As ubiquitous computing continues to become the focal point of our daily lives, it is more important than ever to make decisions about the scope of data people unknowingly share. With wearable technology, users are enjoying the comfort that comes through ambient intelligence. However, they also risk potentially exposing their private data to nefarious actors. For example, a … [Read more...] about Why We Need to Rethink Security for Wearable Tech
security
Data Security, Data Ethics, and Data Ownership
I. The problem(s) Data security represents one of the main problems of this data yield generation, since a higher magnitude of data is correlated with a loose control and higher fraud probability, with a higher likelihood of losing own privacy, and becoming targets of illicit or unethical activities. Today more than ever a universal data regulation is needed and some steps have … [Read more...] about Data Security, Data Ethics, and Data Ownership
5 Multi-factor Authentication Strategies Enterprises Can Use
In 2016 alone, more than 2.2 billion records were exposed in data breaches. Using a password-based authentication with a good hashing scheme like Bcrypt is perfectly fine as long as you can guarantee that your users wont use easy to guess passwords or reuse passwords at many portals. Both of these assumptions turn out to be wrong in a substantial number of cases, however. There … [Read more...] about 5 Multi-factor Authentication Strategies Enterprises Can Use
5 Reasons Why Enterprises Are Embracing OSS
Enterprises are often characterized as repulsive to open source software, both in usage and offerings. Building enterprise software is not only about building software, but also about building processes. Open source software usually lacks long-lasting patrons that can provide support to such processes and thus present itself as a serious contender to proprietary offerings. … [Read more...] about 5 Reasons Why Enterprises Are Embracing OSS
3rd Annual Middle East Cyber Security Summit
With growth in demand for data centers and managed and cloud services expected to be in the double and triple digits, there appears to be significant opportunity in this segment of Saudi Arabia's ICT market. Pressure on departmental expenditures in the public sector and a subsequent slowing of growth in the private sector could act as drivers for this expansion as customers … [Read more...] about 3rd Annual Middle East Cyber Security Summit