'Always-On' Data Monitoring from PodsystemM2M Helps Businesses Overcome Fraud

CASWA Asset Management Devices Combined with Multi-Network Connectivity Prevent Fraud and Increase Profitability

CTIA SuperMobility Week

CTIA Super Mobility, Las Vegas, 10th September 2015 - PodsystemM2M, the expert in multi-network data SIMs for the M2M and IoT industries and CASWA, an Australian company that specializes in developing new technological solutions for engineering asset management, have today announced an agreement to provide global systems for data logging, collation and analysis to combat fraud and asset misappropriations.

U.S., tech industry fight over email privacy heads to appeals court

The case is the first in which a U.S. corporation has fought a warrant seeking data held abroad

Reuters

NEW YORK (Reuters) - A U.S. appeals court on Wednesday will consider whether U.S. law enforcement can make American technology companies hand over customers' emails held overseas, in a case closely watched by privacy advocates, news organizations and business groups.

Microsoft Corp is challenging a U.S. search warrant seeking the emails of an individual stored on a server in Ireland as part of a drug investigation. Details of the probe, including the identity of the person, have not been made public.

Ex-Intel security chief says cyber firm ForeScout not ready for IPO just yet

Access control technology scans an organization remotely to detect every device connecting to its networks

Reuters

TEL AVIV (Reuters) - Fast-growing Israeli-U.S. cybersecurity firm ForeScout Technologies is set on listing on Wall Street, but may not be ready to launch an IPO in the next year, especially if financial markets remain volatile, its chief executive said.

Technology research firm Gartner ranks ForeScout as a market leader in the field of access control, which scans an organization remotely to detect every device connecting to its networks, while blocking out anything lacking appropriate credentials.

Justice Department tightens cellphone tracking rules

There will be exceptions that will allow federal agencies to use cell-site simulators without obtaining a warrant

Reuters

WASHINGTON (Reuters) - U.S. prosecutors and some federal law enforcement agencies will need to obtain a search warrant to use devices that track cellphone locations, under a policy announced by the U.S. Justice Department on Thursday.

Until now, U.S. attorneys and Justice Department agencies, including the FBI and the Drug Enforcement Administration, have been able to use cell-site simulators without applying for a warrant or outlining a probable cause.

U.S. cyber security firm Tanium valued at $3.5 billion

Technology checks several million computers on a network and can deploy a patch in 15 seconds or less

Reuters

SAN FRANCISCO (Reuters) - Cyber security software firm Tanium has raised $120 million from investment firms as more U.S. federal agencies rely on its technology to fend off attacks from nation-states and hackers, the company announced Wednesday.

Tanium closed the round - its third in just more than a year - at a $3.5 billion valuation. The company was valued at $1.8 billion in March, the last time it raised cash.

Tanium is the highest-valued venture-backed cyber security company worldwide, according CB Insights, which does research on venture capital.

U.S. court hands win to NSA over metadata collection

Setback for privacy advocates did not answer whether the NSA's actions were lawful

Reuters

WASHINGTON (Reuters) - A U.S. appeals court on Friday threw out a judge's ruling that would have blocked the National Security Agency from collecting phone metadata under a controversial program that has raised privacy concerns.

The U.S. Court of Appeals for the District of Columbia Circuit said there were not sufficient grounds for the preliminary injunction imposed by the lower court.

FTC has power to police cyber security: appeals court

Authority under 1914 law protects consumers from unfair and deceptive trade practices

Reuters

(Reuters) - A U.S. appeals court said the Federal Trade Commission has authority to regulate corporate cyber security, and may pursue a lawsuit accusing hotel operator Wyndham Worldwide Corp of failing to properly safeguard consumers' information.

The 3-0 decision by the 3rd U.S. Circuit Court of Appeals in Philadelphia on Monday upheld an April 2014 lower court ruling allowing the case to go forward.

China summons Western tech firms, revives bank cyber rules

Foreign tech companies were briefly optimistic that the rules would be dropped

Reuters

BEIJING (Reuters) - China has resumed work on a set of banking cyber security regulations it suspended earlier this year, reviving a potential source of friction with the United States just weeks before Xi Jinping makes his first trip to Washington as China's president, people with knowledge of the matter said.

U.N. says expects states to respect privacy after AT&T spying report

New York Times cites newly disclosed NSA documents that date from 2003 to 2013

Reuters

UNITED NATIONS (Reuters) - The United Nations said it expects member states to respect its right to privacy and is assessing how to respond to a report that telecommunications company AT&T Inc helped the U.S. National Security Agency spy on the world body's communications.

The company gave technical assistance to the NSA in carrying out a secret court order allowing wiretapping of all Internet communications at the headquarters of the United Nations, an AT&T customer, the New York Times reported on Saturday.

Google, Samsung to issue monthly Android security fixes

Carriers that buy devices in bulk can choose to install fixes, some might do so only for high-end users

Reuters

LAS VEGAS (Reuters) - Google Inc and Samsung Electronics Co will release monthly security fixes for Android phones, a growing target for hackers, after the disclosure of a bug designed to attack the world's most popular mobile operating system.

The change came after security researcher Joshua Drake unveiled what he called Stagefright, hacking software that allows attackers to send a special multimedia message to an Android phone and access sensitive content even if the message is unopened.

Syndicate content

Featured Events 

5G World
June 13-15, 2017
London, UK

TEX
June 20-21, 2017
New York, NY

Communications 2020
July 18 - 20, 2017
Las Vegas, NV