategist for former President Bill Clinton, was the keynote speaker at a conference on U.S. election hacking. He discussed foreign interference in U.S. elections and the impact on the future of politics. Cybersecurity expert Bryan Cunningham, a former senior CIA officer and White House lawyer, moderated the conversation and questions from students.
Watch the video at c-span.org.