Cybercriminals use sophisticated technology to rake in millions of dollars in scammed and stolen money across the globe, and cost their victims millions more to clean up the messes they leave behind. When police try to break up these online rings, they find a whole set of obstacles that are different from crimefighting in the physical world. Cybersecurity researchers Frank Cilluffo and Alec Nadeau, along with Europol Director Rob Wainwright, reviewed the multinational effort to take down a massive cybercrime network. What they learned is both surprising and immediately useful.
The deputy director of the New Jersey Office of Homeland Security and Preparedness, Steve Gutkin, explains how building strategic public and private partnerships can help protect a country’s critical infrastructure and offers pointers on nurturing such alliances.
State of Wisconsin CIO David Cagigal and CISO Bill Nash offer pointers on how a strategic CIO-CISO partnership can help drive and prioritize cybersecurity. They enumerate the elements that help drive an optimal CIO-CISO partnership and offer pointers on how to evade tensions in their relationship. They stressed that communication between their roles is vital to prioritizing cybersecurity efforts.
Microsoft is launching IoT Central today, a new Internet of Things (IoT) service that gives enterprises a fully managed solution for setting up their IoT deployments without needing the in-house expertise necessary for deploying a cloud-based IoT solution from scratch. It’s basically IoT-as-a-Service.
In addition, the company is bringing its Azure Stream Analytics to edge devices, making it easier to provision new IoT devices, and it’s launching a completely new analytics service for time series data.
When it comes to keeping confidential data locked down, it turns out that even employees trained in cybersecurity best practices still don’t always know how to protect sensitive information, according to the Dell End-User Security Survey 2017 released today.
While employees don’t want their companies to fall victim to a security breach, they also prefer to avoid security policies that limit their workplace productivity and daily activities, the survey found.
The rapid advancement of mobility in the enterprise has often outpaced the development of mobile data security best practices, and this obstacle is made more complicated by the fact that mobile devices now include emerging technology such as the internet of things. The trend has left companies — and their IT leaders — scrambling to develop mitigating mobile security technology and processes necessary to protect data.
Chinese internet giant Baidu has said it will share much of the technology it has created for its self-driving cars.
The firm predicted that the move would help drive the development of autonomous vehicles.
Called Apollo, the project will make a range of software, hardware and data services available to others, especially carmakers.
Facebook on Wednesday pulled aside the curtain on a secretive unit headed by a former chief of the Pentagon’s research arm, disclosing that the social media company is studying ways for people to communicate by thought and touch.
Researchers are training artificial intelligence to identify tuberculosis on chest X-rays, an initiative that could help screening and evaluation efforts in TB-prevalent areas lacking access to radiologists.
The findings are part of a study published online in the journal Radiology.
“An artificial intelligence solution that could interpret radiographs for the presence of TB in a cost-effective way could expand the reach of early identification and treatment in developing nations,”
Blockchain networks tend to support principles, like open access and permissionless use, that should be familiar to proponents of the early internet. To protect this vision from political pressure and regulatory interference, blockchain networks rely on a decentralized infrastructure that can’t be controlled by any one person or group. Unlike political regulation, blockchain governance is not emergent from the community. Rather, it is ex ante, encoded in the protocols and processes as an integral part of the original network architecture. To be a part of a community supporting a blockchain is to accept the rules of the network as they were originally established.
Every technology wave calls the role and value of IT into question. More than a dozen years ago it was cloud technology raising the question “Does IT Matter?” Today, digital transformation is calling the role of IT in to question. This requires the CIO and IT to write a new story about themselves and the value they bring to an organization. Before we can talk about the new story, it is important to think about past tales of IT.
Mark McDonald, a year-after-year favorite WTN Fusion speaker, created a compelling case for Information Technology’s next revolution at the recent Fusion 2017 conference. Mainframe computers, the first innovation, made Information Technology (IT) a specialty that enabled organizations to scale their operations. Client Servers, the next innovation, and the software they deployed allowed processes to be dramatically improved and automated – think ERP systems, on-line purchasing, and Human Resource systems. Next came mobile computing and the digital transformation of businesses that greatly enhanced customer experience. All of these stages were ones of mechanization, with hardware and software replacing previously manual activities.
Agriculture, manufacturing and tourism are the holy trinity of the Wisconsin economy and may always be so, given the state’s rich traditions in all three sectors.
Technology increasingly drives each of those sectors, however, and is slowly building an impressive standing of its own in terms of the jobs and value it adds to the Wisconsin economy. A recent national report makes the case.
The 2017 “Cyberstates” report from CompTIA, the nation’s largest leading tech association, showed Wisconsin cracking the 100,000-job barrier in 2016 for the first time. The report, which draws upon a mix of public and private data, counted 101,542 state tech workers last year compared with 97,633 in 2015.
Most of the world’s largest banks and financial institutions have already allocated billions of dollars to the development of Blockchain technology. The question remains, will Blockchain technology revolutionize the finance and legal industries in the same way the Internet changed the media industry, once and for all?
It looks like we can add another one to the string of IPOs that at least look like they’ve been successful — with Yext, too, popping more than 20% once its shares made their debut this morning.
Shares of Yext went as high as $14 or so after the company gave its final pricing at $11 last night — meaning it raised at least $115.5 million in its IPO.
Tech companies are pushing the Federal Communications Commission not to water down its rules on net neutrality, teeing up a confrontation between Silicon Valley and Washington as the nation’s top telecom regulator mulls a plan to undo the Obama administration’s regulations for Internet providers.
Two years ago, Charlie Miller and Chris Valasek pulled off a demonstration that shook the auto industry, remotely hacking a Jeep Cherokee via its internet connection to paralyze it on a highway. Since then, the two security researchers have been quietly working for Uber, helping the startup secure its experimental self-driving cars against exactly the sort of attack they proved was possible on a traditional one.
The 420-bed El Camino Hospital in California has seen a dramatic turnaround with is hospital fall rates, and advanced predictive analytics is getting a lot of the credit. “We were having a lot of difficulty being able to get our falls under control and at the level we wanted them, to be in the top quartile in the nation. It seemed like a lot of the efforts we tried were not getting us to where we wanted to be,” said chief nursing officer Cheryl Reinking.
The industrial Internet of Things (IIoT) is a major part of the “fourth industrial revolution”, but only 26 percent of decision makers have a well articulated digital transformation strategy.
That’s according to a 2017 Survey Report conducted at the Industry of Things World, which surveyed 1,124 decision makers. It found that most knew the importance of IIoT deployment, but were taking a ‘wait-and-see’ approach to the new technology.
Amazon is making the technology that makes its Echo line of devices so good at picking up your voice commands available to third-party device makers. That includes the microphone array that helps Echo pick up speech even in a fairly noisy room, as well as Amazon’s own proprietary software for recognizing wake words, reducing background noise and cancelling out echoes in large open rooms.