recentpopularlog in

jonerp : security   179

« earlier  
Facing up to the need for regulation – Microsoft recognises Big Brother potential
"George Orwell’s 1984 is arriving about 40 years behind schedule. Microsoft and other concerned technologists believe we’re running out of time to create new government regulations to deal with the dangers of facial recognition and other new surveillance technologies."
analytics  planning  and  data  analysis  privacy  governing  identity  security  regulation  social 
yesterday by jonerp
US military to tech protestors – ‘We’re at war; pick a side’
"The revolt by thousands of Google workers against working with the Pentagon is drawing fierce pushback from the military, rival companies like Amazon and Microsoft, and even some fellow workers."
iot  robotics  and  ai  machine  intelligence  security 
2 days ago by jonerp
Enterprise hits and misses – Marriott stinks, Quora is questionable, and the omni-channel is elusive
"This week: As the holiday season rolls on, retailers's omni-channel woes persist. Plus: I blow a couple gaskets rounding up advice after the Marriott and Quora breaches. Then, there is an AI article whiff to reckon with."
hits  and  misses  retail  e-commerce  the  omni-channel  security 
3 days ago by jonerp
“That may be good for the world, but it’s not good for us” – Zuckerberg, Facebook and your data
"The UK Government released its seized Facebook documents yesterday and their contents confirm a lot of fears."
data  privacy  governing  identity  and  security  regulation  social 
4 days ago by jonerp
Marriott data breach shows cyber security risks of mergers
"The company also admitted that the information also includes payment card numbers and payment card expiration dates. While it claims the payment card numbers were encrypted using Advanced Encryption Standard encryption (AES-128) it also admits that the keys to decrypt those payment cards may also have been stolen. If so, this makes the breach significantly worse as it shows the hackers had complete access to all company information."
latest  news  security  data  breach  due  diligence  forrester  gdpr  hackers  ico  m&a  marriott  nominet  starwood 
8 days ago by jonerp
Misrepresentation and technical nuances – Facebook’s answers to legislators questions under fire
"The UK Information Commissioner and the former Chief Technologist of the Federal Trade Commission have problems with Facebook's evidence to international legislators."
data  privacy  governing  identity  and  security  regulation 
9 days ago by jonerp
What the Marriott Breach Says About Security
"For companies, this principle means accepting the notion that it is no longer possible to keep the bad guys out of your networks entirely. This doesn’t mean abandoning all tenets of traditional defense, such as quickly applying software patches and using technologies to block or at least detect malware infections."
a  little  sunshine  data  breaches  security  tools 
9 days ago by jonerp
Break-even in sight for Box as enterprise deals increase in size and number
"Break-even may finally be in sight for Box, but it's a case of steady growth and lowered losses for now..."
cloud  platforms  -  infrastructure  and  architecture  collaboration  sharing  digital  productivity  governing  identity  privacy  security  machine  intelligence  ai  regulation 
12 days ago by jonerp
Zuckerberg ‘sends his cat’ as 9 governments slam Facebook CEO for not talking to 447 million people
"Zuck didn't show but the representatives of 9 governments and 447 million people did turn up to grill the latest Zuckerberg avatar."
data  privacy  digital  and  content  marketing  governing  identity  security  regulation  social 
14 days ago by jonerp
Zuckerberg vs the Serjeant-at-Arms – no contest as Facebook documents are seized by UK Government
"Obscure Parliamentary procedure was used to get hold of Facebook documents. Now the fun begins..."
data  privacy  digital  and  content  marketing  governing  identity  security  regulation 
15 days ago by jonerp
Facebook’s 2018 crises mean it’s time to unfollow its ‘sorry’ CEO
"'Sorry' has become a word that falls easily from the lips of Facebook's upper management; if only I believed they meant it..."
data  privacy  governing  identity  and  security  regulation  social 
17 days ago by jonerp
Could the new kingmakers turn us into puppets?
