Lawmakers target data brokers in privacy bill
Four U.S. senators have resurrected legislation that would allow consumers to see and correct personal information held by data brokers and tell those businesses to stop sharing or selling it for...
View ArticleTwitter, to curb abuse, lets users share block lists
Twitter, to reduce abusive content on its site, is letting users share lists of the people they block, so they can more easily silence those account holders on their own profiles.
View ArticleIndustry cold on data-retention grants as analytics steams towards hot 2016
Telecommunications industry observers remain unimpressed by the lack of details in the new government program for helping Australia's telecommunications providers implement the technology required to...
View ArticlePrelude to a HACK
It all sounds harmless to post and share information, but to attackers these are great clues and can form the basis of a hack. Social engineering is a technique used as a foundational step to collect...
View ArticleStop whining – RSA Opening Keynote
The Annual RSA Conference, held at the Moscone Center in downtown San Francisco seems to have a happy knack of coming around each year just as something juicy and controversial is challenging the...
View ArticlePredictions for Big Data Analytics in 2016
One of the most common misconceptions about technology is that people will always be on the losing end of new advancements. It’s an easy assumption to make considering the number of past human...
View ArticleThreat-intelligence role grows as new threat sharing, analytics opportunities...
The recent launches of a slew of new threat-analytics services have rapidly expanded options for CSOs who are being increasingly exhorted to improve their monitoring and analysis of their ongoing...
View Article$60bn Aussie agriculture sector must be wary of ransomware, hacktivists
The FBI has issued a warning about hacker threats to US farmers that applies equally to Australian businesses that introduce networked machinery to agricultural processes.
View ArticleWhen it comes to security, Internet of Things adopters are being left to...
The breakneck growth of the Internet of Things (IoT) has taken many technology prognosticators by surprise – but there will be other, far less pleasant surprises in store if IoT manufacturers can't...
View ArticleWhen it comes to security, Internet of Things adopters are being left to...
The breakneck growth of the Internet of Things (IoT) has taken many technology prognosticators by surprise – but there will be other, far less pleasant surprises in store if IoT manufacturers can't...
View ArticleCloud plus artificial intelligence = future
Tips from KPMG on how New Zealand organisations can prepare for the next stage of cloud computing.
View ArticleBig data may show security past and present, but this Aussie pioneer sees the...
Accumulation of a growing body of data and analytics insights is rapidly progressing cybersecurity analysis from being a monitoring tool into something that can proactively predict future events, the...
View ArticleOpen-source reuse has left Android’s most-popular apps laced with critical...
CISOs may want to revisit their mobile device policies in the wake of findings that fully a third of Android-based mobile apps contain security vulnerabilities – and 43 percent of these vulnerabilities...
View ArticleFor Cisco, the future of security is being shaped by software-defined networking
Cisco Live! 2019 emphasised the role of analytics, automation, and other software in building responsive security architectures
View ArticleAnti-fraud analytics must be about prevention, not detection
Fraud is hardly a new phenomenon online, but organisations’ ability to detect and fight it has increased as ever-richer machine learning models help helping experts apply analytic techniques to detect...
View Article
More Pages to Explore .....