For years, we’ve been told that strong passwords include three things: upper and lower-case letters, numbers, and symbols. And why wouldn’t we when the National Institute of Standards and Technology (NIST) told us they were the minimum for robust passwords? Here’s why and how it involves you.
Commerce is built on the concept of the value chain. The notion that you can take something of relatively little worth and, through various processes, increase its value is fundamental to a sustainable global economy. And, in the early part of the 21st century, it is “data” that gives rise to perhaps the most significant contemporary […]
The motivational saying “Keep Calm and Carry On” does not apply to enterprise IT professionals. Not anymore, unless they have their data protection and data risk management strategies worked out. Enterprise IT is facing persistent challenges to protect their data and secure their data center against cyberattacks and ransomware.
Network automation allows IT teams to provision services instantly. This will become increasingly important as big data, analytics, machine learning and artificial intelligence make their way onto campus networks. Once connected, billions of devices will be producing huge amounts of data.
Police departments today process a tremendous amount of video footage as evidence of crimes, which includes managing and storing data and ensuring it is court admissible. Further, storage requirements for surveillance and body-worn camera data differ widely from state to state, depending on the crime.
Do you have a “bug doctor” in the house? Not the kind that chases flying and crawling insects, but the person who finds the “bugs” on your website. If you don’t you could end up like Equifax did recently, after they already had a major privacy breach just a few months ago.
As always, evolving technology and innovation continues to drive healthcare transformation, but there are a few that have become established movements in changing the healthcare landscape over this past year. 1. Data: From Acquisition To “Appification” The data lifecycle—taking raw data to innovation—is speeding up, bringing us closer to the promise of evidence-based medicine.
No business owner wants their customers’ data leaked, but no matter how well your prevention plan is, the unexpected can happen. And when it does, what will determine the fate of your business is how well you respond to it. So before you start planning an incident response, read the following story and recite this: […]
I hope you’ve enjoyed my previous blog (Part 1 of a mini-series on Blockchain for IoT Security) to get familiarize with the key attributes of blockchain. In this blog, my attempt is to explain what IoT security use cases that blockchain can address, via which attributes.