Subscribe to DSC Newsletter

All Blog Posts Tagged 'security' (21)

3 Pillars of GDPR Compliance

The Forrester report “Predictions 2018: A year of reckoning” predicted that 80% of firms affected by the GDPR will not be able to comply with the regulation by the time it comes into force on May 25. Of those noncompliant firms, 50% will intentionally not comply.…

Continue

Added by Amy Flippant on July 3, 2018 at 12:30am — No Comments

Engaging the Animal Spirit in the Narrative

How might a person go about studying something elusive like serial murder or terrorism?  I have no formal exposure in this area.  Much of the technology that I mention in this blog is meant for another purpose.  That other purpose is to study characters in movies, which for me is a great diversion.  In particular, I like to map out where certain characters might be found (or lost - i.e. missing characters): the settings they occupy, their roles, their relationships.  It goes without saying…

Continue

Added by Don Philip Faithful on October 9, 2017 at 5:00am — No Comments

It's Past Time to Start Protecting Your Company From a Data Breach

Are you concerned that your company could be struck by a data breach at some point in the future? As scary as it sounds, it’s good that you’re thinking about this in advance.



Although there is no guarantee that you can prevent a data breach from happening, there are a variety of steps you can take to improve the likelihood of your company remaining…

Continue

Added by Brian Horvath on March 17, 2017 at 9:30pm — No Comments

Risk as a Narrative Construct



I had some magical moments in my life. Perhaps the most magical was the summer I went to work wearing shorts and running shoes. Captain C. said to me, as I sat in our shared office, “If you want to work during the weekend, you can borrow the keys to the building.” It didn’t seem like a big deal at the time. I had already borrowed a military vehicle that, as per Captain C., I could park anywhere in Canada without receiving a parking ticket. So I borrowed the keys to the building. I went…

Continue

Added by Don Philip Faithful on December 25, 2016 at 8:00am — 2 Comments

Top 9 Big Data Security Issues You Should Watch For

Understanding that big data comes from such a huge pool of devices, constantly collecting new data, gives you an idea where security threats may come from. Each device that is online, from phones to tablets to computers to smart appliances, has the potential of sending and receiving new data. This continuous back and forth gives a nearly constant window of…

Continue

Added by Shezagary on October 18, 2016 at 9:30pm — No Comments

Deconstructing Symbolic Expression

I sometimes ask myself while musing over the need for a particular service, "I wonder if this is commercially viable?" If the service is routine and the required software is rather inexpensive, perhaps there is little need for a company to outsource. I cannot think of any company that would routinely outsource work normally performed on a spreadsheet. I suspect that decades ago some companies hired specialists to handle spreadsheets; this seems much less likely today in light of the…

Continue

Added by Don Philip Faithful on July 2, 2016 at 7:07am — No Comments

End-of-Life Narrative

Canada will soon be passing legislation to allow for physician-assisted suicide.  Sometime over the course of debate between our Parliament and Senate, I found what at the time seemed like a peculiar pattern of woodchips in the back of my pick-up.  It was such an interesting image, I thought I would share it here.  On closer inspection, I discovered that in fact I was looking at hundreds of tiny flower shafts and seeds.…

Continue

Added by Don Philip Faithful on June 18, 2016 at 8:30am — No Comments

First Choice FCU sues Wendy's over data breach

The Pennsylvania-based First Choice Federal Credit Union has initiated legal action against fast food chain Wendy's over a data breach that obviously has happened following an instance of POS Malware strike.



The class-action suit, filed in the US District Court for the Western District of Pennsylvania by First Choice Federal Credit Union, "on behalf of itself and all others similarly situated" and against the Wendy’s Company, Wendy’s Restaurants, LLC, And Wendy’s International,…

Continue

Added by Emily Lauren on May 12, 2016 at 1:00am — No Comments

How to Avoid Data Breaches in the Cloud

The world that we live in today becomes more technologically advanced by the day. These advancements have done wonders for society as a whole and have offered much improvement in productivity in the workplace. However, as more applications are being run and more data stored online, in addition to rapid cloud expansion, there is one obvious parallel that is seemingly unavoidable – increased security risks.…

Continue

Added by Peter on May 9, 2016 at 1:30am — No Comments

How Data Security Can Protect Your Business

For the past years, one of the main concerns of businesses and consumers is data security. As technology progresses, digital thieves have become more persistent in staging their attacks to gain unauthorized access to personal information, financial records, intellectual property, and other valuable data.

