Sign up | Login with →

Risk Management

How Data Will Make Air Travel Safer

March 25, 2014 by Travis Korte

Safer airtravel with better data.

Airlines and air traffic controllers use a lot of information to keep passengers safe, integrating weather readings, physical information about the plane, passenger data, and other kinds of data. But as the uncertainty surrounding Malaysia Airlines Flight 370′s disappearance confirms, better information and ways to act on it will be crucial for the future of air safety.[read more]

exclusive

Technology Training Needs a Hands-On Approach

March 4, 2014 by Paul Barsch
5

Risky Business column.

Instead of simply a “core dump” of manuals and online training courses, technical employees should also get “hands on” simulations, boot camps and courses led by advanced robo-instructors to fully hit the ground running[read more]

exclusive

Adopting a Sucessful BOYD Implementation Strategy

February 21, 2014 by Rick Delgado
1

BOYD implementation strategy.

Each year, more and more companies are allowing their employees to use their own devices in the workplace. This system, known as “Bring Your Own Device”, or BOYD, poses unique opportunities as well as certain potential problems.[read more]

exclusive

When Big Data Turns Into a Big Nightmare!

January 22, 2014 by Bernard Marr
1

The Big Data Guru column.

For most companies today, data - especially big data - is one of their biggest assets. In this article, I look at one big data company that experienced the big data nightmare of having up to 110 million customer records stolen by thieves.[read more]

Managing Cyber Security Threats from Inside

December 30, 2013 by Thu Pham
1

Cyber security threats.

The number of annual security incidents caused by insider threats is increasing. In The CERT Guide to Insider Threats, Capelli et al write, “Insider threats are an intriguing and complex problem. Some assert that they are the most significant threat faced by organizations today.”[read more]

How the Financial Services Industry Should Use Big Data to Regain Trust

December 12, 2013 by Mark van Rijmenam

regaining customer trust through big data / shutterstock

If there is any industry that can benefit from big data, it is the financial services industry. Of course the first use case that comes to mind is the ability to reduce risks, whether it be credit risk, default risk or liquidity risk. But there are many more possibilities.[read more]

exclusive

Be Wary of the Science of Hiring

December 10, 2013 by Paul Barsch
6

Risky Business column.

While reliance on experience/intuition to hire “the right person” is rife with biases, there’s also danger in over-reliance on HR analytics to find and cultivate the ultimate workforce. While HR analytics seems to have room to run, there’s still the outstanding question of whether “the numbers” matter at all in hiring the right person.[read more]

5 Webapps to Add to Your Security Tool Arsenal

November 27, 2013 by Bryan Halfpap

Your security tools.

When you’re mobile, away from the office, or just caught off-guard without your tools and security setup, you need a way to analyze, assess, and interpret emerging threats on-the-fly. That’s why these 5 free web applications are absolute must-haves for your Favorites Folder.[read more]

exclusive

Text Analytics for Tracking Executive Hubris?

November 18, 2013 by Paul Barsch

Risky Business column.

With computers reading the news, it’s more important than ever for leaders of all stripes to be cognizant that stakeholders are watching and acting on their words—often in near real time. The next audacious “off the cuff” statement your CEO makes could tank your company’s stock price in minutes.[read more]

Adobe Hack Update: 150m+ Breached Records Now Online

November 15, 2013 by Thu Pham

Although the updated Adobe hack number was last reported at 38 million users, Paul Ducklin of Sopho’s Naked Security blog has reported 150 million breached records have been found in a database dump online. While the passwords are encrypted, plaintext password hints have also been published alongside each record.[read more]

A Cautionary Tale of Data Governance

November 4, 2013 by Guy Cuthbert

interconnected world

It's many times harder to sell a potential improvement than to allay a potential risk, so perhaps the following apocryphal tale of a hypothetical global product organization might serve to highlight the potential risk, and consequential cost, of ignoring master data management in this interconnected, automated, global marketplace.[read more]

Is Data Less Secure in a Cloud Environment? [VIDEO]

October 25, 2013 by Thu Pham

data security

Online Tech’s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by dispelling the myth that data is less secure in a well-run data center or in a cloud environment. Indeed, data is more secure with a cloud hosting provider.[read more]

exclusive

Science Needs to Be Less Certain

October 21, 2013 by Paul Barsch
2

Good science isn’t without question, discovery and even a bit of “humility”—something that scientists of all stripes (chemists, mathematicians, physicists and, yes, even data scientists) should remember. So let’s encourage debate, discussion, testing and re-testing of theories.[read more]

The Biggest Threat to Cyber Security and What to Do About It

October 8, 2013 by Jon Smith

Tech leaders have long been telling anybody who will listen that the biggest cyber security threat they face is not state-sponsored, geopolitical or clandestine. It is in fact much closer to home. Accordingly, 53 per cent of senior company executives said the main risk to corporate data and computer systems is from their own employees. A case of human error, carelessness or ignorance? In some cases it’s a combination of all three.[read more]

CEOs Discuss Encryption for Healthcare [VIDEO]

October 2, 2013 by Thu Pham

“We know if your data is encrypted and the hard drive goes missing, it is not considered a breach,” says Klein. ”And you if encrypt your data, you do not have to report a data breach to the government unless you have reason to believe that the encryption keys were compromised.”[read more]