Subscribe to DSC Newsletter

All Blog Posts Tagged 'security' (24)

5G Networks Security Risks

In a modern world of advanced technologies, our life is literally impossible without cellular telecommunications. Today, smartphones and wireless broadband Internet are common things for everybody. And recently, all developments and innovations in cellular technology are not about the availability of mobile connectivity but about bringing it to a…

Continue

Added by David Balaban on October 24, 2019 at 9:32pm — No Comments

What is Cybersecurity Data Science?

Cybersecurity Data Science (CSDS) is a rapidly emerging profession focused on applying data science to prevent, detect, and remediate expanding and evolving cybersecurity threats. CSDS is increasingly formally recognized as a cybersecurity job specialty, for instance in the NIST NICE Cybersecurity Workforce Framework.

A proposed CSDS definition derived from…

Continue

Added by Scott Mongeau on October 22, 2019 at 11:20pm — No Comments

5 Common Issues that Wreck Database Security and How to Solve them

With data growing at its highest rate ever, cyberattacks and digital warfare are on the rise to get hold of any crucial data. The malicious actors primarily target the data in organizations; if it’s important to you, so it is to them.

Cybercriminals often target databases since they mostly store sensitive data — customer data, financial…

Continue

Added by Evan Morris on October 17, 2019 at 7:19pm — No Comments

3 Pillars of GDPR Compliance

The Forrester report “Predictions 2018: A year of reckoning” predicted that 80% of firms affected by the GDPR will not be able to comply with the regulation by the time it comes into force on May 25. Of those noncompliant firms, 50% will intentionally not comply.…

Continue

Added by Amy Flippant on July 3, 2018 at 12:30am — No Comments

Engaging the Animal Spirit in the Narrative

How might a person go about studying something elusive like serial murder or terrorism?  I have no formal exposure in this area.  Much of the technology that I mention in this blog is meant for another purpose.  That other purpose is to study characters in movies, which for me is a great diversion.  In particular, I like to map out where certain characters might be found (or lost - i.e. missing characters): the settings they occupy, their roles, their relationships.  It goes without saying…

Continue

Added by Don Philip Faithful on October 9, 2017 at 5:00am — No Comments

It's Past Time to Start Protecting Your Company From a Data Breach

Are you concerned that your company could be struck by a data breach at some point in the future? As scary as it sounds, it’s good that you’re thinking about this in advance.



Although there is no guarantee that you can prevent a data breach from happening, there are a variety of steps you can take to improve the likelihood of your company remaining…

Continue

Added by Brian Horvath on March 17, 2017 at 9:30pm — No Comments

Risk as a Narrative Construct



I had some magical moments in my life. Perhaps the most magical was the summer I went to work wearing shorts and running shoes. Captain C. said to me, as I sat in our shared office, “If you want to work during the weekend, you can borrow the keys to the building.” It didn’t seem like a big deal at the time. I had already borrowed a military vehicle that, as per Captain C., I could park anywhere in Canada without receiving a parking ticket. So I borrowed the keys to the building. I went…

Continue

Added by Don Philip Faithful on December 25, 2016 at 8:00am — 2 Comments

Top 9 Big Data Security Issues You Should Watch For

Understanding that big data comes from such a huge pool of devices, constantly collecting new data, gives you an idea where security threats may come from. Each device that is online, from phones to tablets to computers to smart appliances, has the potential of sending and receiving new data. This continuous back and forth gives a nearly constant window of…

Continue

Added by Shezagary on October 18, 2016 at 9:30pm — No Comments

Deconstructing Symbolic Expression

I sometimes ask myself while musing over the need for a particular service, "I wonder if this is commercially viable?" If the service is routine and the required software is rather inexpensive, perhaps there is little need for a company to outsource. I cannot think of any company that would routinely outsource work normally performed on a spreadsheet. I suspect that decades ago some companies hired specialists to handle spreadsheets; this seems much less likely today in light of the…

Continue

Added by Don Philip Faithful on July 2, 2016 at 7:07am — No Comments

End-of-Life Narrative

Canada will soon be passing legislation to allow for physician-assisted suicide.  Sometime over the course of debate between our Parliament and Senate, I found what at the time seemed like a peculiar pattern of woodchips in the back of my pick-up.  It was such an interesting image, I thought I would share it here.  On closer inspection, I discovered that in fact I was looking at hundreds of tiny flower shafts and seeds.…

Continue

Added by Don Philip Faithful on June 18, 2016 at 8:30am — No Comments

First Choice FCU sues Wendy's over data breach

The Pennsylvania-based First Choice Federal Credit Union has initiated legal action against fast food chain Wendy's over a data breach that obviously has happened following an instance of POS Malware strike.



