400 Million Medical Radiological Images Exposed on the Internet

By CloudBuzz | September 18, 2019

An analysis of medical image storage systems exposed to the public web reveals that almost 600 servers in 52 countries are completely unprotected against unauthorized access. Audited systems were unpatched against thousands of vulnerabilities, more than 500 of them having

Or Lenchner

Using an IPPN to fight ad fraud: your questions, answered

By Or Lenchner | September 18, 2019

Using an IPPN to fight ad fraud It’s a well-known fact: the internet is a marketer’s dream, offering brands the chance to engage with consumers on a one-to-one basis, on a huge scale. Ads can be precisely targeted to users

Bill Headshot

How IT Operations Can Survive and Thrive in a Multi-cloud World

By Bill Talbot | September 17, 2019

IT Operations Can Thrive in a Multi-cloud World IT operations teams are contending with the reality that growing volumes of workloads are running across multiple cloud services. While multi-cloud environments are growing ubiquitous, many IT operations teams are still trying

Louis Columbus

The Truth About Privileged Access Security On AWS And Other Public Clouds

By Louis Columbus | September 16, 2019

Privileged Access Security Bottom Line: Amazon’s Identity and Access Management (IAM) centralizes identity roles, policies and Config Rules yet doesn’t go far enough to provide a Zero Trust-based approach to Privileged Access Management (PAM) that enterprises need today. AWS provides a

BBC Tech

Data on almost every Ecuadorean citizen leaked

By BBC Tech | September 16, 2019

Personal data about almost every Ecuadorean citizen has been found exposed online. Names, financial information and civil data about 17 million people, including 6.7 million children, was found by security company vpnMentor. The massive cache of data was found on an

Cisco News

What is the Current State of Cybersecurity in the Oil & Gas Industry?

By Cisco | September 13, 2019

How is cybersecurity viewed in your organization?  Do you feel like your company is well-positioned against cyber threats in your Operational Technology (OT) areas?  Is there acknowledgement that as more things and people are connected, that cyber risk will increase?

John Pientka

Mass Surveillance, Adversarial AI, in Atlanta?

By John Pientka | September 12, 2019

Mass AI Surveillance Image Source: CVDazzle The woman above is wearing hair and makeup designed to fool today’s facial recognition surveillance technology. Why worry, that’s all in China not the U.S. Uh-oh! Did you know Atlanta has the most CCTV

Reuters news

EU court says Germany has to notify EU of copyright law targeting Google

By Reuters | September 12, 2019

BRUSSELS (Reuters) – Google won a victory on Thursday after Europe’s top court said Germany has to notify the European Commission of a rule allowing publishers to demand a copyright fee from the U.S. tech giant for using news snippets.

International Data Privacy Laws

51 companies tell Congress it’s time to tackle data privacy

By CloudBuzz | September 11, 2019

Amazon, AT&T and Qualcomm are among those involved The corporate world isn’t waiting around for Congress to get started on tougher data privacy laws. A group of 51 CEOs from the Business Roundtable advocacy group, including tech companies like Amazon,

Kayla Matthews

6 Automation Struggles and How to Overcome Them

By Kayla Matthews | September 10, 2019

6 Automation Challenges Automation can help your company save time by freeing up the schedules of workers who regularly engage in repetitive tasks at while on the clock. Such technology can also streamline workflows by cutting out unnecessary steps. But,

NYT

How Each Big Tech Company May Be Targeted by Regulators

By CloudBuzz | September 9, 2019

Amazon, Apple, Facebook and Google have been the envy of corporate America, admired for their size, influence and remarkable growth. Now that success is attracting a different kind of spotlight. In Washington, Brussels and beyond, regulators and lawmakers are investigating

Vice

DMVs Are Selling Your Data to Private Investigators

By CloudBuzz | September 7, 2019

You gave them your data in exchange for a driver’s license. DMVs are making tens of millions of dollars selling it, documents obtained by Motherboard show. Departments of Motor Vehicles in states around the country are taking drivers’ personal information

The Guardian

Facebook has launched its new dating service in the US. Sounds safe, right?

By CloudBuzz | September 6, 2019

The company has touted its new privacy and security features but critics are skeptical given Facebook’s track record on user data Facebook announced on Thursday it is rolling out its newest service across the US, a platform for dating. What

Oussama El-Hilali

Hybrid or Multi-cloud? Picking the Right Cloud Strategy for an Organization’s IT Needs

By Oussama El-Hilali | September 5, 2019

Hybrid or Multi-cloud? Picking the Right Cloud Strategy Discussions around cloud migration are no longer about whether an organization should move to the cloud, but one that’s more about which data, applications and workloads should be migrated, how they should

The Verge

Google is open sourcing a tool for data scientists to help protect private information

By cloudt | September 5, 2019

Google today announced that it is open sourcing its so-called differential privacy library, an internal tool the company uses to securely draw insights from data sets that contain the private and sensitive personal information of its users. Differential privacy is

BBC Tech

YouTube fined $170m in US over children’s privacy violation

By BBC Tech | September 4, 2019

YouTube has been fined a record $170m (£139m) by a US regulator for violating children’s privacy laws. Google, which owns YouTube, agreed to pay the sum in a settlement with the Federal Trade Commission (FTC). The video-streaming site had been

Wired

Behind the Rise of China’s Facial-Recognition Giants

By Wired | September 3, 2019

Megvii, one of four highly valued Chinese facial-recognition startups, has filed for an IPO. Most of its revenue comes from surveillance and security systems. Unfamiliar faces aren’t welcome at Beijing public housing projects. To prevent illegal subletting, many have facial

Louis Columbus

Your Mobile Phone Is Your Identity. How Do You Protect It?

By Louis Columbus | September 3, 2019

Mobile Protection The average cost of a data breach has risen 12% over the past 5 years and is now $3.92M. U.S.-based breaches average $8.19M in losses, leading all nations. Not integrating mobile phone platforms and protecting them with a

Bloomberg

Huawei Accuses U.S. of Harassing Workers, Attacking Network

By CloudBuzz | September 3, 2019

Huawei Technologies Co. lashed out at the U.S. government Tuesday, accusing Washington of orchestrating a campaign to intimidate its employees and launching cyber-attacks to infiltrate its internal network. China’s largest technology company claimed the American government had instructed law enforcement

Wired

Elon Musk: Humanity Is a Kind of ‘Biological Boot Loader’ for AI

By Wired | September 2, 2019

On Wednesday, Tesla CEO Elon Musk and Alibaba cofounder Jack Ma took the stage at the World AI Conference in Shanghai to debate artificial intelligence and its implications for humanity. As expected, Ma took a far more optimistic stance than Musk.

POPULAR

Four Trends Driving Demand For Data Security

Four Trends Driving Demand For Data Security

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a ...
3 Challenges of Network Deployment in Hyperconverged Infrastructure

3 Challenges of Network Deployment in Hyperconverged Infrastructure

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, ...
Space Invaders - Is That A Selfie Drone I See Before Me?

Space Invaders – Is That A Selfie Drone I See Before Me?

Selfie Drone Privacy Issues The growing concept of privacy is one that I find very interesting and this is where ...
The Paradigm Shift In Enterprise IT Operations Management

The Paradigm Shift In Enterprise IT Operations Management

IT Operations Management Rapid change is the new constant with today’s Enterprises. There is a continuous shift in the technology ...
Securing the IIoT: Your Opportunity to be a Cyber Hero

Securing the IIoT: Your Opportunity to be a Cyber Hero

Securing the IIoT There’s tremendous potential for operational technology (OT) and information technology (IT) professionals right now, to be cyber ...