Digital Assistants Could Be Amongst the Hottest Selling Items on Amazon Prime Day, But Security Fears Are Still Putting Some Consumers Off

Digital Assistants Could Be Amongst the Hottest Selling Items on Amazon Prime Day, But Security Fears Are Still Putting Some Consumers Off

| | Data Security
In June, Microsoft issued a patch for Cortana to solve a vulnerability whereby threat actors could access devices by activating... The post Digital Assistants Could Be Amongst the Hottest Selling Items on ...

Need for Speed: Optimizing Data Masking Performance and Providing Secure Data for DevOps Users

Let’s start with a pretty common life experience — you identify a need (e.g., transportation), you evaluate your options (e.g., evaluate car manufacturers, various features, pricing, etc.), and you decide to purchase ...
Roadmap for the Data Gold Rush: Maintaining Qualitative Data in the IoT Environment

Roadmap for the Data Gold Rush: Maintaining Qualitative Data in the IoT Environment

| | Data Security
We have come a long way since the GPS watch. Now cities like Barcelona use sensors to monitor everything from... The post Roadmap for the Data Gold Rush: Maintaining Qualitative Data in ...
Larry Seltzer's 'Data encryption: How To Avoid Common Workarounds'

Larry Seltzer’s ‘Data encryption: How To Avoid Common Workarounds’

via the inimitable Larry Seltzer, comes this superlative post over at HPE; in which, Mr. Seltzer details data encryption workarounds, and a method to avoid same. Definately, today's Must Read ...
Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke

Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke

| | Data Security
The Internet of Things (IoT) is very crowded. Connected devices outnumber people. The United Nations estimates the current world population... The post Knock, Knock; Who’s There? – IoT Device Identification & Data ...
Trusting in technology: the need for greater assurance in connected health

Trusting in technology: the need for greater assurance in connected health

| | Data Security
Whether offering instant access to patient records, allowing remote diagnosis of treatment, or giving access to lifestyle management and monitoring... The post Trusting in technology: the need for greater assurance in connected ...
Optimizing A Monitoring System: Three Methods for Effective Incident Management

Optimizing A Monitoring System: Three Methods for Effective Incident Management

Picture this: You’ve just returned from a well-deserved vacation and, upon opening up your security monitoring system you’re faced with the prospect of analyzing thousands of events. This isn’t an imaginary scenario, ...
Tokenization: Ready for Prime Time

Tokenization: Ready for Prime Time

| | Data Security
The digital transformation has changed how the world does business. It has created whole new enterprises and industries, but it... The post Tokenization: Ready for Prime Time appeared first on Data Security ...
Use Redis? There's a Good Chance It's Been Co-Opted

Use Redis? There’s a Good Chance It’s Been Co-Opted

Open source databases may have a problem. For the second time in just three years, a popular open-source database has become infected, on a massive scale, with cryptocurrency-related malware. In late 2016, ...
Loading...