Sat.Oct 05, 2019 - Fri.Oct 11, 2019

article thumbnail

Consumer data might be the new oil, but who gets to decide how it’s used?

Dataconomy

From the Cambridge Analytica scandal to GDPR and data breach headlines, the idea that consumers should know how their data is used is gaining traction with governments and consumer groups. What does this trend mean for companies that rely on consumer data for their business model? Right now, consumer data. The post Consumer data might be the new oil, but who gets to decide how it’s used?

Data 76
article thumbnail

Can microsegmentation help IoT security?

Network World

The Internet of Things ( IoT ) promises some big benefits for organizations, such as greater insights about the performance of corporate assets and finished products, improved manufacturing processes, and better customer services. The nagging security issues related to IoT, unfortunately, remain a huge concern for companies and in some cases might be keeping them from moving forward with initiatives.

Security 154
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to supercharge your data lakes

Tech Republic Cloud

Learn how to improve the performance of your organization's data lakes and analytics.

How To 132
article thumbnail

How to Develop an IT Vulnerability Assessment

Galido

Information Technology Blog - - How to Develop an IT Vulnerability Assessment - Information Technology Blog. In terms of information security, vulnerability is a weakness that is found in an asset or a control and that can be exploited by one or more threats, which becomes a security risk. One way to protect the information is through the identification, assessment, prioritization and correction of the weaknesses identified in the assets.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Cybercriminals using gifs to corrupt Drupal sites

Tech Republic Security

Hackers are taking advantage of vulnerabilities in the Drupal CMS platform by using malicious code disguised as gifs.

113
113
article thumbnail

7 Prerequisites on Whether to Improve Deployment Frequencies with DevOps

Social, Agile and Transformation

In my last post, I advised that having CI/CD automation is very important to drive frequent and reliable releases, however, it is not a sufficient process or steps to establish responsible releases. When you’re making a production release of an application or service, it requires communication, additional testing, documentation, and other steps that go beyond the scope of what continuous.

Devops 115

More Trending

article thumbnail

Apple May Have Acquired Motion Capture Company IKinema

CTOvision

Apple may have recently acquired UK-based motion capture company IKinema, based on evidence from company filings and information shared by a MacRumors reader. IKinema offers animation technology that’s used for games, virtual reality, and more. Earlier this year, for example, IKinema partnered with Ubisoft for IKinema’s RunTime software for character creation.

Apple 182
article thumbnail

SCCM Driver Import Driver Package Creation Process Guide

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Hello folks, In this blog post, I will try to share my experience on how to import SCCM Driver Import and create a driver package in SCCM. It also includes how to integrate into the SCCM task sequence. I hope this will be helpful to streamline lots of SCCM admins during OSD/Task Sequence/Image creation activities.

Windows 166
article thumbnail

McAfee, IBM join forces for global open source cybersecurity initiative

Tech Republic Security

IBM, McAfee and international consortium OASIS are coming together to offer the world a way to develop open source security technologies.

article thumbnail

The Impact Of Brexit On CISOs

Forrester IT

Today we see some signs of optimism from the EU and the UK about the potential to conclude a withdrawal agreement following private talks between the UK and Ireland yesterday. Since I last wrote a blog about this, we have seen a change of UK government, a brand-new UK negotiating position, a Conservative Party leadership […].

article thumbnail

Reimagining Cybersecurity Training: Driving Real Impact on Security Culture

Speaker: Speakers:

They say a defense can be measured by its weakest link. In your cybersecurity posture, what––or who––is the weakest link? And how can you make them stronger? This webinar will equip you with the resources to search for quality training, implement it, and improve the cyber-behaviors of your workforce. By the end of the hour, you will feel empowered to improve the aspects of your security posture you control the least – the situational awareness and decision-making of your workforce.

article thumbnail

Low-tech social engineering attacks

CTOvision

Frank Abagnale is probably the most famous low-tech hacker since Son’ka the Golden Hand and the man who stole the Mona Lisa, Vincenzo Peruggia. Abagnale famously impersonated various professions, including a doctor and a pilot, to help facilitate his financial scams where he used false identities to forge checks and cash them in. Abagnale ended […].

article thumbnail

The Missing Puzzle Piece in SCCM 3rd Party Patching Live Free Webinar

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. The Missing Puzzle Piece in SCCM 3rd Party Patch management webinar is coming soon. This webinar will give you an opportunity interact live with me and ask questions about SCCM third-party patching (with LIVE DEMO). Register ▶▶ [link] Date & Time ▶▶ 23rd Oct -2019 10:00 AM PST Introduction There are different ways to patch […].

Windows 164
article thumbnail

Robocalls annually scam one in 10 Americans, to a loss of $9.5 billion

Tech Republic Security

Computerized auto dialers deliver pre-recorded phone calls with 60 billion expected in 2019 alone. Here's how to handle robocalls.

How To 165
article thumbnail

A Simple Recipe To Calculate How Much Value For Customers Your Firm Delivers (And To Find Critical Gaps)

Forrester IT

Are you trying to understand how much value you deliver to customers? In my research on value for customers, I came across an interesting method called potential gain in value (PGV). I want to share it with you because PGV gives you a simple way to approximate the value delivered. And it helps you prioritize […].

Research 286
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Exciting use cases of Artificial Intelligence in four industry sectors

CTOvision

As the digital transformation of businesses and services continues with full force, artificial intelligence (AI) has become somewhat of a buzzword in the technology sector. While it’s true that we haven’t quite reached the level of technology sophistication often shown off in Hollywood blockbusters, there already are a variety of use cases where machine learning […].

article thumbnail

WVD Custom Image Creation using Windows 10 non Multi-User SKU?