 

Over the…

Continue

Added by Micah De Jesus on April 18, 2016 at 12:30am — No Comments

Big Data Security Issues: Main Challenges in 2016



In a recent Economist Intelligence Unit survey of 476 executives from around the globe, more than a third of respondents said that their companies suffered significant data losses over the course of last 12…

Continue

Added by Nate Vickery on March 22, 2016 at 5:00am — 1 Comment

Protecting your data and your business

As the number of Internet users and businesses working online is growing, there are also more and more criminals in cyber space. If you want to keep your business safe, you have to learn some basics about the way Internet protection works. Also, you will have to seek assistance from tech and financial advisers to make your data and assets safe from online theft.…

Continue

Added by Gabriella Diesendorf on March 9, 2016 at 1:30am — No Comments

2016 Trends in Big Data & Network Security

I attended the Carrier Network Security Strategies conference ( #CNSS2015)held by Light Reading in NYC on Dec 2. I also attended the New Jersey Tech Council’s Data Summit (#NJTechCouncil) on Dec 9. The main topics of discussion in the conference were around securing the perimeter of networks and protecting customer, carrier and network data. Here is brief summary of what I learned in these two conferences about managing and operating networks securely and protecting…

Continue

Added by Srividya Kannan Ramachandran on December 14, 2015 at 8:00am — No Comments

What Silicon Valley is Doing to Make Big Data More Secure in 2016

With the cloud changing the way modernizations of big data is done, service providers and security organizations have to work harder to ensure security of Big Data to their consumers. The reason for increased security breaches is because the traditional security technologies have no capacity required to detect and protect against such attacks. In…

Continue

Added by David Schwartz on November 12, 2015 at 2:00am — No Comments

The Top Cloud Computing Vulnerabilities and Threats

Cloud computing vulnerabilities

When contemplating to migrate to cloud computing, you have to consider the following security issues for you to enhance your data safety.



Session Riding



Session riding occurs when an online attacker steals an internet user’s cookie to use the application later as the real user. The attackers might also use the CSRF attacks for them to trick the user to send authentic requests to…
Continue

Added by David Schwartz on September 27, 2015 at 3:43pm — No Comments

Big Data & Wearables: Is the Benefit Worth The Risk?

Wearable technology is a type of device that is worn by a user and often includes tracking information related to their health and fitness which it can then upload to the cloud. Other wearable tech includes devices that have motion sensors and cameras to take photos and sync with your mobile devices. Wearable devices can be quite useful, but they may present a huge danger to your privacy.



So far, the market has consisted mainly of early adopter businesses…

Continue

Added by David Schwartz on September 10, 2015 at 10:26am — No Comments

The Dark Side of Big Data

Ashley Madison, IRS, Target, Sony…What do they have in common? Here we only name a few but of the most tremendous crisis of data breach in recent years - yes, it is happening and it is happening everywhere. The cost of data breach comes to a new high at $154 per record of stolen or leaked data, adding up to millions of data for each incident, including the law suits,…

Continue

Added by Yuanjen Chen on September 1, 2015 at 9:00pm — 1 Comment

Keeping Corporate Data Safe: 5 Ways Lax BYOD Policies Create Security Risks

The proliferation of smartphones, tablets, and other mobile devices — here come the “wearables” — has opened up new opportunities for businesses to leverage employee-owned technology for competitive advantage. That being said, the use of such devices in the workplace can compromise sensitive data, especially when comprehensive BYOD policies are not implemented and…

Continue

Added by Beau Winchester on September 28, 2014 at 11:00am — No Comments

Protecting Data with Data: Predicting Cyber Threats Before they Happen

Businesses have always faced security threats, whether is someone breaking in to steal some cash or equipment, a disgruntled employee selling company secrets, or something else altogether, there has always been cause to be careful as a business owner.

 

However, with the evolution of technology, and the digital age coming into full swing, security threats have evolved as well, and…

Continue

Added by Beau Winchester on August 25, 2014 at 11:51am — No Comments

The Target Security Breach: What Happened and What It Can Teach Us About Cyber Security

On December 13th, 2013, a blog devoted to IT security news broke a startling story — Target, one of the country’s largest big-box retailers, had been the victim of a security breach that exposed the credit card data of thousands of shoppers.



The attackers targeted the data stored in the magnetic strips of customers’ cards. The website reported…

Continue

Added by Beau Winchester on July 23, 2014 at 11:24am — No Comments

Monthly Archives

2019

2018

2017

2016

2015

2014

2013

2012

2011

1999

Videos

  • Add Videos
  • View All

© 2019   Data Science Central ®   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service