Sign up | Login with →

Privacy

exclusive

As the Internet of Things Mobilizes, Safeguarding the Cloud Is Our Prerogative

August 6, 2015 by Daniel Matthews

Where we drive with big data now will determine our destination on the Internet of Things superhighway. Securing data on the cloud is imperative--here is a rundown on doing just that.[read more]

exclusive

It’s Your Life, Starring Your Data

July 27, 2015 by Tamara Dull
1

At a recent EPIC Champions of Freedom privacy event, Apple’s CEO Tim Cook finger-wagged some of his Silicon Valley neighbors—without mentioning names Facebook and Google—on how they were using their users’ data. “They’re gobbling up everything they can learn about you and trying to monetize it. We think that’s wrong. And it’s not the kind of company that Apple wants to be,” Cook said.[read more]

exclusive

Is Privacy Dead? And the Survey Says

July 8, 2015 by Tamara Dull
1

In today’s data economy, we’re sharing a ton of personal information about ourselves online. And this privacy discussion is only going to get bigger, especially as companies and government agencies get better at collecting, analyzing, and sometimes selling the data we’re freely sharing with them. Trust is at the heart of the privacy issue and is the glue that will keep the data ecosystem together.[read more]

The Rise and Risk of BYOD (INFOGRAPHIC)

June 19, 2015 by Chris Falgout

The BYOD trend presents its own concerns when it comes to protecting confidential workplace data. As the trend continues to gain steam, CIOs and IT departments are faced with a whole different set of variables due to the variety of devices and the relative level of security that comes with each device. The push to be able to your own mobile device to work is also a push to house personal information and apps alongside company data. It can be a risky endeavor.[read more]

Privacy Policy: 3 Things to Consider Before You Click 'I Accept'

June 15, 2015 by Sima Thakkar

As shown in the recent Oscar-winning documentary Citizenfour, people were up in arms about the NSA tapping people’s phone calls under the pretense of protecting the freedom of American citizens. Whistleblower Edward Snowden’s primary mission was to point out that personal information was unethically being handed over to the government without the permission of millions of U.S. citizens. But what about when you do give permission?[read more]

exclusive

You May Not Be as Anonymous as You Think

March 11, 2015 by Tamara Dull

The Big Data MOPS Series.

What may be classified as anonymous may, in fact, be pseudonymous. With pseudonymity, an ID or number of some sort is typically used to tie back to an individual – without revealing any PII, such as the person’s name.[read more]

exclusive

PII, Anonymized Data, and Big Data Privacy

February 12, 2015 by Tamara Dull

The Big Data MOPS Series.

Did you know that most Americans (87%) can be uniquely identified from just three pieces of personal data: a birth date, five-digit zip code and gender? Sort of disconcerting, right?[read more]

exclusive

Let’s Get Our Facts Straight About Big Data Privacy

January 28, 2015 by Tamara Dull

The Big Data MOPS Series. 

In this big data world in which we live, we are being forced to address privacy issues - whether we want to or not – as consumers, citizens, and employees in the private and public sectors. Let’s get our facts straight about big data privacy and help others do the same.[read more]

exclusive

My 7 Big Data Favorites of 2014

December 24, 2014 by Tamara Dull

The Big Data MOPS Series.

To put a nice bow on this year’s big data discussion, I’d like to share some of my favorite content from 2014 from around the web. It wasn’t easy, but I narrowed the list down to 7 items, including articles, a comic book, a white paper, an infographic, and a video. Check out the list and see what you think.[read more]

exclusive

Big Data and the Internet of Things: Two Sides of the Same Coin?

December 11, 2014 by Tamara Dull
3

The Big Data MOPS Series.

What is the relationship between big data and the Internet of Things? There is clearly a relationship between big data and IoT. The Mauritius conference helps confirm that. In fact, I would propose that big data is a subset of the IoT discussion.[read more]

Big Data Ethics and Your Privacy [INFOGRAPHIC]

November 29, 2014 by Mark van Rijmenam

Internet saturated nations

Unlike a few years ago, a lot more people understand that services like Google, Facebook or Twitter are not free of charge, but are paid for with our data. How do we feel about that? How do we feel about privacy and security? And what are some of the common Internet values related to privacy?[read more]

exclusive

Mobile Apps, Business Apps and Network Security

November 28, 2014 by Rick Delgado

mobile apps

Today’s cybercriminals are inventive. They’re creative and find an increasing number of ways to access and exploit personal and professional information. Criminals aren’t respectful of the work-life balance. If we use our personal computer at work, and then bring it home for personal use, our work information on the device is still up for grabs.[read more]

Healthcare Cloud to Grow Exponentially in US by 2020

November 25, 2014 by Natalie Lehrer

Cloud has matured from a fringe technology into being the preferred delivery model for those who want to deliver IT resources but stay within the bounds of laws such as HIPAA. At the end of 2013, Frost & Sullivan estimated that the cloud services market for healthcare IT stood at $903.1 million.[read more]

exclusive

Protecting Your Business from Shellshock

November 19, 2014 by Rick Delgado

Shellshock

Shellshock is a bug that affects the UNIX-based shell, found commonly in Linux and Apple operating systems. The vulnerability allows attackers to remotely execute code on these machines, leading to data theft, malware injection and server hijacking. Here are a few ways to protect yourself.[read more]

exclusive

Warning! When Big Data Turns Bad

November 18, 2014 by Bernard Marr

As with all game-changing technologies, Big Data has the potential to be used for evil, as well as good. There are two common ways that “bad things” will often happen: malice, or maladministration. Sometimes big data technology is misused to deliberately cause harm to others, and sometimes it is simply used incorrectly, therefore causing harm.[read more]