"Developers as the new kingmakers is now an established meme. But they should not be the arbiters of what is ethical programming. That debate has to be much wider."
devops  nosql  and  the  open  source  stack  digital  transformation  -  frictionless  enterprise  governing  identity  privacy  security  ethics 
4 weeks ago by jonerp
Zuckerberg’s annus horribilis continues as Facebook growth slows
"A "tough year" for the Facebook CEO - and 2019's not looking that much better..."
data  privacy  digital  and  content  marketing  governing  identity  security  social 
5 weeks ago by jonerp
Tim Cook calls for Bloomberg to retract controversial chip story
"Apple's chief executive is hoping Bloomberg will "do the right thing" and formally retract its Chinese spy chip story."
security 
7 weeks ago by jonerp
Huawei Connect 2018 – the smart police are coming
"A final report from Huawei Connect in Shanghai, as the vendor pushes a vision of smart safety and security."
cloud  platforms  -  infrastructure  and  architecture  collaboration  sharing  digital  productivity  iot  robotics  ai  machine  intelligence  regulation  security 
8 weeks ago by jonerp
Enterprise hits and misses – making sense of the Chinese server sabotage allegations, as silly season rolls on
"In this streamlined, “Jon feels the road burn” version of hits and misses, he picks the highlights from the week’s biggest shows, the best of the enterprise web, and, as always – your weekly whiffs. And: an anti-whiff!"
governing  identity  privacy  and  security  hits  misses 
8 weeks ago by jonerp
MikroTik vulnerability climbs up the severity scale, new attack permits root access
A bug previously deemed medium in severity may actually be as "bad as it gets" due to a new attack technique.
security 
9 weeks ago by jonerp
Dreamforce 2018 – What do digital governments need? Rebels that can rebuild trust.
"Salesforce’s SVP of Government Solutions, Casey Coleman, gives us her view on the state of government transformation globally and what it takes to get the job done."
governing  identity  privacy  and  security  df18 
10 weeks ago by jonerp
AI, edge and security share top billing at Microsoft Ignite
"Microsoft Ignite opens this morning with a blizzard of announcements, with special focus on advances in AI, IoT and edge, tempered by security"
infrastructure  internet  of  things  machine  intelligence  and  ai  productivity  security 
11 weeks ago by jonerp
Has GDPR changed marketing?
"GDPR is a wakeup call to marketing and beyond - and not just those with business ties to Europe. Barb Mosher Zinck muses on fresh data from the CMO Council and looks at where we go from here."
crm  and  customer  experience  data  privacy  digital  content  marketing  governing  identity  security  gdpr 
11 weeks ago by jonerp
Europe deals the open internet a blow as controversial copyright rules take a step closer to law
"Europe just dealt the open internet a blow - and probably undermined its own Digital Single Market economy plans in the process."
digital  and  content  marketing  governing  identity  privacy  security  regulation  social 
12 weeks ago by jonerp
It’s a mad, mad, mad IoT world – protecting America’s power grid from common household appliances
"The Internet of Things is a network comprised of billions of devices that connect to the internet through sensors or Wi-Fi. Mostly invisible and often unsecured, they are a potential goldmine for hackers and evildoers."
internet  of  things  security 
september 2018 by jonerp
Enterprise hits and misses – big data falls, blockchain rises, and security trusts no one
"This week - a look at Google's big data fall from grace - an opening for blockchain, or not? Also: security's weak link, and the zero trust imperative. Ideas versus execution, data silos, and whiffs-a-plenty."
governing  identity  privacy  and  security  hits  misses  machine  intelligence  ai  blockchain 
september 2018 by jonerp
Identities Are The New Security Perimeter
"18% of healthcare employees are willing to sell confidential data to unauthorized parties for as little as $500 to $1,000, and 24% of employees know of someone who has sold privileged credentials to outsiders, according to a recent Accenture survey.
Privileged credentials for accessing an airport’s security system were recently for sale on the Dark Web for just $10, according to McAfee."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  next-gen  access  zero  trust  security 
august 2018 by jonerp
How Microsoft plans to save the Internet from bad actors with AccountGuard
"Microsoft is taking cybersecurity seriously - as it should. Does that make it the Internet's top cop?"
infrastructure  regulation  security 
august 2018 by jonerp
IBM’s 2018 Data Breach Study Shows Why We’re In A Zero Trust World Now
"The report is a quick read and the data provided is fascinating. One can’t help but reflect on how legacy security technologies designed to protect digital businesses decades ago isn’t keeping up with the scale, speed and sophistication of today’s breach attempts. The most common threat surface attacked is compromised privileged credential access. 81% of all breaches exploit identity according to an excellent study from Centrify and Dow Jones Customer Intelligence, CEO Disconnect is Weakening Cybersecurity (31 pp, PDF, opt-in)."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  enterprise  security  ibm  2018  cost  of  a  data  breach  study  louis  columbus  next-gen  access 
august 2018 by jonerp
Report analysis – AI and automation raises the stakes on IT security skills
"AI and automation will transform security, right? Not so fast. A new report indicates the problem comes back to a human skills gap. And, in my view, a culture problem. Here's my review of the data - and potential solutions."
