The pace of large-scale cyberattacks has increased to almost daily now, with the latest being word of cyberattacks against several U.S. financial institutions, and approximately 300 energy firms in Norway.
We take a closer look at the Backoff malware, and identify some possible ways of defending your organization against it.
If there is one group paying special attention to cyber-attacks today it is America's corporate directors. Stephen Boyer offers advice on how board members and security executives can have meaningful dialogue on what to do about them.
One cannot talk intelligently about big data and not be thinking of its ultimate outcome: artificial intelligence, or AI. BabyX is not a real baby but it shows us just how far AI has already come.
Every time a government agency is taken to task in a courtroom for losing files, mishandling records or mismanaging documents, department heads line up to take the stand (and sometimes the fall). So why aren't the information professionals on the hot seat too?
The top news stories for August 26, 2014.
Researchers from Tel Aviv University demonstrate how they successfully recover decryption keys by touching exposed metal parts of laptop computers.
For decades now, companies have tried to sneak information and permissions past consumers by burying it in fine print, be that in paper contracts or online terms-of-service. Look for the consumerization of analytics and big data wielding consumer groups to bring those practices to a screeching halt.
Members of the FierceBigData community with substantial experience in addressing privacy issues responded with some outstanding insights and some actionable best practices for individual researchers.
The top news stories for August 25, 2014.