Merit



Merit Network Blogs

 

IT Developments Blog


Members in the News Blog


NetSec Blog


Professional Learning Blog


ProdActivity Blog


Receive Updates By Email




RSS Feed for Merit Blog Updates


 
IT Developments Blog

The future of IT, Sony hack, FIDO, gov't data risks, wearables, end-to-end encryption


    By Katherine Johnson - December 15, 2014 9:17 am

In the world of information technology....

Bringing down Sony was frighteningly easy

CNN -The average company is one bad click, misplaced password or disgruntled employee away from getting hacked. At Sony (SNE) Pictures, the company basically put out the welcome mat for hackers.

Leaked documents show that Sony employees kept lists of passwords in spreadsheets on their computers. Also, employees kept the Social Security numbers of 47,426 people -- including Conan O'Brien and Sylvester Stallone -- lying around in unencrypted files. That's extremely reckless.

The Role of Visualization in Security Research

Dark Reading - In today's interconnected, data rich IT environments, passive inspection of information is not enough.

Relying on text for the presentation of data has drawbacks, especially in the field of security research, which depends on the monitoring and analysis of large-scale, constantly evolving data sets. Meanwhile, using smart data visualization combined with intelligent data mining can allow researchers to draw connections between data points even in loosely related data, skipping the gradual comprehension of text files otherwise needed to reach the same results.

The Invasion Of Wearables In The Workforce

Tech Crunch - With the pending debut of the Apple Watch, predicted to come to market in early 2015, wearables in the workplace are about to become ubiquitous, particularly at large tech companies that are known for innovation and change.

For some, wearables will up the ante significantly in a company's ability to measure workflow and productivity, and with data collected from these devices, a new level of employee insight will be reached. For others, the inevitable invasion of wearables means that we will be forced to relieve the BYOD nightmares of security risks, unclear policies and new procedures.

Mobile Device Makers Unleash FIDO

CIO - Expect a rush of vendors to adopt the a simple, secure authentication scheme that might do away with passwords. Vendors of mobile devices are lining up to implement an authentication scheme meant to make online transactions both simpler and more secure, known as the Fast Identity Online (FIDO) specification.

In Big Data, Shepherding Comes First

NY Times - Big data is increasingly moving into the mainstream, as companies in every industry begin to combine an abundance of digital data with smart software to analyze it. It is a potential gold mine for software makers, with analysts predicting torrid growth for the market overall.

But building big data businesses is proving to be anything but a get-rich-quick game, and to require both agility and patience.

How Governments Can Mitigate Data Risks

State Tech - Sensitive data breaches are all too common in government agencies. Follow these steps to better manage risk.

Security controls have evolved over time, becoming easier to use and more effective at stopping a wide variety of threats. Of course, threats continue to evolve and strengthen as well, with an ever-sharpening focus on stealing valuable data.

Ten industries that IT will revolutionize in the years ahead

ZDNet - Almost every industry -- from food to education to healthcare -- is adding IT services. Here are ten places to watch for high-tech disruption in the coming years.

Hacker Lexicon: What Is End-to-End Encryption?

Wired -Plenty of companies brag that their communications app is encrypted. But that marketing claim demands a followup question: Who has the key? In many cases, the company itself holds the cryptographic key data that lets it decrypt your messages--and so, therefore, does any hacker who compromises the company or government official standing over its shoulder.

Google is replacing the CAPTCHA with a simple checkbox

Washington Post - For years, Internet services tried to block spammers and bots by making Web users read a distorted series of characters and asking them to type back what they saw. Humans are a lot better at interpreting what machines see as gobbledygook -- or so the theory went.

In April, research from Google showed that computers are just as good at defeating these security systems, known as CAPTCHAs, as real people.




 






Other Recent Blog Postings

Members in the News Blog

September 12, 2014 11:52 am

Oklahoma Baptist University, Thunder Bay National Marine Sanctuary, Siena Heights University, Oakland C.C., Sheridan Community Hospital, Northville District Library, and others.

Click to read the entire post.


NetSec Blog

April 21, 2014 10:37 am

Now that everything from refrigerators to cars are networked and reporting on what we do, the Internet of Things is a growing attack space. Are you safe in the IoT? Do you still have privacy when your coffee machine is on the Internet?

Click to read the entire post.


Professional Learning Blog

July 09, 2013 8:46 am

Due to popular demand, a second session of the IPv6 Workshop has been added to the Merit Professional Learning calendar.

Click to read the entire post.


ProdActivity Blog

July 10, 2014 12:58 pm

New usage statistics available through the Member Portal for Members with Merit Cloud Media!

Click to read the entire post.










 




Like Us on Facebook

Follow us on Twitter

Read our Blogs

Contact Us



Membership | Services | Events | Research | Cybersecurity | News | About Merit | Contact Us | Directions to Merit | Site Map | Merit Network Home



Copyright © 2014 Merit Network, Inc.
1000 Oakbrook Drive, Suite 200, Ann Arbor, Michigan 48104-6794
Phone: (734) 527-5700    Fax: (734) 527-5790    E-mail: