WHY IT MATTERS: Digital Transformation
215.3K views | +6 today
Follow
WHY IT MATTERS: Digital Transformation
Get weekly or monthly digest of all posts in your inbox: https://fmcs.digital/wim-subscribe
Curated by Farid Mheir
Your new post is loading...

Popular Tags for this blog

Current selected tags: 'Security', 'Technology', 'Trends'. Clear
Scooped by Farid Mheir
Scoop.it!

The Big Tech In Quantum Report: How Google, Microsoft, Amazon, IBM, & Intel Are Battling For The Future Of Computing - and it goes beyond #cryptography

The Big Tech In Quantum Report: How Google, Microsoft, Amazon, IBM, & Intel Are Battling For The Future Of Computing - and it goes beyond #cryptography | WHY IT MATTERS: Digital Transformation | Scoop.it

Download the report to find out:

  • How big tech companies are looking to gain from quantum advances and their strategies for commercializing quantum computing
  • The different approaches they are using to develop their own quantum computers
  • How big tech giants are using partnerships to build out their quantum capabilities and stake out market positions
  • Which strengths and capabilities differentiate each big tech company in quantum
Farid Mheir's insight:

WHY IT MATTERS: quantum computing commercial applications is far in the future. But I found this paper from CBinsights useful as it highlights the many possible applications beyond cryptography.

Scooped by Farid Mheir
Scoop.it!

Brush up on buzzword compliance: Gartner Top Strategic #Technology #Trends for 2022

Brush up on buzzword compliance: Gartner Top Strategic #Technology #Trends for 2022 | WHY IT MATTERS: Digital Transformation | Scoop.it

12 technology trends that will help shape the future of digital business.

Farid Mheir's insight:

WHY IT MATTERS: this report from gartner review the top 12 buzzword you need to master for your geek xmas cocktail conversations ;-) As often with these, they are very generic and could end up being very difficult to implement. Nevertheless they point in the right direction, globally.

Scooped by Farid Mheir
Scoop.it!

Gartner Magic Quadrant for Access Management describes the importance of continuous adaptive risk and trust assessment (CARTA) but highlight cost-reduction as primary goal of IT to move to SaaS sol...

Gartner Magic Quadrant for Access Management describes the importance of continuous adaptive risk and trust assessment (CARTA) but highlight cost-reduction as primary goal of IT to move to SaaS sol... | WHY IT MATTERS: Digital Transformation | Scoop.it

As remote work increases access management tool adoption, and security controls shift to identity, the ability to secure access with AM strategies aligned with continuous adaptive risk and trust assessment is paramount. Cost optimization for IT spending (e.g., AM) will also increase during 2021.

Farid Mheir's insight:

WHY IT MATTERS: as with most quadrants, the most interesting elements lie in the market definition and overview sections, not in the quadrant or ratings themselves. Notable in this quadrant is the fact that Amazon AWS, Salesforce and Google solutions have been excluded, as I assume they would be in top quadrant.

Interestingly, companies continue their move to SaaS solutions (no surprise) and focus on cost-reduction instead of customer satisfaction (weird, no?).

Michael Mendez's curator insight, November 23, 2020 3:53 PM

PayPal is an international payment system. PayPal is a global service that moves the payment amount from your credit card to the merchant without sharing your financial information. We sell the best and fully verified PayPal accounts that will help you in finding solutions to your current problems. This account is verified by credit card and Bank. Remember: card and bank verification takes time.

Scooped by Farid Mheir
Scoop.it!

Studios Ramp Up Virtual Production Efforts Amid Pandemic-Era Filming - will it democratize the production of #fakeVideos as well?

Studios Ramp Up Virtual Production Efforts Amid Pandemic-Era Filming - will it democratize the production of #fakeVideos as well? | WHY IT MATTERS: Digital Transformation | Scoop.it

Girish Balakrishnan, Netflix's director of virtual production, says the workflow using Unreal offers "the ability to connect a DP in New York with VFX artists in London, a director in Los Angeles with an art department in Japan, and performance-capture talent with in-house animation supervisors." The goal is to streamline production across continents "while talent safely works from home."

