Feeds

Battered Sony hires cyber-security chief

Late of US Homeland Security, Defense and Microsoft

The Power of One eBook: Top reasons to choose HP BladeSystem

Sony is beefing up its security staff after the devastating hacking attack in April that crippled the Playstation Network for 23 days and led to the potential exposure of millions of users' account information.

The company has picked former US Department of Homeland Security exec Philip R Reitinger to fill the role of senior VP and chief information security officer. Reitinger has also worked in cybersecurity at Microsoft as well as at the US Departments of Defense and Justice.

"He will oversee information security, privacy and internet safety across the company, coordinating closely with key headquarters groups and working in partnership with the information security community to bring the best ideas and approaches to Sony," the firm said.

Sony has been battered on the markets since the massive hack in the spring followed by a series of smaller attacks, losing more than 50 per cent of its share value.

In total, the attacks exposed personally identifiable information for over 100 million Sony customers and cost the company at least $171m, apart from lawsuits resulting from the breaches and share losses.

The technology firm has since been struggling to answer criticism that its security was not up to scratch, with much "reviewing" and "updating" of its online security systems going on while it got its Playstation Network back online.

The Japanese company has also suffered due to the lack of consumer appetite for big-ticket items such as TVs as well as the rise of the yen against the euro. ®

Designing a Defense for Mobile Applications

More from The Register

next story
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.