FREE DOWNLOAD
2020 Vision: The Future of Business Information 

Information Happens

3 Things Executives Should Know About Data Breaches

by Leonard Hancock on October 3, 2017

When the next data breach occurs, executives who know the facts will have an advantage.

cybersecurity-1.jpg

1) Data Breaches Will Continue to Escalate

After the Equifax data breach, companies now fear that the question is when, not if, their data will be compromised. U.S. companies and government agencies experienced a record 1,093 data breaches in 2016, a 40% increase from 2015. Moreover, this may be the tip of the iceberg; a significant portion of cybercrime goes unreported.

Read More

Topics: Cybersecurity

Information Security of Containers Still in Development

by Leonard Hancock on April 27, 2017

Security concerns around container-based virtualization continue to haunt a promising technology

container security-667915-edited.jpg

Container-based virtualization has emerged as one of the top trends in enterprise IT over the last five years. Containers offer a level of flexibility and efficiency that is lacking in Virtual Machines (VMs), allowing cross platform integration. But in certain and crucial respects, container-based VMs lack the security of a VM running a dedicated operating system. 

Read More

Topics: Cybersecurity, Cloud Computing, Virtualization, Containers

The Blockchain Revolution

by Leonard Hancock on February 21, 2017

Blockchain is starting to deliver on great expectations, but the story of this technology is still just beginning.

blockchain2.jpg

Is blockchain a digital miracle? Typing “What is Blockchain?” or “How Can I Use Blockchain?” into any search engine fills the screen with hype. Maybe it’s not quite a household word, but numerous individuals and companies see it as the future of IT security in an unsecured age.  Many think it will emerge as an opportunity for Internet of Things (IoT) devices.

Blockchain is a decentralized network of digital records open to public verification. Each record—each block of data—is time-stamped to create a chronological record, is linked to others, and is encrypted, so as not to be subject to revision.  In this way, the technology of a blockchain creates a secure, digital ledger.

Read More

Topics: IT Security, hackers, bitcoin, IoT, Cybersecurity, blockchain, Internet of Things

Alliances, Standards and Blockchain: Hope for IoT Security

by Leonard Hancock on February 15, 2017

The high-stakes struggle to secure the Internet of Things is bringing companies together, but the way forward may come from the disruptive technology behind Bitcoin: Blockchain.

IoT-security.jpg

The world of machines is getting smarter and more connected. From refrigerators that access the Internet, to Wi-Fi smart scales to track your weight and BMI, to self-driving automobiles, the Internet of Things (IoT) has emerged as the future of everyday technology. Frighteningly, few in the Information Technology world would argue that the IoT is becoming more secure, and many would say the opposite. The question is, in a world where security breaches are commonplace, how can we get to a place where all devices are vastly more secure?

Read More

Topics: IT Security, hackers, bitcoin, IoT, IBM, AT&T, Cybersecurity, blockchain, Internet of Things

Challenges to Personal and Operational IT Security Presented by Social Media

by Leonard Hancock on February 9, 2017

With social media Information and "social engineering" compromising IT security, user accounts are leaving businesses vulnerable to hackers.

cybersecurity

It has become increasingly obvious to Security Operations Managers (SOMs) that well-orchestrated phishing campaigns can start with breaching an employee’s social media account. These campaigns, which can result in sensitive organizational data being leaked, are aimed at unsuspecting workers who fail to follow best practices to ward off such attacks. In some cases, the company itself may not have effective security protocols in place.

Read More

Topics: Social Media, IT Security, OPSEC, hackers, Cybersecurity, social engineering

Human Content Curation Helps Prevent Spread of "Fake News"

by Leonard Hancock on February 2, 2017

Combining AI and an editorial team can prevent "fake news" and other unreliable information from influencing business decisions.

fakenews.jpg

Not all content is created equal. Moreover, not all content can be trusted. New York Times followers received a sharp reminder of this axiom on Sunday, January 22, when OurMine, a hacker “security” group, infiltrated one of the media organization’s Twitter accounts. OurMine tweeted a fake news brief through the New York Times' video account (@nytvideo) claiming that Russia had launched a missile attack against the United States. The source was supposedly a “leaked statement” from Russian President Vladimir Putin. The Times quickly removed OurMine’s fake tweet: “We deleted a series of tweets published from this account earlier today without our authorization,” they reported via Twitter. Unfortunately, not everyone seems to realize that not all content can be trusted.

Read More

Topics: content curation, Machine Learning, Information Management, AI, Fake News, IT Security, Cybersecurity

About this blog

Welcome to the InfoDesk Blog, "Information Happens" where we feature articles, company news, including new products/services, webinars, white papers and more.

Subscribe to Email Updates

Consulting Industry

Energy Industry

Life Science Industry

Information Happens