Wednesday, October 28, 2020

SECURITY

phishing attacks

Google Fights Back on Phishing

There’s an old American adage - “never bring a knife to a gun fight.”  Google proved this to be radically true after the substantial phishing attacks that cause so much damage...
neutrality

Congress Members Suggest FCC Danger Zone with Net Neutrality

Net neutrality is the byword of the month, with a series of important suggestions and announcements in recent weeks. The debate over whether the US government will continue to allow the...
verizon

Keep It Secret, Keep It Safe

“Keep it secret, keep it safe.” Gandalf uttered these words to Frodo Baggins moments after leaving him with the one Ring. These words would become Frodo’s marching orders throughout the duration...
Big Tweet is Watching You

#BigTweetisWatchingYou

In 1949, George Orwell introduced the famous phrase that causes the innate spine-tingling fear of an authoritarian, censoring, Stalinist, dictatorial, police state: “Big Brother is watching you.”  For some reason, in...

BLOCKCHAIN

metropolis upgrade

I Joined the Army

The Marvel Cinematic Universe has made quite an impression in the movie industry. Since the debut of Iron Man in May, 2008, the franchise has grossed over $12.5 billion worldwide at...
Ripple

Cryptocurrency: That’s a Big Ripple

The growth of popularity in cryptocurrencies like Bitcoin and Ethereum has been unprecedented. A recent article detailed the meteoric rise of value of Bitcoin ($100 in 2010 would be worth), and...

Finances, Blockchain and the Future of Finance

Unless you’ve been hiding under a rock in the middle of the Australian outback for the last year, you’ve certainly heard about the sudden and meteoric rise of blockchain technology and...
Nth party

The Nth party: compliance with anti-bribery and corruption laws

For Fortune Global 1000 companies with complex global footprints and multiple third party affiliations, compliance with cybersecurity regulations, including anti-bribery and corruption laws, is a challenge. Global supply chains are inevitably...
Partner Advertisement

ARTIFICIAL INTELLIGENCE

Cyber security Alexa Amazon spy private

Cyber security: How Alexa is permitted to spy on your private life

Chris Middleton explains the implications of Amazon’s latest research – and its efforts to water down consumer privacy protections. Scare stories about Amazon’s Alexa eavesdropping on customers are nothing new, and are...
fantastic view of mainframe in the data center row

UK Industrial strategy: A bold vision scuppered by incompetence

OPINION While the British government wrestles with Brexit, it has announced more details of its plans to raise R&D investment to 2.4 percent of GDP, in line with its revamped industrial...
ai painting technology

AI Fantasy Worlds

It seems that fantasy worlds are everywhere, and are now making their way into the artificial intelligence space via AI painting technology. Take the instance of two popular British novel series....

BIG DATA

ENTERPRISE APPLICATIONS