article thumbnail

MY TAKE: Agile cryptography is coming, now that ‘attribute-based encryption’ is ready for prime time

The Last Watchdog

And since 2005 or so, one area of focus has been on sharpening the math formulas that make attribute-based encryption possible. Yet, the bottom line is that the retailer, in this scenario, really has no choice but to accept the sizable risk that a private key will eventually get brute-forced hacked, stolen or simply left out in the open.

article thumbnail

Predictions 2024: It’s All About The Data

John Battelle's Searchblog

If I can avoid talking about the joys of the upcoming election and/or the politics of Silicon Valley billionaires, I’m optimistic I’ll return to form. As always, I am going to write this post with no prep and in one stream-of-conscious sitting. Let’s get to it. The AI party takes a pause.

Marketing 121
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Who and What is Behind the Malware Proxy Service SocksEscort?

Krebs on Security

Malware-based anonymity networks are a major source of unwanted and malicious web traffic directed at online retailers, Internet service providers (ISPs), social networks, email providers and financial institutions. “Looking at network telemetry, we were able to confirm that we saw victims talking back to it on various ports.”

Analytics 196
article thumbnail

Predictions ’23: Advertising – Netflix, Apple, Amazon, Twitter

John Battelle's Searchblog

I love advertising – particularly digital advertising. There, I said it. Was that so hard? Well, yes, the industry I’ve partnered with for more than three decades can be very difficult to defend – and the past ten or fifteen years have been particularly bad. So yeah, I love advertising. And I kind of hate it too. So will Amazon.

article thumbnail

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

Allen is a widely respected thought leader on this topic, having launched Shared Assessments in 2005 as an intel-sharing and training consortium focused on third-party risks. And Jordan has had a hands-on role working third-party risk issues for more than a decade. To hear the full interview, please give the accompanying podcast a listen.

Risk 164
article thumbnail

The Sites That Never Get Built: Why Today’s Internet Discourages Experimentation

John Battelle's Searchblog

It’s rare I imagine something bounded in real space – a new restaurant or a retail store. Some of my favorite conversations open with “Wouldn’t it be cool if… ” Most of my ideas start as digital services that take advantage of the internet’s ubiquity. So let’s start with the idea itself.

Mining 75
article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Shared Assessments was created in 2005 by five big banks and the Big Four accounting/consulting firms as a forum for deriving a standardized way to assess the risks of partnering with one other. Late last year, Atrium Health disclosed it lost sensitive data for some 2.65 Advancing best practices.

Risk 147