Tag Archive for data security

Artificial Intelligence: Liability and Regulation

risk

by Angela Guess Gary Lea of The Conversation recently wrote in Phys.org, “There has been much discussion of late of the ethics of artificial intelligence (AI), especially regarding robot weapons development and a related but more general discussion about AI as an existential threat to humanity.If Skynet of the Terminator movies is going to exterminate…

Be Wary of Your Business Partners’ Data Governance Policies

care

by Angela Guess Writing for Dark Reading, Sekhar Sarukkai noted, “As more details emerge about the recent mega breach affecting CVS, Costco, Walmart, RiteAid, and Tesco, security experts are zeroing in on an often overlooked element in a company’s cyber defenses: its business partners. The common thread between these companies is a third-party vendor called…

How Does Machine Learning Intersect with Data Security?

Intersection

by Angela Guess Sue Marquette Poremba recently wrote for IT Business Edge, “Machine learning is all about algorithms. It’s been used to spot fraud by the financial industry and is supposed to predict behaviors of users. So how does machine learning intersect with IT security? ‘Machine learning is the technology that underpins analytics in security,’…

Sisense CEO on the Intersection of Cybersecurity and Big Data Analytics

sis

by Angela Guess Forbes contributor Gil Press writes, “Cybersecurity and big data analytics are two set of technologies that are frequently mentioned by CEOs and CIOs as top investment priorities. But what about marrying the two? Many organizations are not yet there. For example, a recent survey of government cybersecurity professionals found that 86 percent…

Will Smart Devices Cost Us Our Privacy, Perhaps Our Safety?

safe

by Angela Guess Craig Spiezle writes for TechCrunch, “‘Smart’ devices are all the buzz, whether in the connected home (thermostats, lightbulbs, garage door openers, locks and various appliances) or new wearable devices. They promise convenience along with improved control and efficiency in our lives. But, as highlighted by the recent hacking of automobiles, connectivity can…

Securing Big Data: A Look at the Numbers

num

by Angela Guess Cynthia Leonard reports for Datanami, “If you are using any sort of Big Data in your enterprise environment, you are no doubt concerned about securing that data. As more and more organizations are seeing the potential and utilizing the power of Big Data, they are using Hadoop to easily process these large…

Study Finds that CIOs Vastly Underestimate Shadow IT

shad

by Angela Guess Kenneth Corbin reports for CIO.com, “Most CIOs have an inkling that employees in their enterprise have snuck a few applications past the IT department, but a new study by Cisco indicates that they are vastly underestimating the extent that unauthorized apps and services have infiltrated the network. Consulting with CIOs and analyzing…

Cloud-Clout Unveils Cloud Data Storage System With 100% Bulletproof Protection

cc

by Angela Guess A recent article out of the company reports, “Cloud-Clout (#cloudclout) today unveiled its ground-breaking cloud-powered data storage system. Fully secure and always reliable, Cloud-Clout encrypts and fragments users’ data across multiple servers around the world to deliver 100% bulletproof protection, and is the perfect data security solution for consumers worried about their…

PII – It’s Not a Greek Fraternity or a Math Symbol

cathy nolan new

by Cathy Nolan Buzzing around the fringes of Data Security and ready to sting your organization is the acronym, PII. According to Wikipedia, personally identifiable information (PII), or Sensitive Personal Information (SPI), are used in US privacy law and information security, and is information that can be used on its own, or with other information, to identify, contact, or…