Tag: security

Why companies need to lock down IoT systems

Why companies need to lock down IoT systems

During the last few years, malicious IoT hacks have grown exponentially with no immediate signs of slowing, while hackers relentlessly pursue new and creative ways to attack and exploit organizations. According to the FBI, within the past six years, attackers have amassed $144 million in ransomware payments alone – and each new attack costs more than the last.

Your Newest Cybersecurity Professional Is Already in Your Company

Your Newest Cybersecurity Professional Is Already in Your Company

The cybersecurity talent gap is real. The 2019/2020 Official Annual Cybersecurity Jobs Report predicts that there will be 3.5 million security jobs left unfilled globally by 2021.

235 Million Instagram, TikTok And YouTube User Profiles Exposed In Massive Data Leak

235 Million Instagram, TikTok And YouTube User Profiles Exposed In Massive Data Leak

Data – The security research team at Comparitech today disclosed how an unsecured database left almost 235 million Instagram, TikTok and YouTube user profiles exposed online in what can only be described as a massive data leak.

There Is No Cloud Security Market Segment

There Is No Cloud Security Market Segment

Yes, there are plenty of security solutions that protect cloud assets, but there is no cloud security segment in the Directory published in Security Yearbook 2020.

How Customer Data Platforms Play A Role In Securing Big Data

How Customer Data Platforms Play A Role In Securing Big Data

Big Data – A new market research report shows that by 2027, the overall big data security market will grow to $64.4 billion. It’s not surprising. Some reports estimate 90 percent of all global data ever created was created in just the past few years. That’s good news for marketers looking to gain insights into…
Read more

Cloud-Native Security Threats And Pitfalls: What's Your Last Line Of Defense?

Cloud-Native Security Threats And Pitfalls: What’s Your Last Line Of Defense?

It’s time to rethink legacy backup and recovery systems when you go cloud-native, and portability is key. Cloud – Kubernetes is innovative, but it’s not bulletproof. On June 2, a team of plugin developers working with the Jenkins Artifactory system discovered an error in a Kubernetes deployment they were using. It was serious enough to…
Read more

This Secret $35 Million FBI Unit Mixes Facial Recognition With Big Data To Investigate America’s Most Horrific Crimes

This Secret $35 Million FBI Unit Mixes Facial Recognition With Big Data To Investigate America’s Most Horrific Crimes

Big Data – In the wake of a mass shooting or terror attacks investigators can be left with hours of CCTV footage, video from witnesses, or clips from social media. Take the Boston Marathon bombing in 2013, where the FBI received over 13,000 videos and had 120 analysts probe them all for clues.

Crypto scammers hack Elon Musk, Biden, Obama, and Kanye on Twitter

Crypto scammers hack Elon Musk, Biden, Obama, and Kanye on Twitter

Accounts belonging to Apple, Bill Gates and Jeff Bezos were also hit. Hackers promoting crypto scams took over a number of high-profile Twitter accounts Wednesday, including Bill Gates, Kanye West and Elon Musk, who has been a frequent target of would-be crypto scammers. Joe Biden’s account was also briefly taken over, as was Barack Obama’s. Accounts…
Read more

As We Return To Work It’s Time For Clear Thinking On Cloud Security

As We Return To Work It’s Time For Clear Thinking On Cloud Security

‘Building the plane while flying it’ is a Silicon Valley idiom that has probably felt a bit too real for the UK’s hardworking IT teams these last few months, faced, as many have been, with a sudden need to enable a remote workforce and ensure business continuity. The use of cloud services has soared, connecting…
Read more

Next Window Please!

Next Window Please!

It is amazing how MQ has managed to stay relevant over all of these years. Looking back to when it first came out in the 1990’s, we were dealing with 2400 baud modems connected to remote locations running a number of different technologies, over spotty telephone lines using token ring protocols. Computing power of the…
Read more