You know the score. You’re in the middle of cooking dinner and realize you’re missing a vital ingredient, but home alone. Do you have enough time to jump in the car and fetch it or can you leave it out?
If only there was a social network which enabled you to reach out to other people and ask them if they could pick the item for you, dropping it off on their way home.
The sprawling and complex set of subjects we call cyber security can all be tied to one fundamental concept -- time. The time it takes a cyberattack to penetrate, the time from initial compromise to lateral movement across the network, the time it takes for an attack to be detected, to be analyzed, to be responded to and remediated.
Time is one of seven base quantities in the International System of Units upon which all other measures are constructed. No surprise then that it’s the single most important factor in cybersecurity program success.
It’s been 28 years since England reached the semi-finals of The World Cup, and England fans across the nation have been glued to pub and living room screens, anxiously watching their team beat a path to success.
This year’s summer of sport has been an epic one for fans of England who have seen them win against Costa Rica 2-0, thrash Panama with a historic 6-1 score and beat Sweden 2-0. Not only that, but sports fans have also been tuning in with strawberries and cream to watch Djokovic and Federer return to the tennis courts at Wimbledon -- and strapping themselves in to watch Lewis Hamilton take on Sebastian Vettel on the Silverstone Circuit during Formula 1. But whilst action-packed summers are great for sports fans, they can create a dilemma for businesses: should they carry on with 'business as usual' or let their employees watch as the drama unfolds?
Social media background checks are slowly becoming the norm. According to CareerBuilder, 70 percent of employers use social media in some way to vet their employees. In most cases, these checks are innocent -- or at least well-intentioned. Employers want to make sure the people they hire are conducting themselves online appropriately and respectfully. No brand wants one of their employees sending out offensive tweets on a regular basis or badmouthing his or her boss on Facebook.
Intention is not the only thing that matters with social media background checks. In fact, employers can, and do, stumble into a mess of legal and ethical implications by looking at a job candidate’s Facebook page or Twitter account. Here are some of the biggest dangers of social media background checks.
While routinely working on the security of one e-commerce website, I encountered an unusual type of a brute-force attack that was fairly hard to mitigate. It was based on a delicately simple technique that made it stand out from the crowd. Read this article to learn what kind of an attack it was and how I succeeded in protecting my customer’s site against it.
As you know, a classic brute-force boils down to guessing credentials. For instance, threat actors take known user accounts and pick passwords for them based on certain criteria -- either by generating them on-the-fly or using dictionaries. This is the basic way to hack an account.
In recent years, enterprises have encountered a new threat that is forcing them to rethink everything they thought they knew about business and technology: startups. These fledgling companies are not your father’s legacy enterprise. They are a new breed of business that thrives on being unbeatably fast, agile and flexible. And every mid-to-large sized company who cannot opt to just snap them up with an acquisition is at risk of losing significant market-share to these new kids on the block. And this concern is pervasive -- a recent report by Dell found that 78 percent of business leaders are threatened by startups, with half fearful that they will be rendered obsolete in just a few years.
So, what can business leaders do to ensure they have a foothold in the future? In short, learn from your competitors and modernize your IT by prioritizing strategic Digital Operations. While it's not as sexy as the headline grabbing trends like AI, it will have an immediate impact on your bottom line rather than questioning when you will see your ROI.
Ridesharing companies like Uber and Lyft are reshaping the transportation industry. In the past few years, these businesses have changed the way people explore cities, navigate to new travel destinations, and find their way home after a night at the bar.
While many consumers sing the praises of Uber and Lyft, there is one area in which these businesses have frequently courted controversy: background checks.
Public cloud services can be affordable for many enterprise applications. But achieving the same service levels that the enterprise data center delivers for high availability and high performance for mission-critical applications can be quite costly. The reason is: high availability and high performance, especially for database applications, both consume more resources and that costs more money -- sometimes considerably more.
Is there a way to make public cloud services equally, if not more, cost-effective than a high availability, high performance private cloud? Yes, but that requires carefully managing how the public cloud services are utilized by each application.
A study published in Proceedings of the National Academy of Sciences shone new light on the shortcomings of collecting data from large groups of people during medical research. The longstanding belief is that the bigger the subject pool, the more representative the results will be of the public at large.
However, the scientists discovered something different that could impact how people use fitness trackers.
As technology evolves, it leaves behind a junkyard of products that are longer needed. Electric typewriters, dial-up modems, and floppy disks -- all once intrinsic parts of workaday life -- are now long-obsolete relics.
Although we’re not quite there yet, it seems increasingly plausible that traditional antivirus software is likewise reaching its twilight years.
People are worried about their personal security. Who do you trust? Facebook recently admitted it tracks just about everything you do whilst using its network, whereas one of the biggest technology companies in the UK, Dixons Carphone, announced a huge data loss.
You have to ask yourself, if a technology company can’t safeguard your data, who can you trust? On top, do you trust your web browser? What’s it storing, what information does it pass to the manufacturer and to the website you are browsing?
Ideally, it means webmasters can embed such a script in their sites and thus siphon off the processing power of visiting PCs in the background to earn Monero (XMR), Electroneum or other form of cryptocurrency. This is a legit tactic as long as people are properly notified of it.
Protecting customer data should always be a top priority for businesses. But doing so is increasingly extending beyond moral responsibility and taking on the form of legal requirement. As you’ve surely heard, the General Data Protection Regulation (GDPR) took effect May 25. This set of regulations, which replaces the Data Protection Act 1998, legislates online data rights for any organization that sells products or services to European Union (EU) customers.
Complying with these new rules might seem daunting (and even unnecessary) for US-based small businesses, particularly since there’s still a lot of confusion regarding the specifics of these new rules and requirements. But if you can understand these five keys to customer data protection, it will go a long way toward helping your business achieve compliance.
GDPR -- it’s a nightmare for organizations, but a much-needed protection for citizens in our world of Cambridge Analytica, criminal hackers, and nation-states cyberthreats. There are many aspects of the regulation that are extremely tricky to implement, but let’s consider just one. Imagine the following scenario:
A new customer signs up to your eCommerce website. Their data gets moved into several back-end systems; maybe a CRM, an accounts system, an order management system, marketing, and probably some kind of data science workbench. Sometime later, an analyst is tasked with analyzing new customers and their behaviors, their retention rates, and other important factors. They know customer data is spread out across dozens of these systems, so they ask IT to prepare a dataset for them. Maybe a month later IT come back with a dataset that has been provisioned in the corporate Data Lake. The data isn’t quite fit for purpose and contains far more information than the analyst needs.
With the General Data Protection Regulation (GDPR) in effect, and Brexit negotiations in full swing, there is tremendous debate about London’s new place in the world economy. However, even in a post-Brexit and GDPR world, London is a resilient city with a 400-year history at the center of trade and finance.
In 1998, my company, Interxion,strategically chose central London as the location of its first data center. Twenty years later, we continue to invest in this city with the launch of our third data center, opening in July. So what makes London such an attractive connectivity hub for businesses all over the world?