In the wake of the Federal Communications Commission’s announcement to repeal the 2015 net neutrality laws in the United States, there has been an air of general confusion and disappointment among the American public. Ajit Pai’s stubborn determination to completely...
Privacy / Security
Recent Articles
6 methods to create a secure password (you’ll remember) – Infographic
Passwords are not just random texts that you need to gain access to your online accounts. These can completely change your life for the worse if they had gotten into the wrong hands. An average person spends about 11 hours online each day. They chat with their...
Facebook’s betrayal of data privacy is a discussion that was long overdue
In what has been termed the biggest data theft to have ever occurred, nearly 70 million people from the United States alone have had user data leaked from their Facebook profiles. In total, as much as 87 million accounts around the world have been affected, if not...
Can blockchain solve the riddle of big data regulations
Like many of the technological shifts of the past two years, the world of big data has marked a paradigm shift in how information is collected and stored across the world. Not surprisingly, legislation has fallen behind technology in this regard, but it's aiming to...
What does General Data Protection Regulation (GDPR) mean for you?
The General Data Protection Regulation, or GDPR enforcement date, is quickly closing in. It’s a sweeping and relatively new form of legislation that will change the current landscape considerably. How so? Well, it puts a lot of pressure on organizations to bolster...
US data breaches have hit an all-time high – How to protect your business
2017 was one of the worst years for data breaches yet, and it’s only downhill from here. Here’s what you need to do to prepare yourself. These days, it seems like it’s no longer a question of if your personal information will wind up in the hands of hackers, but when....
Improving cryptocurrency security: Bitcoin Gold case study
After the second Bitcoin fork creating a new cryptocurrency, Bitcoin Gold (BTG), it became the victim of aDistributed Denial of Service (DDoS) attack. The DDoS attack of Bitcoin Gold caused it to go offline at a very critical moment in the new cryptocurrencies...
77 interesting facts about cyber crimes one should know in 2018 (Infographic)
As a society, we cherish our right to privacy probably more than anything else. Sharing is great, and we all enjoy it, but there is always that other side, the untold story, the personal, the secret. Now, let’s extrapolate this to a societal level. How many...
How to use big data to successfully fight credit card fraud
Technology vs credit card fraud is a never-ending battle, in which the stakes are high. Hackers are creating new sophisticated techniques to illicitly obtain credit card information and use it to satisfy their financial needs. To avoid losing billions of dollars,...
Data breaches are inevitable — or are they? [Infographic]
A data breach can take a toll on a company of any size. Here’s a look at some significant data breaches, tips to protect your business, and what to do in the event of a data breach. This infographic originally appeared here. Republished with permission. Submit your...
11 actionable steps to protect your online privacy [Infographic]
While online privacy is well recognized as a matter of paramount consideration, global internet users surprisingly, aren’t doing enough to protect it. In a statista survey, over 2.14 billion people worldwide are forecast to shop online in 2021. There were reportedly...
Retail: How to keep it personal and take care of privacy
For years the retail sector has been making use of customer data to propel their own marketing campaigns forward. What remains to be seen in this regard is, how the future of better data collection and technology, coupled with an enhanced need for customer...
The ultimate GDPR guide for marketers and businesses
With the prospect of GDPR looming - many of us are starting to ask a lot of questions about the regulation, and what it means for our business. The astronomical penalties that will come into place for those found not complying with GDPR has lead to it becoming one of...
Big data solutions to take a bite out of fraud!
The modern economy has seen a mass migration of retailers to e-commerce and other digital platforms. The cost and convenience advantages have produced a sales revolution for a number of varied industries but have also created new vectors for fraud and abuse. The...
The role of machine learning in financial fraud prevention
The scope of application of artificial intelligence is almost unlimited. However, there is at least one field where the role of AI can hardly be overestimated. This field is security, or, to be more exact, the financial security of Internet services users. If your app...
Big data poses special risks for children – UNICEF
Back in 2015, privacy campaigners became aware of a new Wi-Fi-connected toy that raised considerable concern. At issue was Hello Barbie, a doll with speech recognition technology that could hold a two-way conversation with a child. Parents and others grew concerned...