digital  skills  and  training  governing  identity  privacy  security  machine  intelligence  ai 
august 2018 by jonerp
Federacy wants to put bug bounty programs in reach of every startup
"“We think that we can make the biggest impact by making the platform free to set up and incredibly simple for even the most resource-strapped startup to extract value. In doing so, we want to expand bug bounties from probably a few hundred companies currently — across Bugcrowd, HackerOne, etc. — to a million or more in the long run,” William Sulinski told TechCrunch."
developer  security  startups  bug  bounty  programs  federacy  ycombinator 
august 2018 by jonerp
Human Resources Firm ComplyRight Breached
"Cloud-based human resources company ComplyRight said this week that a security breach of its Web site may have jeopardized sensitive consumer information -- including names, addresses, phone numbers, email addresses and Social Security numbers -- from tax forms submitted by the company's thousands of clients on behalf of employees."
a  little  sunshine  data  breaches  tax  refund  fraud  complyright  breach  efile4biz.com  equifax  experian  ip  pin  security  freeze 
july 2018 by jonerp
Zero Trust Security Update From The SecurIT Zero Trust Summit
"Identities, not systems, are the new security perimeter for any digital business, with 81% of breaches involving weak, default or stolen passwords. Tom Kemp, Co-Founder, and CEO, Centrify, provided key insights into the current state of enterprise IT security and how existing methods aren’t scaling completely enough to protect every application, endpoint, and infrastructure of any digital business. He illustrated how $86B was spent on cybersecurity, yet a stunning 66% of companies were still breached. Companies targeted for breaches averaged five or more separate breaches already. The following graphic underscores how identities are the new enterprise perimeter, making NGA and ZTS a must-have for any digital business."
business  featured  posts  technology  software  byline=louis  columbus  centrify  cio  cso  cybersecurity  machine-learning  based  security  next-gen  access  nga 
july 2018 by jonerp
Over 20,000 Container Management Dashboards Are Exposed on the Internet
"A recent study by cloud security firm Lacework found over 22,000 publicly exposed container orchestration and API management systems, about 300 of which could be accessed without any credentials and gave attackers full control or remote code execution capability on containers."
news  technology  top  stories  containers  kubernetes  security 
july 2018 by jonerp
Analytics Are Empowering Next-Gen Access And Zero Trust Security
"Machine learning-based NGA platforms including Centrify calculate a risk score that quantifies the relative level of trust based on every access attempt across an IT infrastructure. NGA platforms rely on machine learning algorithms to continuously learn and generate contextual intelligence that is used to streamline verified user’s access while thwarting many potential threats ― the most common of which is compromised credentials. IT security teams can combine the insights gained from machine learning, user profiles, and contextual intelligence to fine-tune the variables and attributes that calculate risk scores using cloud-enabled analytics services.
business  featured  posts  technology  software  byline=louis  columbus  centrify  analytics  service  next-gen  access  nga  verizon  mobile  security  index  2018  report  zero  trust 
july 2018 by jonerp
Beyond Sapphire Now – DSAG on how SAP licensing must evolve
"SAP licensing and indirect access took a back seat at Sapphire Now. But as Andreas Oczko of DSAG explains, this is far from over. In this diginomica exclusive from Orlando, Oczko gave his view on SAP's document pricing announcements - and what needs to happen next."
digital  enterprise  in  the  real  world  transformation  -  frictionless  governing  identity  privacy  and  security 
june 2018 by jonerp
Three Ways Machine Learning Is Revolutionizing Zero Trust Security
"Zero Trust Security provides digital businesses with the security strategy they need to keep growing by scaling across each new perimeter and endpoint created as a result of growth. ZTS in the context of Next-Gen Access is built on four main pillars: (1) verify the user, (2) validate their device, (3) limit access and privilege, and (4) learn and adapt. The fourth pillar heavily relies on machine learning to discover risky user behavior and apply for conditional access without impacting user experience by looking for contextual and behavior patterns in access data."
