IoT Emerge bounced on the scenes of Chicago this week. Yes, aside from the long awaited World Series win, an IoT conference was happening in this windy, action-packed town.
The conference boasted two days of keynotes, technical sessions, workshops, live demonstrations, hands-on training and plenty of opportunities for networking with industry peers. The IoT Emerge mission is to continue to educate and promote cross-industry functions with a focus in Industrial IoT, smart cities and IoT engineering.
Extreme vetting will require better, smarter data, according to Donna Roy, executive director of the Department of Homeland Security’s (DHS) Information Sharing and Services Office (IS2O).
President-elect Donald Trump ran his campaign on the commitment to remove illegal Mexican residents and temporarily ban Muslims from entering the country. Extreme vetting policies would logically accompany these stringent immigration goals.
New survey finds that consumers are overwhelmed by the need to protect their devices from cybercriminals.
First it was online-information overload. Now it’s security overload.
A new survey released today by Symantec found that while 79% of consumers know they must actively protect their information online, 44% felt overwhelmed by the sheer amount of data they are now responsible for protecting.
The Institute for Critical Infrastructure Technology’s latest report, CISO Solution Fatigue – Overcoming the Challenges of Cybersecurity Solution Overload, suggests that solution overload is plaguing organisations who are finding it difficult to identify and manage not only the cyber threats, but the strategies and solutions needed to make their roles more effective.
The negative effect of email isn’t news. The average worker spends 28% of the workday on email, and the task increases stress levels. Limiting the number of times you check your inbox reduces stress, and taking breaks has been proven to improve focus.
So why aren’t more companies adopting email-free policies? That’s a question Scott Dockter, CEO of fulfillment company PBD Worldwide answered in 2006. He and his assistant were having a lengthy email conversation going back and forth until he realized the absurdity.
Security professionals are often inundated with information. They would have to sort through and distill the information to come up with intelligence that would assist them in combating cyber security. Sieving through the wave of data is challenging enough. Being able to turn the intelligence into something useful for their organisations is even tougher.