A Verizon report highlights how big data complexity and a shortage of data science talent are hurdles for an IoT implementation, but we also have to remember the key best practice of having a business goal as part of any analytics initiative.read more
When a cyberattack occurs, ethical hackers are called in to be digital detectives. In a certain sense, they are like regular police detectives on TV. They have to search computer systems to find ways an intruder might have come in – a digital door or window left unlocked, perhaps. They look for evidence an attacker left of entry, like an electronic footprint in the dirt. And they try to determine what might have been copied or taken.read more
Intel, the world’s largest computer chip manufacturer, will invest $7 billion to finish a factory in Arizona, adding 3,000 jobs, the company’s chief executive said on Wednesday after meeting with President Trump at the White House.
The completion of the factory, which will complement two other Intel semiconductor plants in Chandler, Ariz., had been under consideration for several years.read more
Demisto, which helps automate Security Operations Centers (SOC), announced today that is has raised $20 million in new funding.
The Cupertino, Calif.-based startup has developed DBot, a chatbot that automates a security analyst’s simple tasks and facilitates collaborations across different teams in real time for better management and response to attackread more
Jawbone might pivot to the medical industry as it exits the consumer market, according to people close to the company. It has already sold all its assets for the Jambox speaker business, and has heavily reduced its customer support staff.read more
We live in a data-driven world. From social media to smart cities to the internet of things, we now generate huge volumes of information about nearly every detail of life. This has revolutionized everything from business to government to the pursuit of romance. We...read more
Wisconsin has a strong tradition of entrepreneurship. Think of the marquee companies that remain the state’s economic “calling cards” – Oshkosh Corp., S.C. Johnson, Johnson Controls, Manitowoc Co., Harley-Davidson, Briggs & Stratton, Johnsonville, Kohler, Kohl’s and Quad Graphics. These companies all have one thing in common: They were named after the Wisconsin community of their founding or the last names of their founders.read more
It’s a good time for healthcare IT professionals who have developed their skills. Not only are they in demand by healthcare providers, they are also attractive to employers outside healthcare.read more
You may have heard that President Trump’s new FCC chairman, Ajit Pai, is a critic of the government’s net neutrality rules — the regulations barring Internet providers from blocking or slowing down your websites.read more
The new initiative aims to takes the guesswork out readiness, articulating threats, mapping them to CSF controls and giving healthcare organizations a blueprint for better cybersecurity posture.read more
A new trends report published by the law firm Cooley report suggests that the venture market remains largely healthy for now. In the fourth quarter, for example, Cooley handled 187 “disclosable” (versus stealth) deals that represented more than $2.7 billion of invested capital. That’s 18 percent more deals than it closed in the fourth quarter of 2015 — though the amount of money involved fell 23 percent of the year-earlier period. (VCs were writing smaller checks into a greater number of startups.)read more
Passwords are far from dead – thanks to the Internet of Things, the traditional authentication mechanism will explode in the next decade.
By 2020, the exchange of data between systems will require more than 300 billion human and machine passwords to authenticate, according to a new report out today that concludes that the growth of internet of things (IoT) devices and online accounts will drive this password explosion.read more
The past year has marked a dark time in cybersecurity globally. 2016 started off with @DotGov hackers doxxing thousands of U.S. federal employees; proceeded to the Anonymous breach of the Philippine Commission on Elections exposing personal identification information on every voter in the entire country and progressed to news of massive — and previously unreported — user-information theft from LinkedIn, Yahoo, Dropbox, and Oracle.read more
Many elements make up a thriving entrepreneurial economy. Among them are cultures that reward risk and don’t penalize honest failure; workers who are diverse in terms of skills and training; clusters of innovation in cities or universities; and access to capital.
Just as high on the list is a regulatory climate that encourages the free flow of talent and that lowers barriers to entry into the startup economy.read more
As a new presidential administration takes over, it will need to pay significant attention to cybersecurity. Indeed, we’ve already been told to expect “a comprehensive plan” for cybersecurity in the first few months of the new administration. But as a professional who has long been part of the global internet security community, I am pessimistic that the typical government and individual plans or responses to our ongoing cybersecurity concerns actually will lead to meaningful improvements.read more
It never fails that the greatest innovations often come wrapped in obscurity and misunderstanding. I can imagine a scene in which the first wheel was met with head scratching, confusion, and comments along the lines of, “Yeah, but it’s going to keep rolling away on us! Square wheels are so much more predictable.”read more
The military’s most prolific leaker of digital documents has ushered in an age of even more increased surveillance over government workers. The legacy of Chelsea Manning’s actions is under discussion in the wake of the announcement that the former Army private will be released from military prison in May. In one of his last official acts, President Obama commuted her sentence for violations of the Espionage Act and copying and disseminating classified information.read more
Google says it provided tips and recommendations to over 90,000 developers on how they can fix security flaws in their applications before uploading their apps to Google Play.read more
Just catching up on some recent topics…
Following a Dec. 29 column on the pros and cons of toll roads, an attentive reader noted that tolls need not apply to all lanes on a stretch of freeway. In Colorado, for example, express lanes in parts of the Interstate Highway system help manage congestion and speed up travel for motorists. Drivers who choose to pay the toll can use express lanes in the Denver area that are otherwise reserved for buses and carpools.read more
One of the promises that virtual reality offered was that we’d all be able to watch “courtside” sports games without having to leave our couches. Sporting event organizers from the Rio Olympics to the British Premier League have touted the new technology as a way to be there without having to deal with the expense, travel and crowds of an actual game.read more