business  featured  posts  technology  software  centrify  enterprise  security  louis  columbus  machine  learning  next-gen  access  zero  trust  zts 
may 2018 by jonerp
The I in AI is dumb leading to incrementalism not transformation
"A plethora of conflated terms - AI, ML, DL along with transformation are not helping decision-makers to chart a path to build more efficient and effective business models. Time to step back."
analytics  planning  and  data  analysis  digital  transformation  -  frictionless  enterprise  future  of  work  governing  identity  privacy  security  machine  intelligence  ai  deep  learning  dl  ml 
may 2018 by jonerp
Salesforce, Hive and Aston Martin downplay GDPR angst – ‘it’s the bare minimum, not the gold standard’
"Speaking this week at the opening of Salesforce’s new Innovation Centre in London, the companies discuss the upcoming GDPR deadline."
digital  enterprise  in  the  real  world  governing  identity  privacy  and  security  regulation  use  cases 
may 2018 by jonerp
Xage introduces fingerprinting to protect industrial IoT devices
"You may be wondering where the blockchain comes into this, but imagine a honey pot of these fingerprints were stored in a conventional database. If that database were compromised, it would mean hackers could have access to a company’s entire store of fingerprints, completely neutering that idea. That’s where the blockchain comes in."
blockchain  distributed  ledger  enterprise  security  startups  digital  fingerprinting  duncan  greatwood  industrial  iot  xage 
may 2018 by jonerp
How Zero Trust Security Fuels New Business Growth
"Zero Trust Security (ZTS) strategies enabled by Next-Gen Access (NGA) are indispensable for assuring uninterrupted digital business growth, and are proving to be a scalable security framework for streamlining onboarding and systems access for sales channels, partners, patients, and customers of fast-growing businesses."
business  featured  posts  technology  software  byline=louis  columbus  enteprise  security  gdpr  next-gen  access  zero  trust 
may 2018 by jonerp
Here’s how we plan to be GDPR compliant
"We're making ready for GDPR compliance. Here's abroad outline for what we're doing - starting today. "
data  privacy  governing  identity  and  security  regulation 
may 2018 by jonerp
83% Of Enterprises Are Complacent About Mobile Security
"The study found that the accelerating pace of cloud, Internet of Things (IoT), and mobile adoption is outpacing enterprises’ ability to scale security management, leaving companies vulnerable. When there’s a trade-off between the expediency needed to accomplish business performance goals and security, the business goals win the majority of the time. 32% of enterprises are sacrificing security for expediency and business performance, leaving many areas of their core infrastructure unsecured. Enterprises who made this trade-off of expediency over security were 2.4x as likely to suffer data loss or downtime."
featured  posts  technology  software  louis  columbus  mobile  security  verizon  wi-fi  zero  trust 
april 2018 by jonerp
Zuckerberg v Congress – how to waste four minutes of your life and miss the point
"Facebook CEO Mark Zuckerberg got a couple of tougher questions on day two of his appearance before Congress, but the demands of political grandstanding let him off the hook in the main."
data  privacy  governing  identity  and  security  regulation 
april 2018 by jonerp
Enterprise hits and misses – GDPR looms, Facebook squirms, and SAP gets direct about indirect
"This week: with GDPR looming, Facebook sits on the regulatory hot plate. Plus: a rebuttal of Microsoft's Windows divisional dissolve. SAP finally announces its licensing updates, which we dissect. And: I'm in the whiffs section again."
cloud  platforms  -  infrastructure  and  architecture  data  privacy  governing  identity  security  hits  misses  regulation 
april 2018 by jonerp
Mr Zuckerberg goes to Washington (and lives to tell the tale)
"Facebook's CEO Mark Zuckerberg faced a roasting from Congress that turned out to be a fairly light grilling."
data  privacy  governing  identity  and  security  regulation  social 
april 2018 by jonerp
FIDO Alliance and W3C have a plan to kill the password
"The major browser makers including Google, Mozilla and Microsoft have all agreed to incorporate the final version of the protocol, which allow websites to bypass the pesky password in favor of an external authenticator such as a security key or you mobile phone. These devices will communicate directly with the website via Bluetooth, USB or NFC. The standards body has referred to this as ‘phishing-proof’."
security  tc  multi-factor  authentication  standards  w3c 
april 2018 by jonerp
“It was my mistake” – Facebook’s Zuckerberg pleads ‘mea culpa’, but insists he’s still the man for the job
"Facebook CEO Mark Zuckerberg was sent out to field questions yesterday. Cue a lot of mea culpa and self-reproach, as well as a warning that this is going to take a long time to fix."
