Does Social Media Visualization Serve as a Primer for 5G Data Visualization?
December 01, 2019
The deployment of 5G data technology in our daily lives will be revolutionary, but this blast of speed and data will burden cybersecurity management teams and create an entirely new set of risks to handle around issues such as mobile security and integration with smart cities.
Tags: Big Data, Cybersecurity, Social
Will the Future of Authentication Run Into a Privacy Wall?
October 16, 2019
Identity authentication is absolutely necessary to conducting our affairs today. Without it, we would lose virtually all confidence to conduct business or create and foster relationships. But with ever increasing concerns related to data privacy, it is worth looking at the past to see what future challenges we may face in the digital identity space.
Tags: AI, Privacy
When Digital Identity and Access Management Meets Physical Security
October 06, 2019
Originally published on IBM's SecurityIntelligence on October 3, 2019
Where does digital security end and tangible, or physical, security begin? In today’s cybersecurity ecosystem, I’d argue that it’s all just security. In fact, if you are handling these domains in discrete silos, your cyber resilience is already taking a hit.
Tags: AI, Cybersecurity, Management, Privacy
What Does Good Cyber Resilience Look Like in 2019?
September 08, 2019
Originally published on IBM's SecurityIntelligence on September 6, 2019
The Greek philosopher Heraclitus of Ephesus once said, “πάντα χωρεῖ καὶ οὐδὲν μένει.” If you’re getting the blue screen feeling, it’s probably because that’s Greek to you. Here’s the translation: “Everything changes and nothing stands still.”
Tags: AI, Cybersecurity
Is Staff Burnout the Best Reason to Implement Cybersecurity AI?
August 18, 2019
Originally published on SecurityIntelligence on August 14th, 2019
Many in the cybersecurity workforce can’t keep up with technological change and are too busy to learn about the latest threats. Some are even so burned out that they are leaving the industry entirely. These are some of the findings of a June 2019 study by Goldsmiths, the University of London and Symantec, the results of which should not only worry those who work in the cybersecurity space, but everyone who relies on a computer to do their work.
If there wa
Tags: AI, Cybersecurity, Emerging Technology, Management
How to Reduce the Risk Posed by Vulnerable Mobile Apps
August 11, 2019
In June 2019, a study on mobile app vulnerabilities presented some incredible and worrisome findings. Most notably, high-risk vulnerabilities were found in 43 percent of mobile apps for Android and 38 percent for iOS, according to Positive Technologies. Now, consider this: In terms of market share, per IDC, Android owns nearly 87 percent and iOS owns around 13 percent.
Is It Time to Start Certifying Connected Devices?
July 30, 2019
At some point, you’ve likely seen markings and icons on an electronic device, its user manual or the box it came in. If you’re unsure what these markings are, they are almost certainly some type of certification.
Tags: Cybersecurity, IoT
Technology, the Enterprise or the User: Which Owns Mobile Security?
July 03, 2019
It’s not outrageous to suggest that you might be reading this on a mobile device. Nor is it outrageous to think that most people use a mobile device for the majority of their reading these days. I’m even writing this on a mobile device. So for those not following along, at this point, mobile security is really just security. There really isn’t any difference anymore.