Security

BlackBerry, whose share of the mobile phone market has been on a downward spiral, this week launched BBM Protected, the first in its planned eBBM Suite of secure enterprise-class messaging products. BBM Protected targets regulated industries. It's claimed to be the only secure mobile instant messagi...

Facebook on Thursday announced it will soon move to interest-based advertising, almost three years after archrival Google, and well after other major players such as Yahoo and Amazon. It also will introduce "ad preferences," a tool accessible from every ad on Facebook that will explain why users wer...

Businesses increasingly are relying on virtual machines to handle more critical data and tasks than ever before. The reality is that virtualization is growing as a platform for managing customer data, financial transactions and the applications that businesses use. Simply put, virtualization is a co...

The conventional wisdom of the Internet is that everything posted, whether on social media, a website or anywhere else, will be on the Internet forever. That conventional wisdom was just challenged successfully in a recent ruling handed down by the EU's highest court. A new conventional wisdom may a...

I think the European Union often goes overboard, and I typically don't agree with its rulings. However, when the EU declared Google invaded privacy, it seemed to have struck a nerve. Countless users worldwide agreed. So, what impact will the EU have on Google with respect to a citizen's right to be ...

Summer is almost here, and that means many of you probably have made significant headway laying the groundwork for your 2015 PCI audit. However, one important aspect of 3.0 preparations that doesn't always get the attention it should is documentation. If you've tackled PCI compliance in the past, th...

ANALYSIS

Destination Cloud: Are We There Yet?

There is growing interest in the cloud. It sounds absolutely perfect for both consumers and businesses. Some are jumping in -- so why isn't everyone? There are many pros and cons. Many use it successfully to build and manage their growing business, but many others fall victim to problems. What, exac...

If there's a list of retailers that have not exposed their customers' data to a security breach, it just got shorter. The most recent company to confess to being hacked is eBay, which on Wednesday began sending emails urging customers to change their passwords. eBay announced that a cyberattack ha...

I don't usually agree with the European Union. However, it has demanded that Google help to protect the privacy of citizens rather than exposing everything, and I tend to agree. The latest EU ruling doesn't solve the whole problem, though. In fact, it raises more questions. Remember a few years ago,...

The European Court of Justice, which is the highest court for matters of European Law, has handed down a preliminary ruling that indicates Google may have to remove links to consumers' names on request -- if appropriate. The case was referred to the ECJ by Spain's Audiencia Nacional, or National Hig...

While the new 2014 Toyota cars have a lot to love with their advanced technology and navigation, there is also, very surprisingly, something to hate. This tech comes at a high price: loss of privacy. Toyota knows exactly where you are at every moment of every day -- period. Is that what we want? Don...

Internet companies are showing no signs of slowing down when it comes to innovation, specifically in the area of physical retail. Smartphones and tablets are the new darlings of e-commerce companies, and they now are being used to provide immersive and entertaining shopping experiences. Many of the...

TECHNOLOGY LAW CORNER

The Tangled Web of IoT Security

The Internet of Things, or IoT, consists of "uniquely identifiable objects and their virtual representations in an Internet-like structure," according to Wikipedia. The IoT is "the network of physical objects accessed through the Internet," according to Cisco Systems. In addition to there being no c...

The White House last week released a review of Big Data and privacy written by counselor John Podesta. The report stems from President Obama's January request to define for the administration what is new about the technologies in this space, how Big Data affects public policy, and how consumer priva...

Have you ever heard the term "The Forbidden Experiment"? If you're not familiar with it, it's a concept originating in the behavioral sciences relating to challenges in understanding human language development. Specifically, the "experiment" in question refers to actually testing empirically what ...

What's your outlook for the business climate in 2025?
Loading ... Loading ...

E-Commerce Times Channels