security

IoT Emerge Recap

Resource Author:  Scott Allen
Resource Date:  11/15/2016
Resource Name:  SYS-Con Media
URL:   Link to Source Article or Site

IoT Emerge bounced on the scenes of Chicago this week. Yes, aside from the long awaited World Series win, an IoT conference was happening in this windy, action-packed town.

The conference boasted two days of keynotes, technical sessions, workshops, live demonstrations, hands-on training and plenty of opportunities for networking with industry peers. The IoT Emerge mission is to continue to educate and promote cross-industry functions with a focus in Industrial IoT, smart cities and IoT engineering.

Learn More

Extreme Vetting Will Require Smarter Data, DHS Expert Says

Resource Author:  Eleanor Lamb
Resource Date:  11/16/2016
Resource Name:  MeriTalk
URL:   Link to Source Article or Site

Extreme vetting will require better, smarter data, according to Donna Roy, executive director of the Department of Homeland Security’s (DHS) Information Sharing and Services Office (IS2O).

President-elect Donald Trump ran his campaign on the commitment to remove illegal Mexican residents and temporarily ban Muslims from entering the country. Extreme vetting policies would logically accompany these stringent immigration goals.

Learn More

Symantec Study Shows Consumers Suffer From Security Overload

Resource Author:  Steve Zurier
Resource Date:  11/16/2016
Resource Name:  Dark Reading
URL:   Link to Source Article or Site

New survey finds that consumers are overwhelmed by the need to protect their devices from cybercriminals.
First it was online-information overload. Now it’s security overload.

A new survey released today by Symantec found that while 79% of consumers know they must actively protect their information online, 44% felt overwhelmed by the sheer amount of data they are now responsible for protecting.

Learn More

CISOs face cyber security ‘solution overload’ challenges

Resource Author:  Sara Barker
Resource Date:  06/29/2016
Resource Name:  Security Brief NZ
URL:   Link to Source Article or Site

The Institute for Critical Infrastructure Technology’s latest report, CISO Solution Fatigue – Overcoming the Challenges of Cybersecurity Solution Overload, suggests that solution overload is plaguing organisations who are finding it difficult to identify and manage not only the cyber threats, but the strategies and solutions needed to make their roles more effective.

Learn More

Why your Company Should Consider Banning Email

Resource Author:  Stephanie Vozza
Resource Date:  02/20/2015
Resource Name:  Fast Company
URL:   Link to Source Article or Site

The negative effect of email isn’t news. The average worker spends 28% of the workday on email, and the task increases stress levels. Limiting the number of times you check your inbox reduces stress, and taking breaks has been proven to improve focus.

So why aren’t more companies adopting email-free policies? That’s a question Scott Dockter, CEO of fulfillment company PBD Worldwide answered in 2006. He and his assistant were having a lengthy email conversation going back and forth until he realized the absurdity.

Learn More

Information Overload: Turning Security Intelligence Into Actionable Wisdom

Resource Author:  Spandas Lui
Resource Date:  11/10/2015
Resource Name:  Life Hacker
URL:   Link to Source Article or Site

Security professionals are often inundated with information. They would have to sort through and distill the information to come up with intelligence that would assist them in combating cyber security. Sieving through the wave of data is challenging enough. Being able to turn the intelligence into something useful for their organisations is even tougher.

Learn More