Click to learn more about author Cathy Nolan. You’ve all seen it on TV – detectives and their teams trace a suspect by using video and cellphone cameras, social media, DNA analysis, fingerprint and facial recognition databases, telephone conversations, cameras mounted on police vehicles, and tracking devices on Smartphones and GPS. How accurate are these devices […]
Why Data Professionals Should Be Careful of Internet Light Bulbs
Click to learn more about author David Schlesinger. Many of us have rejoiced by having a thermostat for our homes that can be adjusted from a cell phone at work, and we can also check the house temperature from afar. Naturally, being data professionals, we have secured these systems with secure passwords such as “password1”, or […]
Fortress Information Security Launches Service to Plug Gaps Between Cyber Security Systems
by Angela Guess A recent press release states, “Fortress Information Security today announced its new Emerging Security Risk Management platform with an enterprise-wide visualization capability that allows organizations to plug gaps in their autonomous security systems by creating a visual map across their information technology (IT), operational technology (OT) and their external supply chain connections […]
The Devil is in the DATA “Unmasking the Deep State”
Click here to learn more about author Kwame Gyamfi. A Response to Former Speaker of the House, Newt Gingrich INTRODUCTION Newt Gingrich’s Challenge to Software Engineers The book signing by former House Speaker, Newt Gingrich, at the Press Club turned out to be more than what I bargained for. The former House Speaker who was on […]
Who is Using Your Identity? Data Theft and Data Security are Legitimate Concerns
Click to learn more about author Cathy Nolan. Identity theft is a two-step process. First, someone steals your personal information or corporate data, which is bad enough, but then the thief uses that information to impersonate you and commit fraud. If someone steals your identity it can create substantial financial risk and be extremely frustrating because […]
Radware Survey Shows: AI Joins the C-Suite As Execs Turn To Automated Cyber Defenses
by Angela Guess According to a recent press release, “Radware®, a leading provider of cyber security and application delivery solutions, released its 2017 Executive Application & Network Security Survey, which strikingly elicited that executives in the U.S. and Europe now place broad trust in Artificial Intelligence (AI) and machine learning systems, designed to protect organizations […]
SecureWorks Innovates Counter Threat Platform to Eliminate Cyber Threats
by Angela Guess A recent press release reports, “SecureWorks, a leading provider of intelligence-driven information security solutions, continues to innovate its flagship Counter Threat PlatformTM (CTP), leveraging artificial and human intelligence to deliver the visibility, insights, and threat detection and prevention capabilities that aim to reduce the complexity of keeping today’s organizations safe in the […]
Government Joins The Finance Sector At The Top Of The Cyber Attack List
by Angela Guess A recent press release out of Dimension Data reports, “New research reveals that cyberattacks on the government sector doubled in 2016, hiking to 14% from 7% of all cyber security attacks in 2015. Attacks on the finance sector also rose dramatically from just 3% in 2015 to 14% of all attacks in […]
Data People Must Build the Bridge to Your Cyber Security People
Click to learn more about author David Schlesinger. Deep down in the basement of your enterprise; in the hidden and dark places amid humming servers and racks of mysterious blinking equipment resides your cyber security staff. Pony tails, Red Bull cans, and black T-shirts identify some of the most devious and clever people in your company. […]
How Big Data Solves Cyber Security Issues for Enterprises
Click to learn more about author Shahid Mansuri. Big Data is a terminology used to define a large volume of data that inundates a business on a daily basis. Nonetheless, something worth noting is that it’s not the amount of data that is crucial, rather what a given organization or enterprise does with it. Big Data […]