data  privacy  governing  identity  and  security  social 
april 2018 by jonerp
Five Ways Machine Learning Can Save Your Company From A Security Breach Meltdown
"However, 62% of CEOs have the impression that multi-factor authentication is difficult to manage. Thus, their primary security concern is primarily driven by how to avoid delivering poor user experiences. In this context, machine learning can assist in strengthening the foundation of a multi-factor authentication platform to increase effectiveness while streamlining user experiences."
business  featured  posts  technology  software  byline=louis  columbus  cybersecurity  machine  learning  security  breach  zero  trust 
april 2018 by jonerp
Enterprise hits and misses – data breaches, Facebook overreaches, and Microsoft Windows fades
"This week: data privacy in the crosshairs due to breaches, myopic legislation, and, of course, Facebook. Plus: Microsoft Windows does a sharp turn to slow fade. Customer service FAQ blowout, and whiffs-a-plenty."
crm  and  customer  experience  service  management  data  privacy  governing  identity  security  hits  misses 
april 2018 by jonerp
Zuckerberg to U.S. Facebook users – GDPR privacy benefits not fully on offer to you
"GDPR is coming, but for U.S. Facebook users the data privacy benefits aren't likely to be on offer, according to CEO Zuckerberg."
data  privacy  governing  identity  and  security  regulation  social 
april 2018 by jonerp
For Hudson’s Bay’s new CEO, another headache – a data breach with a claimed 5 million cards at risk - by @whostu
"Hudson's Bay Company has a hell of a lot to do in terms of tech upgrades. That's going to include payment systems after 5 million cards were involved in a massive data breach."
data  privacy  retail  e-commerce  and  the  omni-channel  security 
april 2018 by jonerp
Zuckerberg faces pressure from EU over data sharing furore and resists calls from UK government to give evidence
"Facebook CEO Mark Zuckerberg is in the midst of a data scandal following revelations that Cambridge Analytica allegedly used data to influence elections."
data  privacy  governing  identity  and  security  regulation 
march 2018 by jonerp
Machine Learning and Beyond: Algorithmic Detection in Security
"This article discusses the ways we can use algorithmic detection in all aspects of security. We define algorithmic detection as the ability to perceive threats, analyze them and contextualize them using algorithms that are either automata-theoretic or statistical."
contributed  top  stories  artificial  intelligence  security  sponsored 
march 2018 by jonerp
Enterprise hits and misses – cyberwarfare gets a wake up call and automation forces a skills review - by @jonerp
"This week: why cyberwarfare needs a truce, and an automation career session from someone who gets it. Plus: AI-driven "coaching networks" and five emerging trends. The whiffs are plentiful - are you ready to get cognified?"
governing  identity  privacy  and  security  hits  misses  iot  robotics  ai  the  new  professional  it  as  a  service 
march 2018 by jonerp
Microsoft announces new updates to protect against Spectre and Meltdown attacks
"Additional versions of Windows 10 are now protected from these attacks, and Microsoft has begun releasing Intel microcode updates directly, but only for a small number of devices. Incompatible antivirus software remains a problem, however."
security 
march 2018 by jonerp
The world badly needs a cyber-warfare truce – what are the chances? - by @denispombriant
"Cyber warfare is combat on the cheap, writes Denis Pombriant, as he sets out the case for an international truce to limit the scope for cyber attacks."
iot  robotics  and  ai  regulation  security 
february 2018 by jonerp
Why we need a single point of trust to calm nerves over social media data misuse - by @derek_dupreez
"A single place to turn to when the internet giants get above themselves with your data - a strong recommendation from doteveryone."
data  privacy  governing  identity  and  security  regulation  social 
february 2018 by jonerp
Security: What Enterprise Architects Need to Know Today
"With enterprise applications, the data is more valuable than the apps that consume the data. This is because the datasets are large, and often go back decades. They’re mostly stored in SQL databases, but in recent times, in NoSQL alternatives as well. The data is multifaceted and can be presented in many different ways within a single application or across multiple applications."
analysis  contributed  technology  top  stories  cloud-native  equifax  security  sponsored  twistlock 
february 2018 by jonerp
FedEx leaks highly sensitive customer data
"The data came from the acquisition of Bongo International that FedEx made back in 2014. It later renamed and then shutdown the business unit in April 2017. What is not clear is how long the data has been exposed. Was it originally exposed by Bongo before the acquisition? Did it become orphaned data after the company was shutdown? Either way, there is evidence that the data has been exposed for some time."
