By Oliver Pinson-Roxburgh, Alert Logic
The decision to move to the cloud may seem an obvious one. It’s faster, more scalable, and more agile. However, security remains a concern, and rightly so. The foundational infrastructure delivered by cloud providers is secure, but guaranteeing the protection of the applications, workloads, and data you run on top of it is your responsibility—and it isn’t one to be taken lightly.
A traditional on-premises security operations strategy simply won’t cut it anymore. In its place, you need a cloud-specific security strategy to protect your critical data from an ever-growing variety of advanced threats. Outlined in this article are four elements for any security official to consider when making the jump to a cloud system. Continue reading
By Gennaro Cuofano, WordLift
When Larry Page and Sergey Brin invented PageRank back in 1996, they had one simple idea in mind: Organize the web based on “link popularity.”
In short, in the universe of pages existing in a (at the time almost) shapeless web, Page and Brin wanted to organize that information to make it become knowledge. The logic was pretty simple, yet extremely powerful. First, if a page was connected to multiple pages, which in turn linked back to it, that page improved in relevance. Also if a page had less links from other pages, yet those pages
were more important, then it also improved the ranking of the linked page. Continue reading
By Beata Green, HeadChannel Ltd.
With a small device that fits into your pocket, you can have the world at your feet. 2016 did not revolutionise the world and you should not expect 2017 to do so either, but modern technology gives more possibilities than ever to more people than ever. If you want to make the most of 2017, get familiar with technologies that will probably influence the near future. Continue reading
By Christian Johan Smith, TrackR
I grew up in Selden, Kansas, in a family of wheat farmers. Manually harvesting wheat was an extremely tedious and laborious work, involving cutting and bundling by hand. However, this changed in the dawn of 19th century United States which saw the Industrial Revolution introduce new machines that automated tasks such as harvesting wheat. This gave farmers the opportunity to learn new skills and pursue other careers.
Connected technologies have similarly changed the lives of people as they did a few generations ago. The way we live, work, and interact with our world has progressively modified as technologies have been integrated into all our lives. While we may be unaware of this, the number of connected devices surrounding us continually increase at an exponential rate. This layer of connected objects has been coined the “Internet of Things” (IoT). Continue reading
By David Niki, Comelite IT Solutions
Chatbots are the buzzword du jour and are slated to replace service apps and websites, some believe. While it’s too early to lean make such extreme assumptions, there are intuitive ways bots can be used right now, and a proper usage can have significant impact in app development and reduce production costs.
In this article we are sharing the experience we gained during development of Universal Chat; a bot ecosystem based on Telegram’s Bot API, as well as Facebook Messenger, Skype and Slack—Universal utilizes them all. Continue reading
By Bryn Farnsworth, iMotions
That’s been the question that has been asked by psychologists and market researchers for decades, and the answer has reliably come from eye tracking technology. Now, as more and more of the devices that we use—from our phone to our car—seek to understand how we interact with the world, eye tracking is being used more than ever.
There are a lot of things happening right now as you look at this screen: Your eyes are tracking the words, and maybe they’re searching for the header, or furtively glancing at the sidebar. This kind of information is critical to market researchers and businesses, who strive to understand how users make decisions (and which of those decisions leads to a purchase). Continue reading
By Gary Southwell, Seceon
The insider threat has become one of today’s most pressing cyber security concerns. In 2016, the Insider Threat Report Spotlight found seventy-four percent of organizations feel vulnerable to insider threats—a dramatic year-over-year increase. However, less than half of all organizations (42 percent) have the appropriate controls in place to prevent an insider attack. The survey also provides greater insight on the source of the threats: “Privileged users, such as managers with access to sensitive information, pose the biggest insider threat to organizations (60 percent). This is followed by contractors and consultants (57 percent), and regular employees (51 percent).” Continue reading