In the world of information technology....
Bringing down Sony was frighteningly easy
-The average company is one bad click, misplaced password or disgruntled employee away from getting hacked. At Sony (SNE) Pictures, the company basically put out the welcome mat for hackers.
Leaked documents show that Sony employees kept lists of passwords in spreadsheets on their computers. Also, employees kept the Social Security numbers of 47,426 people -- including Conan O'Brien and Sylvester Stallone -- lying around in unencrypted files. That's extremely reckless.
The Role of Visualization in Security Research
- In today's interconnected, data rich IT environments, passive inspection of information is not enough.
Relying on text for the presentation of data has drawbacks, especially in the field of security research, which depends on the monitoring and analysis of large-scale, constantly evolving data sets. Meanwhile, using smart data visualization combined with intelligent data mining can allow researchers to draw connections between data points even in loosely related data, skipping the gradual comprehension of text files otherwise needed to reach the same results.
The Invasion Of Wearables In The Workforce
- With the pending debut of the Apple Watch, predicted to come to market in early 2015, wearables in the workplace are about to become ubiquitous, particularly at large tech companies that are known for innovation and change.
For some, wearables will up the ante significantly in a company's ability to measure workflow and productivity, and with data collected from these devices, a new level of employee insight will be reached. For others, the inevitable invasion of wearables means that we will be forced to relieve the BYOD nightmares of security risks, unclear policies and new procedures.
Mobile Device Makers Unleash FIDO
- Expect a rush of vendors to adopt the a simple, secure authentication scheme that might do away with passwords. Vendors of mobile devices are lining up to implement an authentication scheme meant to make online transactions both simpler and more secure, known as the Fast Identity Online (FIDO) specification.
In Big Data, Shepherding Comes First
- Big data is increasingly moving into the mainstream, as companies in every industry begin to combine an abundance of digital data with smart software to analyze it. It is a potential gold mine for software makers, with analysts predicting torrid growth for the market overall.
But building big data businesses is proving to be anything but a get-rich-quick game, and to require both agility and patience.
How Governments Can Mitigate Data Risks
- Sensitive data breaches are all too common in government agencies. Follow these steps to better manage risk.
Security controls have evolved over time, becoming easier to use and more effective at stopping a wide variety of threats. Of course, threats continue to evolve and strengthen as well, with an ever-sharpening focus on stealing valuable data.
Ten industries that IT will revolutionize in the years ahead
- Almost every industry -- from food to education to healthcare -- is adding IT services. Here are ten places to watch for high-tech disruption in the coming years.
Hacker Lexicon: What Is End-to-End Encryption?
-Plenty of companies brag that their communications app is encrypted. But that marketing claim demands a followup question: Who has the key? In many cases, the company itself holds the cryptographic key data that lets it decrypt your messages--and so, therefore, does any hacker who compromises the company or government official standing over its shoulder.
Google is replacing the CAPTCHA with a simple checkbox
- For years, Internet services tried to block spammers and bots by making Web users read a distorted series of characters and asking them to type back what they saw. Humans are a lot better at interpreting what machines see as gobbledygook -- or so the theory went.
In April, research from Google showed that computers are just as good at defeating these security systems, known as CAPTCHAs, as real people.