Predicting the future from data! That sounds like science fiction, but it is becoming more and more a reality. Thanks to predictive analytics. Here we explain what this is and what data science and data-based forecasting models can do for companies.
VIRGINIA TECH AND DASHLANE ANALYSIS FIND RISKY, LAZY PASSWORDS THE NORM Dashlane analyzed over 61 million passwords and uncovered some troubling password patterns. The analysis was conducted with research provided by Dr. Gang Wang, an Assistant Professor in the Department of Computer Science at Virginia Tech. The Virginia Tech project, described as “the first large-scale empirical analysis […]
In hybrid cloud environments you can actually setup higher security than needed. A balanced level of security is a matter of overview, expertise and costs.
Not So Pretty: What You Need to Know About E-Fail and the PGP Flaw Don’t panic! But you should stop using PGP for encrypted email and switch to a different secure communications method for now. A group of researchers released a paper today that describes a new class of serious vulnerabilities in PGP (including GPG), […]
Log your IT activities in a SOC to comply with GDPR and in a local private cloud to comply with NIS.
TWITTER URGES USERS TO CHANGE PASSWORDS DUE TO GLITCH Twitter said Thursday that a glitch caused account passwords to be stored in plain text on an internal log, sending users across the platform scrambling to change their passwords. The social media company said that it found and has fixed the glitch, and its investigation shows […]
Know what Instagram knows – here’s how you download your data Instagram, the visual story-centric social media platform owned by Facebook, has now added a long-requested feature: the ability for users to download their data – including images, posts and comments. Not to be cynical, but Instagram is not making this move out of the […]
We can better exploit new opportunities when we understand what new technologies involve and how they interact. Today’s topic is what artificial intelligence and machine learning are, and an insight into how they can relate to IoT and Big Data.
Have you opened the front door for anyone who came knocking or made way for an unknown contractor? If so, you might have been victim of social manipulation-based hacking. Training, exercise and countermeasures can help, and this also applies to the Next Big Corporate hack which surely can strike even you.
State-Sponsored Cyber Actors do State-Sponsored Cyber Actor stuff US-CERT published a joint Technical Alert (TA) resulting from efforts between the Department of Homeland Security (DHS), the Federal Bureau of Investigation (FBI), and the United Kingdom’s National Cyber Security Centre (NCSC) providing information on the worldwide cyber exploitation of network infrastructure devices (e.g., router, switch, firewall, […]