How to tell if a web site is protecting your data – Five signs to look for
More and more websites are requesting personal information and allowing you to make purchases at a touch of a button by storing your credit card information. With that convenience comes significant additional risk. How can you tell whether a site that you’re using has...
REPORT: How are companies protecting their data against modern day threats?
In a country that has just witnessed the latest epidemic in modern-day cyberattacks, namely, the National Health Service being compromised; data security is fast reaching the forefront of corporate mindsets. The truth is that no server is impenetrable and no data is...
General Data Protection Law (GDPR) gives personal data a broader definition
One of the trending tools modern businesses use for optimizing workflows, finding new markets and efficiently advertising products is big data analytics: a process that involves large information sets and the use of artificial intelligence and machine learning in...
9 effective ways to manage data breach in your organization
Most organizations are almost running out of options on how to secure their data due to the increased rate of data leaking from organizations into the wrong hands. This can even lead to cases of mistrust in the organizations since in most cases; it is an insider...
GDPR: 5 questions data-driven companies should ask to manage risks and reputation
Data is rapidly becoming the lifeblood of the global economy. In the world of Big Data and artificial intelligence, data represents a new type of economic asset that can offer companies a decisive competitive advantage, as well as damage the reputation and bottom-line...
Data security: How blockchain transforms five different markets
Security is a huge concern for everyone, especially when it comes to online transactions. The increasing number of cases of fraud, hacking and unauthorized personnel access of data poses a significant risk for all businesses. So, how do we secure online transactions?...
Video content analysis & security: Next big thing in big data
Video content analysis, also known as VCA, is a growing market for both big data analysis and for business intelligence. Intense interest exists in prescriptive analytics driven by real-time streams of rich video content, and it is being a potential solution to many...
Data security issues: Main challenges and threats in coming years
2016 brought the term "big data" crashing into public awareness, thanks in large part to the plethora of hacks and attempted hacks that took place during a year where cybercrime made mainstream headlines. Clearly, data hacks are a real concern for businesses of all...
Top 3 server storage companies to keep your data safe at a bargain price
Digital information has been replacing its physical counterpart at a rapid rate. Maybe it's the allure of an endless network of internet users or perhaps the virtual and weightlessness inventory that draw in the number of online content creators to it. Whatever the...
10 biggest cyber crimes and data breaches till date (Infographic)
Cyber criminals are becoming more sophisticated at picking our virtual pockets. And most of us remain woefully unprepared. According to a 2016 survey conducted by PricewaterhouseCoopers, organizations rank cybercrime as the second most reported type of economic crime,...
Data Security: 20 simple tips to follow at work [Infographic]
Data security is the responsibility of all. Here are a few dos and don’ts to help you ensure that your sensitive business data stays secure and protected.
Why blockchain? What can it do for big data?
Arguably the most significant development in information technology over the past few years, blockchain has the potential to change the way that the world approaches big data, with enhanced security and data quality just two of the benefits afforded to businesses...
Five steps to improve data security and prevent risks [Infographic]
Data security is an important aspect of any business, especially for those that provide services to clients. For law firms that handle highly sensitive and privileged information about their clients on a daily basis, the need for data security is critical. This...
Big data’s evolving role against security threats
The fight against cyber attacks is never-ending. According to the latest figures from Check Point, October 2016 saw the number of malware attacks increase by 5% because of high-profile incidents such as HummingBad. The malicious software, which originated in China,...
8 data security tips for small business – Infographic
Data Security has become one of the hottest issues that are surrounding the news nowadays. But what is more surprising is that small businesses, in particular, are fast becoming the favored targets of digital attackers. In fact, the latest Government Security Breaches...
Green data center – What makes it the next big thing in technology?
Consumers and businesses rely on a ton of data. Most of this can be attributed to the technology we use in our daily lives. After all, just about everyone carries a smartphone on their person. Then there are our work and home computers, tablets, smart TVs, streaming...
VPN use and data privacy stats for 2016
We presented a host of survey findings regarding vital internet trends in a previous article. We hope you found it useful! Yet at our core, we want our readers up-to-date on the latest information regarding vpn use and data security. So, this article assimilates many...
Important factors that play a key role in big data security
Computers rule today's world. Gone are the days when you would sit with files and paperwork and stack up on important documents and such. Sure you would work with files and folders , but that would be over your computer screen or the smart phone. With successive...
