The Reality of Hacking….or a New Hacking Reality?

We live in a cyber-vulnerable world – a world governed by data. Data encapsulates almost every aspect of our personal and public life. It is heavily shared, distributed, stored and accessed, and it is constantly at risk. Recent mega-hacks, such as the ones on Target, Yahoo, and Ashley Madison, among others, demonstrate that leaking of personal information and misuse of our data are inevitable in a world that is becoming increasingly more connected and data-centric.

Cyber Insurance Uptake Hampered By Skewed Data, Poor Communication

Only 29% of US businesses have cyber insurance; Deloitte outlines steps for insurance companies to improve risk models, communication, and policy sales.

Sales of cyber insurance policies are suffering from a lack of shared data about security incidents, too few standard definitions, and not enough focus on risk mitigation for insurers or customers, according to a report from Deloitte released this week.

Cyber-attacks will require new army of ‘soldiers’ with the right skills

Viewed from afar these days, it might be easy to conclude that life in Washington, D.C., has become a reality show gone awry.

Cabinet-level nominees stepping down amid claims of wrongdoing; a president seemingly at war with the press and members of his own team; an intelligence community at odds with the source of its authority; and a bureaucratic “swamp” that refuses to be drained.

Not to be overlooked, however, are the real issues facing Congress, the White House and the nation as the hard work of governing marches on.

How We Could Close Tech’s Gender Gap in a Decade

We all know that the technology industry has a gender problem. But how do you move the needle from awareness to action?

Sheryl Sandberg, Facebook’s chief operating officer, and Girls Who Code, a nonprofit tech group, have an idea: take the fight to the states. On Friday, both will host the first-ever Girls Who Code Governor’s Summit at Facebook’s headquarters in Menlo Park, Calif. The guest list includes Govs. Mary Fallin of Oklahoma and Gina Raimondo of Rhode Island and Lt. Gov. Kim Reynolds of Iowa.

Hunting hackers: An ethical hacker explains how to track down the bad guys

When a cyberattack occurs, ethical hackers are called in to be digital detectives. In a certain sense, they are like regular police detectives on TV. They have to search computer systems to find ways an intruder might have come in – a digital door or window left unlocked, perhaps. They look for evidence an attacker left of entry, like an electronic footprint in the dirt. And they try to determine what might have been copied or taken.

Could the end of net neutrality mean the demise of IoT?

Donald Trump has now been sworn in as the 45th president of the United States of America. Along with his administration, the new president will usher in a number of drastic changes — specifically in the area of telecommunications and the world of IoT.

There is a strong possibility that the new White House administration wants to dump “Net Neutrality.” How does this impact IoT?

The Seven Dwarfisms of 2017

Economy laid flat on the long marble slab in a very large hall, dead from eating the poisoned apple while under the spell of witchcraft. The air in the hall is foggy and still; it reaches high into the rafters of this massive white marble edifice, and it is surrounded by a thick forest with cold winds blowing. The audible hisses of sorrow from the far distant make the burden of failure loud and clear.

Can Big Data Stop Bad Cops?

The Justice Department’s investigation of Baltimore police this month rebuked the agency for an entrenched culture of discriminatory policing. Deep within their findings, Justice investigators singled out a core failure: Baltimore’s system for identifying troubled officers was broken and existed in name only.

In Baltimore, Justice found that critical disciplinary records were excluded from its early intervention system, that police supervisors often intervened only after an officer’s behavior became egregious and that when they did, the steps they took were inadequate.