[The anonymous attacker | Internet blocking doesn't work and threatens democracy | ICSA Labs Product Assurance Report | SmartPrivacy for the smart grid - embedding privacy into the design of electricity conservation | Cloud computing risk assessment | Towards a policy and legal framework for identity management]
A workshop report by the Oxford Internet Institute.
OII: Towards a policy and legal framework for identity management - a workshop report (PDF)
[Open link in this window | Open link in new window]
Tech and law: Identity management policy & legal framework - OII workshop report
[Open link in this window | Open link in new window]
[09/11/29]
A new report by ENISA.
ENISA: Cloud computing - Benefits, risks and recommendations for information security (PDF)
[Open link in this window | Open link in new window]
ENISA: Cloud computing risk assessment
[Open link in this window | Open link in new window]
Cloud Security: ENISA Cloud security risk assessment - an interview with Giles Hogben
[Open link in this window | Open link in new window]
View from the bunker: ENISA cloud computing risk assessment
[Open link in this window | Open link in new window]
[09/11/28]
A report by the Office of the Information and Privacy Commissioner of Ontario, Canada.
Office of the Information and Privacy Commissioner of Ontario, Canada: SmartPrivacy for the smart grid - embedding privacy into the design of electricity conservation (PDF)
[Open link in this window | Open link in new window]
The future of privacy forum: Privacy and the smart grid - new frontiers, new challenges (PDF)
[Open link in this window | Open link in new window]
TheStar: Your smart meter is watching
[Open link in this window | Open link in new window]
Ars technica: Smart grids drag utilities into the swamp of online privacy
[Open link in this window | Open link in new window]
[09/11/27]
Nearly 80 percent of security products fail to perform as intended when first tested - and most require two or more cycles of testing before achieving certification, according to a new report from ICSA Labs, which performs security product testing.
ICSA Labs: ICSA Labs Product Assurance Report
[Open link in this window | Open link in new window]
Darkreading: Most security products don't initially work as intended, study says
[Open link in this window | Open link in new window]
[09/11/23]
A study by four experts in computer science and computer / cybercrime law.
Corman Callanan, Marco Gercke, Estelle De Marco, Hein Dries-Ziekenheiner: Internet blocking, balancing cybercrime responses in democratic societies (PDF)
[Open link in this window | Open link in new window]
Aconite internet solutions: Internet blocking strikes out
[Open link in this window | Open link in new window]
Tech and law: Internet content blocking doesn't work and threatens democracy - study
[Open link in this window | Open link in new window]
[09/11/13]
A report by CIFAS on identity fraud and account takeover.
CIFAS: The anonymous attacker - a special report on identity fraud and account takeover (PDF)
[Open link in this window | Open link in new window]
CIFAS: The anonymous attacker - a special report into identity fraud and account takeover fraud
[Open link in this window | Open link in new window]
[09/11/07]
On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.