Evolving your security operations strategy to fit the cloud

By Oliver Pinson-Roxburgh, Alert Logic

The decision to move to the cloud may seem an obvious one. It’s faster, more scalable, and more agile. However, security remains a concern, and rightly so. The foundational infrastructure delivered by cloud providers is secure, but guaranteeing the protection of the applications, workloads, and data you run on top of it is your responsibility—and it isn’t one to be taken lightly.

A traditional on-premises security operations strategy simply won’t cut it anymore. In its place, you need a cloud-specific security strategy to protect your critical data from an ever-growing variety of advanced threats. Outlined in this article are four elements for any security official to consider when making the jump to a cloud system. Continue reading

Advertisements

How Artificial Intelligence is changing web writing

By Gennaro Cuofano,  WordLift

When Larry Page and Sergey Brin invented PageRank back in 1996, they had one simple idea in mind: Organize the web based on “link popularity.”

In short, in the universe of pages existing in a (at the time almost) shapeless web, Page and Brin wanted to organize that information to make it become knowledge. The logic was pretty simple, yet extremely powerful. First, if a page was connected to multiple pages, which in turn linked back to it, that page improved in relevance. Also if a page had less links from other pages, yet those pages
were more important, then it also improved the ranking of the linked page.
Continue reading

These technologies will shape 2017

By Beata Green, HeadChannel Ltd.

With a small device that fits into your pocket, you can have the world at your feet.  2016 did not revolutionise the world and you should not expect 2017 to do so either, but modern technology gives more possibilities than ever to more people than ever. If you want to make the most of 2017, get familiar with technologies that will probably influence the near future. Continue reading

The fundamental advantage of IoT

Internet Connection

By Christian Johan Smith, TrackR

I grew up in Selden, Kansas, in a family of wheat farmers. Manually harvesting wheat was an extremely tedious and laborious work, involving cutting and bundling by hand. However, this changed in the dawn of 19th century United States which saw the Industrial Revolution introduce new machines that automated tasks such as harvesting wheat. This gave farmers the opportunity to learn new skills and pursue other careers.  

Connected technologies have similarly changed the lives of people as they did a few generations ago. The way we live, work, and interact with our world has progressively modified as technologies have been integrated into all our lives. While we may be unaware of this, the number of connected devices surrounding us continually increase at an exponential rate. This layer of connected objects has been coined the “Internet of Things” (IoT). Continue reading

The chatbot approach to app development

chatbot messenger

By David Niki, Comelite IT Solutions

Chatbots are the buzzword du jour and are slated to replace service apps and websites, some believe. While it’s too early to lean make such extreme assumptions, there are intuitive ways bots can be used right now, and a proper usage can have significant impact in app development and reduce production costs.

In this article we are sharing the experience we gained during development of Universal Chat; a bot ecosystem based on Telegram’s Bot API, as well as Facebook Messenger, Skype and Slack—Universal utilizes them all. Continue reading

What are you looking at?

Human eye

By Bryn Farnsworth, iMotions

That’s been the question that has been asked by psychologists and market researchers for decades, and the answer has reliably come from eye tracking technology. Now, as more and more of the devices that we use—from our phone to our car—seek to understand how we interact with the world, eye tracking is being used more than ever.

There are a lot of things happening right now as you look at this screen: Your eyes are tracking the words, and maybe they’re searching for the header, or furtively glancing at the sidebar. This kind of information is critical to market researchers and businesses, who strive to understand how users make decisions (and which of those decisions leads to a purchase). Continue reading

The threat within: Understanding how to defend against the insider threat

Insider threat

By Gary Southwell, Seceon

The insider threat has become one of today’s most pressing cyber security concerns. In 2016, the Insider Threat Report Spotlight found seventy-four percent of organizations feel vulnerable to insider threats—a dramatic year-over-year increase. However, less than half of all organizations (42 percent) have the appropriate controls in place to prevent an insider attack. The survey also provides greater insight on the source of the threats:  “Privileged users, such as managers with access to sensitive information, pose the biggest insider threat to organizations (60 percent). This is followed by contractors and consultants (57 percent), and regular employees (51 percent).” Continue reading