Farid Mheir's insight:

WHY IT MATTERS: movie production is going digital real fast enabling distributed teams to work collaboratively. Will this mean that the production of hyper realistic fake videos will become easier to produce. One may think so :-(

No comment yet.
Scooped by Farid Mheir
Scoop.it!

The 11 Biggest Data Breaches of 2020 (So Far) highlights how the breach happened to show where vulnerabilities exists - and with everyone working remotely, this has become to of mind for many execu...

The 11 Biggest Data Breaches of 2020 (So Far) highlights how the breach happened to show where vulnerabilities exists - and with everyone working remotely, this has become to of mind for many execu... | WHY IT MATTERS: Digital Transformation | Scoop.it

We've reached the halfway mark of 2020, so it's a good time to take a look at the biggest data breaches of the year so far. And to clarify, when we say "big," we're talking about the importance of the story as much as the number of records exposed. Each of the data breaches on this list has something to teach businesses and consumers about how sensitive data is most likely to be exposed in 2020. (Credential stuffing is a major player, but don't count out the good old-fashioned human error!). Let's talk about 11 major breaches: what data was compromised, how it was exposed, and what we can learn from the story.

Farid Mheir's insight:

WHY IT MATTERS: every is working remotely and thus the potential for data breaches increases. This article highlights "how" the breach happened, which should provide good insights into the most common vulnerabilities...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

2020 Data Breach Investigations Report is an annual compilation by Verizon that provides amazing overview of 4,000 #cybersecurity attacks

2020 Data Breach Investigations Report is an annual compilation by Verizon that provides amazing overview of 4,000 #cybersecurity attacks | WHY IT MATTERS: Digital Transformation | Scoop.it

Stay ahead of threats with the insights in the 2020 Data Breach Investigations Report (DBIR) from Verizon Enterprise Solutions. Read the official report now.

Farid Mheir's insight:

WHY IT MATTERS: the report is extensive and provides amazing insights into the most common security breaches. For example, the figure 22 shows that port 23 (telnet) and port 22 (SSH) remain most popular by far attack points. Many more insight in there...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Passwords remain the weak link in #cybersecurity as *gasp* 123456 and variations remain the most used: why do we still use them and why are password generators not the norm?

Passwords remain the weak link in #cybersecurity as *gasp* 123456 and variations remain the most used: why do we still use them and why are password generators not the norm? | WHY IT MATTERS: Digital Transformation | Scoop.it

Most cyber attacks and data breaches remain the result of weak passwords. So, why are we still using them?

Farid Mheir's insight:

WHY IT MATTERS: I've been writing about this since the beginning of this blog and 7 years later I feel the need to remind everyone to use a password generator at home and at work. This is even more important as remote work means we will connect remotely to many more systems in the future.

gladysiak.krzysztof@gmail.com's curator insight, May 29, 2020 1:07 PM
Ważne, by tworzyć odpowiednio skomplikowane znakowo hasła celem zwiększenia bezpieczeństwa w sieci 
Scooped by Farid Mheir
Scoop.it!

Akamai state of internet reports that #retailers are most at risk of #credentialAbuse with 10B of the 28B attempts over 8 months in 2018 - and situation same in 2019 via Akamai Security Intelligenc...

Akamai state of internet reports that #retailers are most at risk of #credentialAbuse with 10B of the 28B attempts over 8 months in 2018 - and situation same in 2019 via Akamai Security Intelligenc... | WHY IT MATTERS: Digital Transformation | Scoop.it

Credential abuse and botnets abusing retailer inventories is a rising problem that needs attention. On average, organizations report experiencing 12.7 credential stuffing attempts each month, with each attempt targeting 1,252 accounts. We detected nearly 28 billion credential stuffing attempts between May and December 2018. Within the retail industry, the apparel vertical, experienced 3.7 billion attempts on its own, making it the largest targeted industry during the same timeframe. So why is retail, as well as apparel, such at hot target? Short answer? Money.