The class-action suit, filed in the US District Court for the Western District of Pennsylvania by First Choice Federal Credit Union, "on behalf of itself and all others similarly situated" and against the Wendy’s Company, Wendy’s Restaurants, LLC, And Wendy’s International,…

Continue

Added by Emily Lauren on May 12, 2016 at 1:00am — No Comments

How to Avoid Data Breaches in the Cloud

The world that we live in today becomes more technologically advanced by the day. These advancements have done wonders for society as a whole and have offered much improvement in productivity in the workplace. However, as more applications are being run and more data stored online, in addition to rapid cloud expansion, there is one obvious parallel that is seemingly unavoidable – increased security risks.…

Continue

Added by Peter on May 9, 2016 at 1:30am — No Comments

How Data Security Can Protect Your Business

For the past years, one of the main concerns of businesses and consumers is data security. As technology progresses, digital thieves have become more persistent in staging their attacks to gain unauthorized access to personal information, financial records, intellectual property, and other valuable data.

 

Over the…

Continue

Added by Micah De Jesus on April 18, 2016 at 12:30am — No Comments

Big Data Security Issues: Main Challenges in 2016



In a recent Economist Intelligence Unit survey of 476 executives from around the globe, more than a third of respondents said that their companies suffered significant data losses over the course of last 12…

Continue

Added by Nate Vickery on March 22, 2016 at 5:00am — 1 Comment

Protecting your data and your business

As the number of Internet users and businesses working online is growing, there are also more and more criminals in cyber space. If you want to keep your business safe, you have to learn some basics about the way Internet protection works. Also, you will have to seek assistance from tech and financial advisers to make your data and assets safe from online theft.…

Continue

Added by Gabriella Diesendorf on March 9, 2016 at 1:30am — No Comments

2016 Trends in Big Data & Network Security

I attended the Carrier Network Security Strategies conference ( #CNSS2015)held by Light Reading in NYC on Dec 2. I also attended the New Jersey Tech Council’s Data Summit (#NJTechCouncil) on Dec 9. The main topics of discussion in the conference were around securing the perimeter of networks and protecting customer, carrier and network data. Here is brief summary of what I learned in these two conferences about managing and operating networks securely and protecting…

Continue

Added by Srividya Kannan Ramachandran on December 14, 2015 at 8:00am — No Comments

What Silicon Valley is Doing to Make Big Data More Secure in 2016

With the cloud changing the way modernizations of big data is done, service providers and security organizations have to work harder to ensure security of Big Data to their consumers. The reason for increased security breaches is because the traditional security technologies have no capacity required to detect and protect against such attacks. In…

Continue

Added by David Schwartz on November 12, 2015 at 2:00am — No Comments

The Top Cloud Computing Vulnerabilities and Threats

Cloud computing vulnerabilities

When contemplating to migrate to cloud computing, you have to consider the following security issues for you to enhance your data safety.



Session Riding



Session riding occurs when an online attacker steals an internet user’s cookie to use the application later as the real user. The attackers might also use the CSRF attacks for them to trick the user to send authentic requests to…
Continue

Added by David Schwartz on September 27, 2015 at 3:43pm — No Comments

Big Data & Wearables: Is the Benefit Worth The Risk?

Wearable technology is a type of device that is worn by a user and often includes tracking information related to their health and fitness which it can then upload to the cloud. Other wearable tech includes devices that have motion sensors and cameras to take photos and sync with your mobile devices. Wearable devices can be quite useful, but they may present a huge danger to your privacy.



So far, the market has consisted mainly of early adopter businesses…

Continue

Added by David Schwartz on September 10, 2015 at 10:26am — No Comments

The Dark Side of Big Data

Ashley Madison, IRS, Target, Sony…What do they have in common? Here we only name a few but of the most tremendous crisis of data breach in recent years - yes, it is happening and it is happening everywhere. The cost of data breach comes to a new high at $154 per record of stolen or leaked data, adding up to millions of data for each incident, including the law suits,…

Continue

Added by Yuanjen Chen on September 1, 2015 at 9:00pm — 1 Comment

Monthly Archives

2019

2018

2017

2016

2015

2014

2013

2012

2011

1999

Videos

  • Add Videos
  • View All

© 2019   Data Science Central ®   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service