Anoop

Subscribe YouTube Channel [link]. and Facebook Page to get latest updates. [link]. Windows virtual Desktop image building process is essential to understand for a WVD IT Pro. I cover WVD custom image creation related steps & questions in this post. I had a bit of trouble getting Windows 10 Enterprise and multi-user custom version working with WVD host pool.

Windows 138
article thumbnail

Financial industry spending millions to deal with breaches in 2019

Tech Republic Security

A new study says financial services organizations experienced an average of 10 attacks a year and spent an average of $1.3 million to restore services after each DNS attack.

Financial 134
article thumbnail

So What Was Cybercon 2019 Like?

Forrester IT

AISA’s annual Cybercon conference was a sight to behold with an amazing line up of panelists, keynote speakers AND some female attendees (at last!). Set against the (unusually) sunny and crisp backdrop of south wharf in Melbourne, the conference was an immersive 2 days of contentious debates and discussions on just how pervasive, imperative and […].

article thumbnail

7 Leadership Themes for Procurement & Supply Chain Leaders in 2024

Procurement and supply chain leaders are presented with their fair share of challenges, with a host of tools and strategies to resolve them. That said, what’s the best path forward to leverage this year’s trends? In this recap of a recent GEP-WBR webinar, 7 Leadership Themes for Procurement & Supply Chain Leaders in 2024, GEP’s Pramod Sethumadhavan explores seven vital leadership trends that will help guide procurement and supply chain decision-makers.

article thumbnail

Sharp Spike in Attacks Targeting Company Email Accounts

CTOvision

A new report by email and data security company Mimecast has revealed a staggering increase in the number of Business Email Compromise (BEC) cyber-attacks. The quarterly Email Security Risk Assessment (ESRA) report, released today, found a 269% increase in the number of BEC attacks in quarter three of 2019, compared to the second quarter of […].

Company 168
article thumbnail

VMware builds security unit around Carbon Black tech

Network World

VMware has wrapped up its $2.1 billion buy of cloud-native endpoint-security vendor Carbon Black and in the process created a new security business unit that will target cybersecurity and analytics to protect networked enterprise resources. When VMware announced the acquisition in August , its CEO Pat Gelsinger said he expected Carbon Black technology to be integrated across VMware’s product families such as NSX networking software and vSphere, VMware's flagship virtualization platform.

Vmware 146
article thumbnail

More companies use multi-factor authentication, but security still weak from poor password habits

Tech Republic Security

Users still have to juggle far too many passwords, which leads to password sharing, reuse, and other bad habits, according to a new report from password manager LastPass.

article thumbnail

CEO Departure Gives SAP The Chance To Refocus On Customer Priorities — But Also Brings Risks

Forrester IT

Last night, SAP’s CEO of the past 9-plus years, Bill McDermott, announced his plan to resign. SAP will replace him with co-CEOs Jennifer Morgan, who is US-based and comes from a sales background and most recently held the board seat overseeing cloud products, and Christian Klein, who is based in Germany and comes from a […].

SAP 275
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Blockchain Loses Its Luster, for Now

Information Week

Last year if you had a tech problem, blockchain was the answer. Now blockchain has reached the "trough of disillusionment," according to Gartner.

135
135
article thumbnail

Spearline’s Automated Number Test Campaign: 10 Years Strong

Spearline Testing

10 years ago, Spearline developed the first-ever automated testing platform to proactively monitor global toll, toll-free, inbound and dial-out numbers. This was in response to a customer need for an innovative product that did not exist at the time to solve a frustrating and expensive problem in the telecommunications industry. Since then, Spearline has continued to be a listening company and constantly adapts and further develops the platform, and it’s only the beginning.

article thumbnail

Cyberattacks are increasing, but AV and intrusion detection software are asleep at the wheel

Tech Republic Security

Over three quarters of US businesses have faced cyberattacks in the past 12 months, with 86% of US firms experiencing attacks feeling let down by their antivirus.

Software 135
article thumbnail

Data Strategy & Insights 2019: Solving The Human Skills Problem

Forrester IT

We’ve seen the promise of what enhanced data, analytics, and AI capabilities can do for businesses, but firms are struggling to truly maximize their impact. Data and analytics leaders want to shift into high gear, but many factors are holding them back. One of the key issues that everyone is facing is finding and developing […].

Data 272
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

AI Keeps Buggy Code From Crashing The Cloud

Information Week

AI-based test automation will be a key feature of DevOps in enterprise multi-cloud environments in the 2020s.

Cloud 140
article thumbnail

How to install Docker CE on CentOS 8

Tech Republic Cloud

If you require Docker CE on CentOS, the steps for installation have changed for the eighth iteration of the platform.

How To 112
article thumbnail

Top 5 things to know about the splinternet

Tech Republic Security

As the internet begins to split into different versions in different countries, the laws that govern data are changing. Tom Merritt explains five things you need to know about the splinternet.

Internet 122
article thumbnail

Blockchain Helps Enterprises’ Digital Ecosystems In Asia Pacific

Forrester IT

(co-authored with Han Bao, senior research associate) Blockchain solutions are maturing, yet speculation on its value is rife. Most business and technology decision makers are still unclear about what actual business value this technology can deliver to their organizations. This is what I have been researching and writing about — to determine how enterprises can […].

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.