Making sense of “big data” from identity management

Making sense of “big data” from identity management

Originally posted on Technology News:

identity theft

Providing employees with access to applications and information is a complex operational challenge. Users require broad and varied access to be productive, but that incurs risk. IT must control access, enforcing the principle of “least privilege” in the face of compliance regulations and the threat of security breaches.

Do it right and business runs…

View On WordPress

Most USB devices have a fundamental security weakness that can be exploited to infect computers with malware

Most USB devices have a fundamental security weakness that can be exploited to infect computers with malware

Originally posted on Technology News:

usb-drive

The problem is that the majority of USB thumb drives, and likely other USB peripherals available on the market, do not protect their firmware—the software that runs on the microcontroller inside them, said Karsten Nohl, the founder and chief scientist of Berlin-based Security Research Labs.

This means that a malware program can replace the firmware on a…

View On WordPress

Hackers are succeeding with what appears to be alarming regularity.

Hackers are succeeding with what appears to be alarming regularity.

Originally posted on Technology News:

hacker

In the ongoing cat-and-mouse game between malicious hackers and their targets – any individual, company, agency or government with information that might be profitable or useful – the bad news for the “mice” arrives with alarming regularity.

It is not just Target, although the breach late last fall of 40 million credit card numbers and 70 million…

View On WordPress

what can you do to survive when Data Breach happens to you?

what can you do to survive when Data Breach happens to you?

Originally posted on Technology News:

password

If someone with the proper motive and means (time, money, and resources) wants what you have badly enough, they are going to get it. Many companies fail to prepare for a breach until it’s too late. Unfortunately, there is not a true, tested method for preventing and/or stopping a breach. How does one survive the inevitable?

First, you had better know…

View On WordPress

Automotive Industry To Adopt Five Principles For Building Safer Computer Systems In Vehicles

Automotive Industry To Adopt Five Principles For Building Safer Computer Systems In Vehicles

Originally posted on Technology News:

Security1

The group is operating under the name I Am the Cavalary and includes researchers and others concerned about the security of devices that have a direct impact on public safety. Over the last few years, a growing number of security researchers have investigated potential vulnerabilities in the electronic devices built into modern cars to control everything…

View On WordPress

Payment cards with chips aren’t perfect

Payment cards with chips aren’t perfect

Originally posted on Technology News:

smart chip

There’s a push to adopt chip-equipped payment cards in the U.S. following high-profile breaches at large retailers and restaurant chains during the past 12 months, but experts warn that switching to this payment system will not make fraud disappear.

The EMV (Europay, MasterCard and Visa) standard is widely deployed around the world, and for the past 10…

View On WordPress

Android Apps Vulnerable To Cyberattack, Researchers Claim

Android Apps Vulnerable To Cyberattack, Researchers Claim

Originally posted on Technology News:

Android

The majority of Android’s most popular apps are susceptible to SSL vulnerabilities, according to new research.

Google’s Android operating system is an open-source, free framework which appeals to developers due to this unrestrictive nature. However, with such an open and free system, there is always the potential for abuse, a lack of patching and security…

View On WordPress

IT outages are an ongoing problem for the U.S government

IT outages are an ongoing problem for the U.S government

Originally posted on Technology News:

us-government

When Healthcare.gov was launched last October, it gave millions of Americans direct experience with a government IT failure on a massive scale. But the overall reliability of federal IT operations is being called into question by a survey that finds outages aren’t uncommon in government.

Specifically, the survey found that 70% of federal agencies have…

View On WordPress

Death Knell for Bring Your Own Device (BYOD)?

Death Knell for Bring Your Own Device (BYOD)?

Originally posted on Technology News:

BYOD-1

“I think this is going to be a deal killer for a lot of companies, especially those that have a significant California employee base,” Park says. “This is the first real ruling that has been binding in the BYOD space.”

As in just about every case intersecting technology and the law, there is a lot of vagueness to this ruling. For instance, the case…

View On WordPress

Commonly Held Yet Mistaken Assumptions About What Big Data Can Do For You And Your Business

Commonly Held Yet Mistaken Assumptions About What Big Data Can Do For You And Your Business

Originally posted on Technology News:

big-data

Big data – and all of its analysis tools, commentary, science experiments and visualizations – can’t tell you what will happen in the future. Why? The data you collect comes entirely from the past. We’ve yet to reach the point at which we can collect data points and values from the future.

We can analyze what happened in the past and try to draw trends…

View On WordPress