There is a saying in computer science: garbage in, garbage out. When we feed machines data that reflects our prejudices, they mimic them. Does a horrifying future await people forced to live at the mercy of algorithms?
Gamification is an engaging way to motivate security operations center analysts to develop their incident response skills and situational awareness.
All leaders face the same challenge — how to lead needed changes to improve, enhance and innovate your organization. In other words, how do you make tomorrow different? Leadership is providing vision and guidance to those that you lead. If you aren’t doing that, you aren’t leading, you’re just [...]
When done right, collaboration gives the entire business everything that’s required to compete in the digital economy. So why is it managed so poorly? Read the full article at: www.digitalistmag.com
Ransomware is a type of malware or software program designed to lockup a device that is connected to the Internet, limiting access to the device and/or data in demand for a ransom. It has been around for over a decade now and cyber criminals have used that time to incorporate [...]
Exclusive research from the CIO Executive Council shines a light on how IT leaders are defining and driving IT innovation. Register now to download the free report.This research article has some interesting insights into the thinking and beliefs around defining and driving IT innovation. The principles they discuss are relevant, not just for IT, but for any organization trying to develop a culture of innovation. As mentioned in the article, “Innovation is change”. To be successful, leaders have to be change agents and develop a culture of trust, transparency and flexibility. Read the full article at: www.cio.com
Interesting guest post by Stuart Phythian World traveller, writing & researching on #futureofwork impact of #digitaltrends#tech #AI & #100yearlife This year has seen, what appears to be, an unusually high level of soothsaying predictions on technological ‘Revolutions’, and how theRead the full article at: irishtechnews.ie This is not a post that can be skimmed quickly to pick up a few main points. This one requires a full cup of coffee and some noodling time. Based on Phythian’s premises and observations, whatever conclusions you draw will not be superficial. Phythian suggests that we are experiencing a somewhat frenetic buzz about the effects of technological revolutions and the changing work place: Artificial Intelligence replacing “50% of our jobs, “emerging new business models…such as Uber and Airbnb” replacing old ones, and Millenials impacting the working landscape. While he acknowledges these concerns “may or may not be true,” he believes the frenzy “overlooks some major demographic changes occurring, both globally and in our backyards.” The post goes on to identify some of these major demographic changes and discuss their impact the future of work and our own competitiveness:“There were approximately 200,000 UK Graduates in 2016 entering the job market, whilst there were 7.7 million Chinese graduates alone, more than seven times that of 15 years earlier!”“The population of pensioners is increasing as we see the baby boomers begin to retire, putting pressure on those supporting them, either physically or fiscally. Currently, every pensioner across Europe is supported by four of working age. It’s forecast this will reduce by 2060 to one pensioner for every two of working age.”“Two-thirds of baby-boomers are now expected to live past 80 years old…It’s conceivable that a majority of children born today could live to see 100 years…This has the potential to turn-around the traditional education, work & raising a family, then retirement at 60+ into considering a working life punctuated by sabbaticals and mid-career breaks.”“Lifelong learning will be a necessity, especially in computing and related fields.”He sums up his thoughts by saying, “We are right to be aware of new technological advancements. The challenges to bear upon us are far greater, by a rapidly ageing population, increasing global competition and the life we live from cradle to grave, as we expect to live for much longer.” Maybe this one will take two cups of coffee. Contact us and we can help you sort through the technology and work place changes that currently are impacting or have the potential to impact you and your business.
The biggest hacks, data exposures, and thefts that left companies and government entities reeling.Read the full article at: www.darkreading.com A list of security breaches? Why not? People like lists. It happens every year, at the end or the beginning. Some are lists of things to do for the next year. Some are lists about the previous year -- like the 2016 best or worst songs, novels or movies. There’s a list of the world’s richest people, the most expensive universities, the cheapest cars and even a list of the largest government technology contracts. Bucket lists, most wanted lists, wish lists, Santa lists. And the list goes on. So, here is a list of the most sensational security breaches for 2016. From emails to bank accounts. From the IRS to Yahoo. From Illinois and Arizona Boards of Election to the San Francisco Municipal Transportation Agency. Data exposed, money stolen, CEO’s fired, people harmed, and, possibly, presidential elections lost. Breaches happen all over the world to all types of businesses, agencies and individuals. No one is immune. Nothing is off limits. We must be diligent and make it our responsibility to actively safeguard our personal and business data. The weakest link in a cyber security network might be the human one. Contact us and we can help you understand the risks and help you make cyber security choices that are the right ones for you and your business.
I bought my dad an Amazon Alexa device for his birthday. He surprised me when he asked, “Aren’t these smart devices the kind of thing that brought the Internet down last week?” Now that cyber criminals are targeting connected household items, people that weren’t necessarily aware of the importance of [...]
The concept of “psychology of security” is often a foreign concept to IT professionals, yet they all acknowledge that users are the biggest challenge. When hackers are unsuccessful at exploiting technical vulnerabilities, they turn their attention towards users. They scan for responses to psychological triggers and cognitive patterns that can [...]