Farid Mheir's insight:

WHY IT MATTERS: I find the number just huge and thus a cause for concern in the design of my systems, strategies and recommendations to my clients. I also include the definition of credential stuffing because 1) I did not know and 2) it shines a light into the power of having a global CDN network to perform those analyses...

2019 report: https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/soti-security-media-under-assault-report-2019.pdf

 

Credential abuse attempts were identified as unsuccessful login attempts for accounts using an email address as a username. In order to identify abuse attempts, as opposed to real users who can’t type, two different algorithms are used. The first is a simple volumetric rule that counts the number of login errors to a specific address. This differs from what a single organization might be able to detect because Akamai is correlating data across hundreds of organizations.
The second algorithm uses data from our bot detection services to identify credential abuse from known botnets and tools. A well-configured botnet can avoid volumetric detection by spreading its traffic amongst many targets, by using a large number of systems in its scan, or spreading the traffic out over time, just to mention a few countermeasures.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

This Tech Would Have Spotted the Secret Chinese Chip in Seconds via @IEEE_Spectrum

This Tech Would Have Spotted the Secret Chinese Chip in Seconds via @IEEE_Spectrum | WHY IT MATTERS: Digital Transformation | Scoop.it

So why isn’t this system in widespread use? After all, much of it has been available since 2014. (Tehranipoor even described some in his 2017 article for IEEE Spectrum about the dangers of cloned chips.) “Sometimes a technology is ready, but it’s not used by companies because an attack hasn’t been seen to be real,” Tehranipoor says. This attack might be enough to change that perception, he says.  

Farid Mheir's insight:

WHY IT MATTERS: as the article states, technology sometimes exists but most don'T feel this is an important issue - until it is too late or catastrophic event occurs. We can extrapolate this concern to pretty much everything regarding cybersecurity these days...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Email Threat Report explains in simple terms how hackers impersonate friends and colleagues in emails with tremendous success rates #phishing #email #threat

Email Threat Report explains in simple terms how hackers impersonate friends and colleagues in emails with tremendous success rates #phishing #email #threat | WHY IT MATTERS: Digital Transformation | Scoop.it

As the point of entry for 91% of cyber attacks, email is every organization’s biggest vulnerability. From malware to malware-less attacks including impersonation attacks like CEO fraud, a single malicious email can cause significant brand damage and financial losses. Understanding these ever evolving attacks and identifying the tactics used, is key to staying one step ahead of cyber criminals.

Farid Mheir's insight:

WHY IT MATTERS: this very good paper explains in simple terms how hackers impersonate friends and colleagues in emails with tremendous success rates. Be aware!

Scooped by Farid Mheir
Scoop.it!

100 days before #cyberattacks are detected is too much as reported by M-Trends 2018 #Cyber Security Trends

100 days before #cyberattacks are detected is too much as reported by M-Trends 2018 #Cyber Security Trends | WHY IT MATTERS: Digital Transformation | Scoop.it

The annual report was compiled by mandiant consultants at FireEye based on hundreds of incident response investigations in many industry sectors. It offers recommendations on how organizations can improve the way they prevent, detect, analyze and respond to cyber attacks.

