Bernie Sanders campaign claims DNC voter data was leaked multiple times

The Democratic National Committee (DNC) has suspended the Bernie Sanders presidential campaign from access to its database of Democratic voter information after a staffer on the Sanders campaign improperly accessed proprietary data belonging to the rival campaign of Hillary Clinton, the Washington Post reported today.The Sanders campaign announced that it has fired the staffer over the incident. However, the campaign has also insisted that the data in the DNC database had been exposed on other occasions during the campaign.To read this article in full or to leave a comment, please click here

Bernie Sanders campaign claims software vendor NGP VAN exposed voter data multiple times

The Democratic National Committee (DNC) has suspended the Bernie Sanders presidential campaign from access to its database of Democratic voter information after a staffer on the Sanders campaign improperly accessed proprietary data belonging to the rival campaign of Hillary Clinton, the Washington Post reported today. The Sanders campaign announced that it has fired the staffer over the incident. However, the campaign has also gone on the offensive, insisting not only that the software vendor, NGP VAN, was responsible for this incident, but has failed to prevent unauthorized access to campaign data in the past.To read this article in full or to leave a comment, please click here

Wi-Fl blocking issue prompts convention industry to band together

Operators of convention centers and other public assembly venues are joining forces to avoid becoming the next Marriott or Hilton in the eyes of an FCC Enforcement Bureau that’s been cracking down on Wi-Fi blockers.Wi-Fi blocking has become a hot button issue across the hospitality and convention center industry, as well as across the wireless LAN industry, in light of big FCC fines against outfits found to have been blocking use of wireless hotspots by those who have a legal right to access unlicensed spectrum.MORE: Wi-Fi blocking debate far from overTo read this article in full or to leave a comment, please click here

IDG Contributor Network: Building malware defenses: Control email, web browsers, and ports

Our last article looked at applying Critical Security Controls 4, 5, and 6 to your organization, covering vulnerability assessment, administrative privileges, and audit logs. Now it’s time to move on to CSCs 7, 8, and 9.Email programs and web browsers are still the most common points of entry for attackers, too many companies have woefully inadequate malware defenses, and a failure to control ports and limit services is like leaving a window open for cybercriminals.Critical Control 7: Email and Web Browser Protections Human behavior is still the path of least resistance for cybercriminals, and they often employ social engineering techniques to gain access to systems. Despite the rising profile of phishing, 23% of recipients open phishing messages and 11% click on attachments, according to Verizon’s 2015 Data Breach Investigations Report (DBIR).To read this article in full or to leave a comment, please click here

Microsoft move to revoke trust in 20 root certificates could wreak havoc on sites

Tens of thousands of secure websites might start to display certificate errors to their visitors in January, when Microsoft plans to stop trusting 20 certificate authorities (CAs) from around the world.The list of certificates that are scheduled to be removed from Microsoft's Trusted Root Certificate Program belong to CAs run by private or state-owned organizations from the U.S., France, the Czech Republic, Japan, Denmark, Chile, Turkey, Luxembourg, Ireland, Slovenia and Brazil.With their removal from Microsoft's program, the CAs will also be removed from the certificate trust list in Windows that's used by browsers such as Google Chrome, Internet Explorer and Microsoft Edge, as well as by email clients and other applications that support secure communications over SSL/TLS.To read this article in full or to leave a comment, please click here

Business Titles: CEO, Founder, Managing Director, Proprietor

Twitter is a great place to air thoughts, gather thoughts, create allies and destroy bridges. Twitter is also limited to 140 characters. Not great for talking about complex things. For large subject areas, Tweets are normally pre-appended with [x/y], which designates what message out of the chain this particular one is. Tweeting about emotional and sensitive things is probably something I need to stop doing, especially without the means to portray the exact meaning behind the Tweets and feeling that goes with it.

To those that have recently started those businesses, you have my respect for jumping in with both feet, not to be confused with gripes about titles!

Being Misunderstood and Business Titles

With startups being the ‘in thing’ and the millennials starting ‘micro businesses’, the misuse of titles grinds on me for very valid reasons. Everyone wants to be that person that sells their startup for millions, or gets recognition on TED for being awesome. I have news. Most companies fail within the first year or two. Most never make it past five years. Those that do in most cases have gambled everything to win. As newer technologies sees new roles and skill sets being developed, it’s only Continue reading