Sign up | Login with →

Privacy

The NSA, Link Analysis and Fraud Detection

July 25, 2013 by Dean Abbott

The recent leaks about the NSA’s use of data mining and predictive analytics has certainly raised awareness of our field and has resulted in hours of discussions with family, relatives, friends and reporters about what predictive analytics can (and can’t) do with phone records, emails, chat messages, and other structured and unstructured data.[read more]

Encrypting Data for Data Breach Prevention

July 23, 2013 by Thu Pham
2

The State of California released a report on 2012 data breaches that found 1.4 million residents would have had their information protected if companies had encrypted data in transit when sent from their company’s network. The report showed 131 data breaches affected 2.5 million Californians, as well as listing recommendations of how to avoid loss or theft of data.[read more]

What Data Do the Five Largest Tech Companies Collect? [INFOGRAPHIC]

July 21, 2013 by Mark van Rijmenam

What's Google got on you?

Big Data brings big privacy issues. Baynote has created an infographic that shows the vast amounts of different types of data collected by the five largest tech companies in the world -- Google, Apple, Facebook, Yahoo! and Amazon -- ranging from search queries, profile information to even your phone number.[read more]

HIPAA Violations Cost Health Insurer $1.7 Million: Lessons Learned

July 20, 2013 by Thu Pham

HIPAA cautionary tale

Reuters reports that WellPoint, Inc., the second largest U.S. health insurer, has reached a $1.7 million settlement with the Dept. of Health and Human Services as result of a data breach that exposed over 600k health records. Read on for possible technical and strategic security solutions to avoid a similar fate.[read more]

exclusive

What Is the Government Really Collecting From Your Phone? [INFOGRAPHIC]

July 12, 2013 by Philip Cohen

NSA & phone data

Now that the entire world knows that the US government is collecting information from its citizens' phones, you have to wonder how agencies like the NSA and Homeland Security plan to use that info. This infographic takes a somewhat whimsical look at the kinds of data the NSA is collecting.[read more]

Have Marketers Taken Big Data Too Far?

July 10, 2013 by Josh Polsky

Big Data paranoia? (photo: motifake.com)

Paula Rosenblum writes a fun piece regarding the creepiness of retailers using their Big Data. In it, she contends that targeting our past purchases to send us relevant offers is smart business, but that the use of retargeting tools and practices is downright creepy. But how creepy is it really?[read more]

Big Data: Transforming Information Security [VIDEO]

June 27, 2013 by Mark van Rijmenam

Eddie Swartz, Chief Security Officer of RSA

Eddie Swartz, Chief Security Officer of RSA, the Security Division of EMC, talks about how big data is transforming information security. He touches on four different topics within information security that can be approved thanks to big data.[read more]

Big Data Benefits versus Big Risks [VIDEO]

June 17, 2013 by Mark van Rijmenam

Big Data risks

The recent revelations about the NSA’s secret program makes people aware of the world of big data and the thin line between the benefits and privacy concerns related to big data. The challenge is to get all the great benefits from big data, while finding a balance with the loss in privacy.[read more]

Why, What and How to Encrypt: Security Expert Insights

June 15, 2013 by Thu Pham

Not sure if your organization’s sensitive data is properly encrypted? It’s time to be sure. Chris Heuman, Practice Leader for RISC Management and Consulting, broke down the reasons why (and how) in the latest webinar hosted by Online Tech. Here's a brief summary of his presentation.[read more]

How Big Data Analytics Reveal Your Most Intimate Secrets

June 13, 2013 by Bernard Marr
1

Big Data Analytics: what do your Likes reveal?

Big Data Analytics allow us to automatically analyze digital records such as our updates, photos and ‘Likes’ on Facebook. But did you know that your 'Likes' on Facebook could expose intimate details about you as well as personality traits you might not want to share with anyone?[read more]

Big Data Ethics: Vendors Should Take A Stand

June 13, 2013 by Timo Elliott

Tip of the Big Data iceberg

We’ve only seen the tip of the iceberg when it comes to “big data analytics.” We can now gather, correlate, and analyze information in ways that were unthinkable in the past. However, with great power comes great responsibility. Analytics is a very powerful weapon, and weapons can be abused.[read more]

Perils of Big Data: US Government Collecting Customer Data from Verizon

June 8, 2013 by Mark van Rijmenam

Video interview on perils of Big Data

Under a top secret court issue, the telephone records of millions of Verizon customers have been stored and analyzed by the NSA. Is Verizon the only company that has to give the data or are other companies doing the same? Check out this ReutersTV video to learn more about it.[read more]

A Quick Tech Tutorial: Two-Factor Authentication

June 1, 2013 by Thu Pham

Two-factor authentication tutorial

Two-factor authentication is a best practice to fulfill authorization and authentication requirements for HIPAA compliance or PCI DSS compliance and can protect your data and business. Want more details? Online Tech’s Technical Team shares this quick tutorial on two-factor authentication.[read more]

Big Data Today: Living as Far from 1984 as Orwell

Big Data, or Big Brother? / shutterstock

Over the last month I’ve been talking a lot about personally controlled records and the ownership of your own information. On the one hand, we want to be provided with better services and to be protected from danger. On the other, we don’t want our personal freedoms to be threatened.[read more]

Seek and Destroy: U.S. Energy Firms Warned of Recent IT Threats

May 14, 2013 by Thu Pham

IT threats / shutterstock

The U.S. government released a warning about the increasing risk of cyber attacks targeting critical energy corporations. While the majority of previous attacks have involved stealing trade secrets, the newest threats appear to be motivated by the intention to shut down industrial machinery and energy delivery.[read more]