Why organizational security is at a crossroads: organizations continue to develop. Business practise metamorphoses, then inevitably the accompanying tech infrastructure grows too. That’s great, except that many companies have never been able to plan their IT growth in every detail and this is becoming quite an issue.
The big data gold rush is prompting many companies to gather as much data as possible in the hope that it might be useful in future, but often those organizations already hold a treasure trove of useful data that they’re failing to make use of – so-called ‘dark data’.
With a record nine medals hauled in at the London 2012 Olympics, Team Great Britain’s rowers have a lot to live up to at Rio this month. As you’d expect, the team has been preparing rigorously in the run-up to the Olympic Games to ensure they’re at peak fitness. But their punishing training regime, much of it carried out at high altitude in the Swiss Alps, is not the only key factor in Olympic success. Today, the team must be equally fit when it comes to using big data analytics.
How might you begin your IT security transformation? 100TB has put together some key pointers to help you come to terms with the growing threat of cybercrime, and more importantly, show you how to proactively overcome such threats.
A politician, by definition, needs to be able to connect with different groups of voters, with varying views and priorities, in order to get elected. And those seeking the ultimate political prize, the US presidency, have vast teams of political analysts, pollsters and campaign strategists, all trying to understand what those different groups want and how best to appeal to them.
In the wake of last month’s Brexit vote, the UK needs to stimulate its economy and ensure it becomes an increasingly attractive place to do business, both for home-grown and overseas companies.The UK must also improve the quality of life for citizens and focus on healing the social divisions exposed by the referendum result, particularly since it seems a significant number of people voted ‘leave’ as a general protest against political elites, growing social inequality and years of inadequate strategic planning and investment in communities and public services.
“If I’m a cyber-terrorist I’m going to hack into Nest, take its servers down for 24 hours during a cold snap in the middle of winter and wait for the pensioners to die…”
Fortunately Derek McAuley isn’t a cyber-terrorist. He’s Professor of Digital Economy at the University of Nottingham and director of the Horizon Research Institute, a respected IT expert whose career spans academia, industry and start-ups.
When people talk up the promise of open data and big data analysis, there’s invariably an elephant in the room: the thorny question of data protection. Many of the more exciting possibilities touted for the technology rely on systems being able to process sensitive data sets such as patient health records, detailed logs of people’s movements, web browsing habits, what appliances they use and when, and so on. But increasingly, people are only likely to permit this data to be processed by third parties if they can be sure it’s handled in a safe and secure manner that cannot expose any of their personal information.