Farid Mheir's insight:

WHY IT MATTERS: this detailed report on cyber security trends shows an alarming statistic: it takes almost 100 days to detect an intrusion into computer systems. Why is that, given that data security and privacy are so important? Not enough resources? Lack of trained personnel? Hackers too good? Read to find out.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Cyber-Risk & Resilience 2017 details large-scale #cyberattacks & #online threats to #businesses are rising exponentially #tech #digital #data #business #hack #blockchain via @Raconteur @kuriharan

Cyber-Risk & Resilience 2017 details large-scale #cyberattacks & #online threats to #businesses are rising exponentially #tech #digital #data #business #hack #blockchain via @Raconteur @kuriharan | WHY IT MATTERS: Digital Transformation | Scoop.it

In an evermore connected world, large-scale cyberattacks and online threats to businesses are rising exponentially. The Cyber-Risk & Resilience special report, published in The Sunday Times, features insights into the impact cybercriminals can inflict on organisations and individuals. From chatbots spreading fake news, risks concerning personal data, biometrics and fraud, as well as tackling phishing emails, the potential dangers are unprecedented. Also included is an infographic on why hackers hack and an article on the top five ways quantum computing will change cybersecurity for good.

Farid Mheir's insight:

WHY IT MATTERS: the more we digitize our businesses and our lives the more we are exposed to hacking. The explosion of cryptocurrencies hacking and recent months appears to be a strong trend. A great series of articles on the subject is presented here.

Кирилл Беличенко's curator insight, November 30, 2022 6:42 AM

Zagrożenia internetowe i statystyki hakerskie

Scooped by Farid Mheir
Scoop.it!

45 Billion Cameras by 2022 Fuel Business Opportunities for better and for worse #security #privacy #AI #robots

45 Billion Cameras by 2022 Fuel Business Opportunities for better and for worse #security #privacy #AI #robots | WHY IT MATTERS: Digital Transformation | Scoop.it

Exclusive research by us at LDV Capital is the first publicly shared, in-depth analysis which estimates how many cameras will be in the world in 2022. Key Findings include:

  • Most of the pictures captured will never be seen by a human eye.
  • A paradigm shift will take place in the meaning and use of a camera.
  • Over the next five years there will be a proliferation of cameras integrated into products across industries and markets.
  • Where there is growth in cameras there will be tremendous business opportunities in the capture, analysis and interpretation of visual data.
  • Depth capture will double the number of cameras in handheld cameras.
  • By 2022, the number of cameras will be nearly 12X the 2012 figures.
  • Your smartphone will have between 4 and 10 cameras by 2022.
  • The Internet of Eyes will be larger than the Internet of Things.
  • In the next five years, robotics will have 20X more integrated cameras.
  • By 2022, all new vehicles will be equipped with more than 25 cameras and this does not include Lidar or Radar.
Farid Mheir's insight:

WHY IT MATTERS: cameras will become ubiquitous and AI systems will analyze those images to provide business services but also track our every move. This reports presents trends in this area.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

The Periodic Table of Cybersecurity Startups @CBinsights

The Periodic Table of Cybersecurity Startups @CBinsights | WHY IT MATTERS: Digital Transformation | Scoop.it

A periodic table of cybersecurity to navigate the key players in the space, including startups, industry categories, investors, and exits.

Farid Mheir's insight:

WHY IT MATTERS: with digital transformation often comes increased level of digital threats. Good to keep in mind that there are tools to help reduce the risk of attacks or their impact when they happen.

Ocean´s five's curator insight, October 31, 2017 6:44 AM
Las 140 startup de la tabla periódica. Así son las empresas que definen la industria de seguridad cibernética. Entre las categorías se encuentran:

-Seguridad móvil: Zimperium y Appthority.

-Cyber Insurance: RedSeal Networks y Cyence.

-Administración de identidad y acceso: OneLogin.

-Seguridad de red y punto final: Tanium, Cloudflare , Illumio y Zscaler .

-Seguridad contra el fraude:ThreatMetrix.
Scooped by Farid Mheir
Scoop.it!

Cybersecurity make headlines: How Business Is Protecting Itself is Fortune magazine July cover

Cybersecurity make headlines: How Business Is Protecting Itself is Fortune magazine July cover | WHY IT MATTERS: Digital Transformation | Scoop.it
Businesses are under attack from cybercriminals. Here’s what companies are doing to safeguard their digital assets from hackers.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Do I really need to say why. