Often spoken in a single breath—security and privacy—they are nonetheless orthogonal quantities in many aspects. Enforcing security often means compromising on privacy, and vice versa: a perfectly private conversation cannot be monitored for security.
While using a virtual private network or VPN isn’t a silver bullet to online privacy threats, it still offers crucial security benefits, especially if any part of your day involves using unsecured channels such as public Wi-Fi. Given its importance, how do you pick the right one and what factors do you need to consider? […]
The movie Titanic swept the Oscars.
Michael Jordan and the Chicago Bulls were NBA champions (again).
Apple unveiled the iMac.
Larry Page and Sergey Brin founded Google.
And I was a fresh-faced kid out of college, beginning my career as a consultant for an IT management consulting firm.
The Impact that MAC Randomization has on Location Analytics
Bluetooth is a wireless personal area networking standard for exchanging data over short distances. Bluetooth low energy (BLE) (also known as Version 4.0+ of the Bluetooth specification, or Bluetooth Smart) is the power- and application-friendly version of Bluetooth that was built for the Internet of Things (IoT). The power efficiency and low energy functionality make this protocol perfect for battery operated devices.
In my last post, we introduced the concept of Data Capital and the impact it is having on every industry. Organizations everywhere have embraced the reality that data is the most valuable asset and should be supported as such. Prioritizing data as an asset is a dramatic departure from how most organizations have previously treated data.
If you’re disturbed by advertisements and “helpful” suggestions that are based on your internet browsing habits, recent research has found yet another source of online tracking. It’s a sneaky tactic that also comes with serious security concerns.
The Internet of Things – the increasingly connected world in which we live – is rapidly expanding. We love our convenient and fun devices – like personal assistants, wearables, speakers, cameras, TVs, cars, home alarm systems, toys and appliances.
With stories of large-scale data breaches and internet service providers tracking internet habits, online privacy is becoming a rare commodity. Incognito mode and private browsing features may be able to cover up your browsing history, but they don’t completely protect your online activities.
It used to be people took to Facebook to let the world know what they were doing. Some, who are a bit more private, changed their settings to let only their friends know what’s going on in their lives. But now, more and more groups are turning to a part of Facebook that’s been around for seven years.
Internet of Things (IoT) is the term du jour. As adoption increases the natural question becomes, how has it been secured? To understand an effective security strategy for IoT, we first need to understand where the value from IoT is generated. The ability to use data, collected from a variety of locations and sources, to drive decision making is a key asset of the IoT and one that will help organizations to reap the financial benefits it promises.