Our data platform with Docker
This article has been co-authored by Rafi Syed and Sree Pratheep. As a continuation of our earlier article on Docker, here is a brief about how we started our journey in Docker. Our goal was to have a completely self-sufficient development cum integration environment...
Safe business data storage: what you need to know about security in the cloud
Using the cloud is convenient, but many organizations worry about the security of the data they store in it. Here are some tips and information to help assuage those fears and make you smarter about security. The Security Market Is Getting Bigger The market for...
Privacy Paradox: The ethical implications of big data
As the information that our society generates grows exponentially, and our ability to analyze this information for deep insights into peoples’ psyches crosses into the realm of creepy, we must struggle with our conflicting desires for both individual privacy and deep...
Privacy debates: The two axes that govern them
I recently read an article on Tech Crunch about Apple’s public pro-privacy stand, and Snowden’s recent public appearance on Twitter. These two events may not seem related. However, to quote the article, “pro-privacy moves by mainstream tech giants can absolutely chart...
Big Data and privacy: big deal or not?
Big Data is trending, and will certainly remain so for quite some time, as I see it at least. And yes, Big Data does certainly open lots of possibilities and opportunities. No doubt about that. So let me be clear (especially since I am a lawyer): I am a big fan of Big...
Your privacy force Field for the Internet of Things
The Internet of Things will teach us all a broader view of privacy as much about what is coming at you as what is taken from you. Daniel Solove, the world’s greatest privacy influencer, just provided a beautiful summary of the wonderfully comprehensive and practical...
Monetizing big data: Six recommendations to avoid pitfalls
When discussing how companies can capitalize on Big Data, we often hear about successful use cases that have helped companies achieve various business goals, such as improving sales and efficiencies, strengthening customer relationships, and providing better products...
Big Data: An important component of today’s data governance and corporate deals
The past few years have witnessed the unprecedented rise of Big Data. Fully 90% of today’s data was created over just the past two years. Businesses now double the amount of data they capture and store every 1.2 years. And, every two days, we create as much...
Privacy concerns, yes, but let’s look at the Cookie’s good side
The third party cookies' obituary has been written again with the recent media flap around Verizon’s use of super cookies, AT&T’s proposed plan to charge consumers separate rates for not tracking their internet behavior, Mozilla’s 2014 announcement that it will by...
Five tips to prepare for new Big Data regulations
The ‘right to be forgotten’ has made big headlines as Google and Microsoft rush to delete out-dated information in internet searches following a ruling by the European Court of Justice. But is UK business truly ready for the next wave of data reform which is...
Privacy and protection: Obama finds a flaw in Big Data
In the backdrop of ongoing tussle between the administration against tech giants like Apple and Google over people’s data privacy, President Barack Obama gave a one-on-one interview with Re/code on a wide range of technology topics and talked about the uneasy balance...
Biggest big data security breaches since 2010
All businesses and organizations have legal and ethical responsibilities to safeguard their confidential data as well as their customers’ personal information, but data breaches happen all the time! According to the Online Trust Alliance's (OTA) 2014 Data Protection...
6 key guidelines for consumers to prevent data breaches
Today, consumers can enjoy the convenience of electronic banking, e-commerce and ATMs, but as the volume of financial transactions on computer networks increases, so does the risk... In 2014 alone, a total of 431 breaches occured so far and it represents a 20.1...
How to prevent data security breaches? Best practices for businesses
Completely eliminating security breaches may not be possible, but that doesn't mean you shouldn't do everything possible to thwart attackers. Now let's consider some best practices for businesses to prevent data security breaches. 1. Employ defense-in-depth strategies...
Top 5 best countries to host your website for data privacy!
Here are some of the countries with the strongest data privacy laws for websites and the press. 1. Iceland Despite its economic issues following the Global Financial Crisis, Iceland is well-known for its strict data privacy laws. In addition to its excellent...
Data Security: A talk with Gregory Shapiro
As a key protagonist in the Big Data movement, Gregory Shapiro’s website KDNuggets has become one of the most influential places to find new information and developments within data. As a prominent figure in the data revolution, he has seen himself and his website...