homepage  slider  latest  news  security  amazon  bongo  international  data  breach  privacy  egress  software  fedex  gdpr  kromtech  national  id 
february 2018 by jonerp
The Impact of Spectre and Meltdown on the Cloud
"Spectre is worse. Not because we actually know how to use it to do something bad. Yet. It is worse because we don’t know how to mitigate it in a generic way, and because it proves that Meltdown wasn’t a flash in the pan. The threat remains, and erodes trust. When and if someone devises a practical exploit, we may indeed see a mitigation for it show up quickly. The exploit may be responsibly disclosed by security researchers at a company like Google. But it is entirely possible that hostile state actors will get there first, and the damages done between now and then may be considerable and difficult to quantify."
analysis  contributed  technology  top  stories  heptio  meltdown  security  side-channel  attack  spectre 
february 2018 by jonerp
Is blockchain the answer to security risk in supply chains? - by @madbennett
"Digital connections add new security risks to the supply chain. Companies including IBM and Maersk believe blockchain may provide the answer"
fintech  infrastructure  security  spend  management 
february 2018 by jonerp
Intel does its best to tamp down impact of Spectre and Meltdown in earnings call - by @ron_miller
"Intel CEO Brian Krzanich was delighted to report that Intel had a record year in the company’s quarterly earnings call with analysts yesterday. Of course, he also had to acknowledge the Spectre and Meltdown chip vulnerabilities revealed earlier this month in perhaps the ultimate good news-bad news moment"
earnings  security  tc  intel  meltdown-spectre  chips 
january 2018 by jonerp
Enterprise hits and misses – Davos vs the enterprise, PaaS vs security threats - by @jonerp
"This week: Why PaaS and infrastructure automation matter against threats like Spectre and Meltdown. Also: SEO for 2018, connected car dilemmas, and Davos versus the enterprise. Your whiffs include a slew of whiffy awards, and Facebook's navel-gazing Newsfeed overhaul."
cloud  platforms  -  infrastructure  and  architecture  hits  misses  security 
january 2018 by jonerp
Enterprise hits and misses – digital skills gaps, contingent workforces, and the chippy Meltdown - by @jonerp
"This week: cue the digital skills and contingent workforce debates. Plus: the Spectre and Meltdown chip vulnerabilities buzzkill the shiny new toys at CES. Your whiffs include robots posing as women, Facebook bailing on "M" - and Intel."
future  of  work  governing  identity  privacy  and  security  hits  misses 
january 2018 by jonerp
That Intel chip flaw means a large – and long – headache for CIOs and IT teams
"The Intel flaw is in the design of the processors it is engineered in, so it can't easily be engineered out. A problem for CIOs that will not go away soon."
governing  identity  privacy  and  security 
january 2018 by jonerp
Warrantless phone, laptop searches at the US border hit record levels
"One leading Democratic senator says the newly-enacted directives explicitly allow border officials to try to bypass the password or encryption on a device without reasonable suspicion."
security 
january 2018 by jonerp
FedEx aims to deliver on Blockchain, autonomous vehicles and tougher security - by @whostu
"FedEx's 2017 will be remembered for the TNT cyber-attack, but it's heading into 2018 on growing e-commerce and a lively innovation agenda."
cloud  platforms  -  infrastructure  and  architecture  customer  service  management  digital  enterprise  in  the  real  world  e-commerce  governing  identity  privacy  security 
december 2017 by jonerp
diginomica 2017 – the year according to Dennis - by @dahowlett
"2017 is almost at an end; 2018 is around the corner. In the second of our annual reviews of the highlights of the year, Dennis Howlett offers his personal picks of the best of diginomica 2017. Customer stories feature heavily."
cloud  erp  financials  and  supply  chain  platforms  -  infrastructure  architecture  crm  customer  experience  digital  enterprise  in  the  real  world  transformation  frictionless  governing  identity  privacy  security  hcm  future  of  work  iot  robotics  ai  retail  e-commerce  omni-channel  new  professional  it  as  a  service  ux  application  design  blockchain 
december 2017 by jonerp
AdGuard calls out sites for cryptojacking failures
"The company reports that there are around 2,500 downloads of this code per day. This is likely to be for more than just cryptojacking. Downloads are also likely to be used by other cybercriminals for malvertising. It is also entirely possible that some websites are using the code to boost the number of ads that they serve. With many advertisers paying per impression of an ad, there is a lot of interest in improving ad serving."
