Category: Security

  • Survey: Millennials Don’t See Career Path in Cybersecurity

    As organizations struggle to fill cybersecurity vacancies, they aren’t finding many candidates among millennial jobseekers. A new study shows millennials are only marginally interested in cybersecurity careers, with 9 percent showing any interest at all. The finding is troubling, considering millennials have become the largest percentage of the overall workforce. This generation, which has grown up with iPhones and…

  • Big Data &  GDPR: A huge opportunity for businesses to outshine competition?

    Big Data & GDPR: A huge opportunity for businesses to outshine competition?

    With the General Data Protection Regulation (GDPR) now implemented in the European Union, companies now find themselves in the midst of an unprecedented and challenging data landscape. The affect which GDPR may have on big data and the way companies use personal information may potentially be seismic. So where do we go from here? Onwards…

  • EU privacy law enters into force, activist takes aim

    BRUSSELS (Reuters) – New European privacy regulations went into effect on Friday that will force companies to be more attentive to how they handle customer data. The ramifications were visible from day one, with major U.S.-media outlets including the LA Times and Chicago Tribune were forced to shutter their websites in parts of Europe. People…

  • Small Business Security: Protecting Customer Data

    Small Business Security: Protecting Customer Data

      In 2015, 2.5 million data security breaches occurred in the UK, 74 percent of which affected small businesses. This 14 percent increase over the number of incidents in 2014 highlights the necessity of establishing strong security measures to keep customer data safe. Get Your Act Together The Data Protection Act of 1998 states specific…

  • GDPR Drives Real Time Analytics

    GDPR Drives Real Time Analytics

    New reforms under the General Data Protection Regulation (GDPR) started as an attempt to standardize data protection regulations in 2012. The European Union intends to make Europe “fit for the digital age.” It took four years to finalize the agreements and reach a roadmap on how the laws will be enforced. The GDPR presents new…

  • 5 Lessons Companies Can Learn From Facebook’s Data Privacy Scandal

    When news broke that Cambridge Analytica illegally harvested the data of millions of Facebook users who interacted with the former company’s third-party app, the backlash was fierce. The aftermath reveals lessons all companies can learn, regardless of the extent to which they use social media. 1. Delayed Acknowledgements of Wrongdoing Make Things Worse One of…

  • Facebook’s betrayal of data privacy is a discussion that was long overdue

    Facebook’s betrayal of data privacy is a discussion that was long overdue

      In what has been termed the biggest data theft to have ever occurred, nearly 70 million people from the United States alone have had user data leaked from their Facebook profiles. In total, as much as 87 million accounts around the world have been affected, if not more. And with the growing number of…

  • Less Than Half of Enterprises Use Encryption Technology Consistently: Is Your Company One of Them?

    Less Than Half of Enterprises Use Encryption Technology Consistently: Is Your Company One of Them?

      Big data security practices take many forms. It’s up to you to choose encryption strategies that protect not only your corporation but your consumers as well. Unfortunately, even if you think you’re doing your due diligence, the odds are high that you’re falling short. Could your biggest security vulnerability lie in operational oversights? Here’s…

  • Where Should Pen Testing and Source Code Review Fit Into Your Dev Lifecycle?

    Where Should Pen Testing and Source Code Review Fit Into Your Dev Lifecycle?

      You want to create an attention-grabbing app. Armed with strong core concepts and a functional sense of purpose, you set out to capture user attention, win market share or do whatever else drives you. You’ve got motivation, but you’ll need more than that if you want people to rely on your app. You’ll have…

  • Beefing up Network Security When You’re Using IoT Devices

    Beefing up Network Security When You’re Using IoT Devices

      Network security has always been important. So has being able to keep up with change. As new technologies populate the infrastructures we rely on to do business, network administrators and stakeholders have to be ready to adjust their thinking. IoT devices drive this point home the way few other things can. The more devices…