Think of a VDR as a digital replica of a windowless brick-walled room, in a building nobody knows about, and with a tamper-proof lock. The key to entry is a system that verifies who you are, where you are, and what you know (multi-factor authentication).
Technically, it’s a cloud-based secured online repository for document storage and distribution. Over the years, VDR solution providers have solved the…Continue
Added by Joydeep Bhattacharya on March 7, 2020 at 9:15pm — No Comments
In a modern world of advanced technologies, our life is literally impossible without cellular telecommunications. Today, smartphones and wireless broadband Internet are common things for everybody. And recently, all developments and innovations in cellular technology are not about the availability of mobile connectivity but about bringing it to a…Continue
Added by David Balaban on October 24, 2019 at 9:32pm — No Comments
Cybersecurity Data Science (CSDS) is a rapidly emerging profession focused on applying data science to prevent, detect, and remediate expanding and evolving cybersecurity threats. CSDS is increasingly formally recognized as a cybersecurity job specialty, for instance in the NIST NICE Cybersecurity Workforce Framework.
A proposed CSDS definition derived from…Continue
Added by Scott Mongeau on October 22, 2019 at 11:20pm — No Comments
With data growing at its highest rate ever, cyberattacks and digital warfare are on the rise to get hold of any crucial data. The malicious actors primarily target the data in organizations; if it’s important to you, so it is to them.
Cybercriminals often target databases since they mostly store sensitive data — customer data, financial…Continue
Added by Evan Morris on October 17, 2019 at 7:19pm — No Comments
The Forrester report “Predictions 2018: A year of reckoning” predicted that 80% of firms affected by the GDPR will not be able to comply with the regulation by the time it comes into force on May 25. Of those noncompliant firms, 50% will intentionally not comply.…Continue
Added by Amy Flippant on July 3, 2018 at 12:30am — No Comments
How might a person go about studying something elusive like serial murder or terrorism? I have no formal exposure in this area. Much of the technology that I mention in this blog is meant for another purpose. That other purpose is to study characters in movies, which for me is a great diversion. In particular, I like to map out where certain characters might be found (or lost - i.e. missing characters): the settings they occupy, their roles, their relationships. It goes without saying…Continue
Added by Don Philip Faithful on October 9, 2017 at 5:00am — No Comments
Are you concerned that your company could be struck by a data breach at some point in the future? As scary as it sounds, it’s good that you’re thinking about this in advance.
Although there is no guarantee that you can prevent a data breach from happening, there are a variety of steps you can take to improve the likelihood of your company remaining…
Added by Brian Horvath on March 17, 2017 at 9:30pm — No Comments
I had some magical moments in my life. Perhaps the most magical was the summer I went to work wearing shorts and running shoes. Captain C. said to me, as I sat in our shared office, “If you want to work during the weekend, you can borrow the keys to the building.” It didn’t seem like a big deal at the time. I had already borrowed a military vehicle that, as per Captain C., I could park anywhere in Canada without receiving a parking ticket. So I borrowed the keys to the building. I went…
Understanding that big data comes from such a huge pool of devices, constantly collecting new data, gives you an idea where security threats may come from. Each device that is online, from phones to tablets to computers to smart appliances, has the potential of sending and receiving new data. This continuous back and forth gives a nearly constant window of…Continue
Added by Shezagary on October 18, 2016 at 9:30pm — No Comments
I sometimes ask myself while musing over the need for a particular service, "I wonder if this is commercially viable?" If the service is routine and the required software is rather inexpensive, perhaps there is little need for a company to outsource. I cannot think of any company that would routinely outsource work normally performed on a spreadsheet. I suspect that decades ago some companies hired specialists to handle spreadsheets; this seems much less likely today in light of the…Continue
Added by Don Philip Faithful on July 2, 2016 at 7:07am — No Comments
Canada will soon be passing legislation to allow for physician-assisted suicide. Sometime over the course of debate between our Parliament and Senate, I found what at the time seemed like a peculiar pattern of woodchips in the back of my pick-up. It was such an interesting image, I thought I would share it here. On closer inspection, I discovered that in fact I was looking at hundreds of tiny flower shafts and seeds.…Continue
Added by Don Philip Faithful on June 18, 2016 at 8:30am — No Comments
The Pennsylvania-based First Choice Federal Credit Union has initiated legal action against fast food chain Wendy's over a data breach that obviously has happened following an instance of POS Malware strike.
The class-action suit, filed in the US District Court for the Western District of Pennsylvania by First Choice Federal Credit Union, "on behalf of itself and all others similarly situated" and against the Wendy’s Company, Wendy’s Restaurants, LLC, And Wendy’s International,…
Added by Emily Lauren on May 12, 2016 at 1:00am — No Comments
The world that we live in today becomes more technologically advanced by the day. These advancements have done wonders for society as a whole and have offered much improvement in productivity in the workplace. However, as more applications are being run and more data stored online, in addition to rapid cloud expansion, there is one obvious parallel that is seemingly unavoidable – increased security risks.…Continue
Added by Peter on May 9, 2016 at 1:30am — No Comments
For the past years, one of the main concerns of businesses and consumers is data security. As technology progresses, digital thieves have become more persistent in staging their attacks to gain unauthorized access to personal information, financial records, intellectual property, and other valuable data.
Added by Micah De Jesus on April 18, 2016 at 12:30am — No Comments
In a recent Economist Intelligence Unit survey of 476 executives from around the globe, more than a third of respondents said that their companies suffered significant data losses over the course of last 12…
I attended the Carrier Network Security Strategies conference ( #CNSS2015)held by Light Reading in NYC on Dec 2. I also attended the New Jersey Tech Council’s Data Summit (#NJTechCouncil) on Dec 9. The main topics of discussion in the conference were around securing the perimeter of networks and protecting customer, carrier and network data. Here is brief summary of what I learned in these two conferences about managing and operating networks securely and protecting…Continue
Added by Srividya Kannan Ramachandran on December 14, 2015 at 8:00am — No Comments
With the cloud changing the way modernizations of big data is done, service providers and security organizations have to work harder to ensure security of Big Data to their consumers. The reason for increased security breaches is because the traditional security technologies have no capacity required to detect and protect against such attacks. In…
Added by David Schwartz on November 12, 2015 at 2:00am — No Comments
Cloud computing vulnerabilities
Added by David Schwartz on September 27, 2015 at 3:43pm — No Comments
Wearable technology is a type of device that is worn by a user and often includes tracking information related to their health and fitness which it can then upload to the cloud. Other wearable tech includes devices that have motion sensors and cameras to take photos and sync with your mobile devices. Wearable devices can be quite useful, but they may present a huge danger to your privacy.
So far, the market has consisted mainly of early adopter businesses…
Added by David Schwartz on September 10, 2015 at 10:26am — No Comments
Ashley Madison, IRS, Target, Sony…What do they have in common? Here we only name a few but of the most tremendous crisis of data breach in recent years - yes, it is happening and it is happening everywhere. The cost of data breach comes to a new high at $154 per record of stolen or leaked data, adding up to millions of data for each incident, including the law suits,…Continue