homepage  slider  latest  news  security  ad  blocking  adguard  browsers  cryptocurrency  media  players  monero  onlinevideoconverter.com  openload  rapidvideo.com 
december 2017 by jonerp
Machine learning, the dark web and cybercrime – an unholy trinity
"What should we expect in the on-going arm-wrestle with cybercriminals as malware gets smart, devious and hard to find?"
digital  government  and  public  services  governing  identity  privacy  security  iot  robotics  ai  machine  intelligence 
december 2017 by jonerp
Trust and relevance – the twin challenges SAP faces as it meets with SAP UK & Ireland User Group - by @dahowlett
"SAP UK & Ireland User Group meet this week. SAP will face some testing questions. Here is my pre-event assessment around the top of mind topics."
cloud  erp  financials  and  supply  chain  future  of  work  regulation  security  event  reports 
november 2017 by jonerp
Australia's war on encryption potentially 'reckless': Former US cyber advisor
"Demands for more access to private data and control over personal communications devices 'sounds a lot like China', says Obama's director for Cybersecurity Policy."
security 
november 2017 by jonerp
Facebook's plan to throw humans at security, manipulation issue won't work, equates to indictment on AI progress
"Throwing humans at Facebook's fake news and security issues isn't likely to fix the company's issues. Facebook needs more AI and automation to correct ills before engagement falls."
security 
november 2017 by jonerp
Social media giants need to up their game as US Senate grills them - by @whostu
"Twitter, Google and Facebook go in 'lawyered-up' to answer US Senate questions on Russia and the Presidential Election. The result - holding positions and obfuscation."
digital  government  and  public  services  machine  intelligence  ai  security 
november 2017 by jonerp
Your data is more secure with SaaS companies than it is with you
"Conventional wisdom says you should protect your data by keeping it close. In reality, it's more secure with SaaS companies, says New Relic's Lee Atchison"
cloud  platforms  -  infrastructure  and  architecture  data  privacy  new  relic  partner  zone  security 
october 2017 by jonerp
Enterprise hits and misses – accountants overcome big data denial, CIOs fight for digital trust - by @jonerp
"This week: accountants move past big data and AI denial, while Walmart and Disney make aggressive moves against rivals. CIOs fight for digital trust after data breaches - and your weekly whiffs."
hits  and  misses  iot  robotics  ai  security 
october 2017 by jonerp
72 hours to doomsday – GDPR armageddon peddling from Splunk
"Splunk’s security evangelist Matthias Maier posits some thoughts on what is important when it comes to managing GDPR in action."
data  privacy  digital  government  and  public  services  governing  identity  security  regulation 
october 2017 by jonerp
Why the era of political pride in tech ignorance has to end - by @whostu
"The British Home Secretary wears her tech ignorance with pride. Sadly she's not alone, on both sides of the Atlantic. It's time for a digitally-savvy generation of policymakers."
governing  identity  privacy  and  security 
october 2017 by jonerp
Enterprise hits & misses – Avoiding security worst practices while Microsoft Ignites and Oracle opens - by @jonerp
"In this edition: Security best practices revealed - but worst practices are all too common. Plus: wrapping a big event week with Microsoft Ignite and kicking off Oracle OpenWorld. And: your weekly whiffs."
data  privacy  hits  and  misses  security 
october 2017 by jonerp
OOW17 – eliminate human labor, eliminate human error - by @whostu #OOW17
"Larry Ellison wants to eliminate human labor and in the process eliminate human error and he's going to do it at half the price that Amazon would. Oracle OpenWorld is underway!"
cloud  platforms  -  infrastructure  and  architecture  digital  government  public  services  iot  robotics  ai  security 
october 2017 by jonerp
Is the US ready for election hacking 2018?  No way.
"With 2018 U.S. elections looming, the government has done little to reinforce the security of the American electoral process in the aftermath of what intelligence agencies agree was a major Russian cyber operation designed to sway the 2016 Presidential contest."
digital  government  and  public  services  identity  regulation  security 
september 2017 by jonerp
« earlier      
per page:    204080120160

Copy this bookmark:





to read