dcsimg

Less than half of businesses can detect IoT data breach

Only 48% of businesses have the infrastructure set up to detect whether their IoT infrastructure is open to a data breach, a report by security firm Gemalto has revealed. Firms are now asking for the government to intervene and set better regulations around IoT security to prevent potentially damaging hacks into such devices. In fact, 79% of the 950 decision makers the company spoke to said they … [Read more...]

What Does Your Corporate Brand Stand For?

Companies are extremely good at defining their product brands. Customers, employees, and other stakeholders know exactly what an iPhone is and means. But organizations are often less sure-footed when it comes to the corporate brand. What does the parent company’s name really stand for, and how is it perceived and leveraged in the marketplace and within the company itself? Read more … [Read more...]

How data science and machine learning are reshaping global industries

Data science and machine learning have already shown their potential in transforming businesses.This pace can be felt through the veins of those industries who are leveraging sensors, actuators, applications and various other resources to collect and crunch data. The real potential of data science and machine learning is categorised in the results of the critical decision making taken by leaders. … [Read more...]

What Countries and Companies Can Do When Trade and Cybersecurity Overlap

Cybersecurity as a key issue for trade policy is a relatively new development. In the last few years there have been a number of news reports about various governments’ incorporating spyware, malware, or similar programs into computer-based products that are exported around the world. The governments typically have worked with private companies in their countries to do it. In the … [Read more...]

Privacy and Cybersecurity Are Converging. Here’s Why That Matters for People and for Companies

2018 has been the year of privacy.  News of Facebook’s exposure of tens of millions of user accounts to data firm Cambridge Analytica broke in March — a scandal that was only compounded by recent news that the tech giant shared even more private data through hidden agreements with other companies. Then in May, the European Union’s General Data Protection Regulation, the world’s most stringent … [Read more...]

Anonymous Data Collection Is More Risky Than Users Think

Without much thought, users frequently sign away rights to supposedly anonymous data collected by businesses and other organizations, with the idea that the information will ultimately improve their services and online experience. But a new study from MIT suggests that "anonymous" data can be woven together using multiple sources and is far more identifiable than most people realize.The … [Read more...]

5G Wireless Service, GDPR Laying the Groundwork for 2019

It’s hard to distill the biggest mobile stories of the year, mostly because mobile technology has matured to the point where changes are tending toward evolutionary rather than revolutionary. That may change in the year ahead, as two of the biggest stories of 2018 will likely be bigger in 2019. Specifically, we saw the first U.S. cities get 5G wireless service from major carriers, with more … [Read more...]

Stopping Data Breaches Will Require Help from Governments

Not a month goes by without a major corporation suffering a cyber attack.  Often state-sponsored, these breaches are insidious, difficult to detect, and may implicate personal information relating to millions of individuals. Clearly, the current approaches to safeguarding sensitive data are insufficient. We need to reorient expectations for the role of the private sector in cybersecurity.  As … [Read more...]

“Testing, testing, 1,2,3 …”

New Year’s resolutions take many forms. From regular exercise, to less screen time, to better habits in your IT work life, there is no shortage of advice. In the category of better IT habits is that old chestnut about testing backups. Everyone knows they should do it, and many write about it. But how many actually do it? Until you test your backups, in theory, they are both corrupted and … [Read more...]

Learn the Benefits and Drawbacks of Edge Computing

This exciting technology can extend compute power to places and scenarios previously considered unimaginable – but it carries some very real risks. Edge computing can cover anything from a tiny single board system to a rack of mountable appliances. Put simply, all the data collection occurs locally and the useful, aggregated valuable data is then uploaded to the cloud for further computation or … [Read more...]