Stories of major data breaches continue to roll in. One victim announced during the spring was hard drive maker LaCie (now owned by Seagate). In March the firm confirmed a security blog’s report that its customer data was exposed to hackers for nearly a year. For companies whose security breaches become public the result is […]

Read More

Businesses have a right to pick and choose the customers they do business with, so long as they do not violate anti-discrimination laws. And decisions by a particular firm not to cater to specific customers do not keep those customers from doing business elsewhere. But firms’ decisions about who to do business with can become […]

Read More

In George Orwell’s classic Animal Farm there is a well-known quote that sums up the issues tackled in the book: “All animals are equal, but some animals are more equal than others”. In terms of data, this is a truism: all data is equal, but some data is more equal than other data. Before expanding […]

Read More

Ransomware attacks on computers are increasing, and they can have devastating consequences. Just look at the heart-breaking story of 17-year-old Joseph Edwards, an autistic college student who killed himself after being on the receiving end of a ransomware email falsely claiming he had accessed illegal websites. These attacks can also have a considerable impact on […]

Read More

The internet has given the world many new things, including a new theatre of war. Attacks, defense and counter-attacks take place in cyberspace as much as they do on land, in the air, and at sea. So, in defense of national security, is it okay for a government to hack? Is it okay, for example […]

Read More

The US president, Barack Obama, attended a cyber security summit at Stanford University in Palo Alto, California in February. Around the same time he signed an executive order designed to encourage companies to share threat information with each other, and with the government. However, there were some big players from the tech industry missing from […]

Read More

Distributed Denial of Service attacks are on the rise. At best it might mean your website is unavailable for a couple of hours. At worst, the most malicious can cost companies thousands upon thousands of dollars. Ofer Gayer, a security researcher writing for TechCrunch tells the story of one such company. They were contacted by […]

Read More

Improved business performance has been a promise of business intelligence gathering since forever. However it is in the last two decades that the technologies and processes have progressed to a point where they are genuinely beginning to help. While the advances in technology may seem game-changing and revolutionary, Chris Adamson, CBIP, BI Specialist at Oakton […]

Read More

With the huge growth in mundane devices, everything from fridges to light bulbs, being connected and integrated with each other in the new ‘Internet of Things’ (IoT), the scope for hackers has grown right alongside with it. The new network has undoubtedly many useful conveniences in modern life; the ability to manage their own energy […]

Read More

Identity and access management (IAM) is the cornerstone of cyber security when it comes to people and systems. It ensures that only approved people can access certain resources and systems. But what happens when you add the myriad of devices that are set to become connected to the internet with the growth of the Internet […]

Read More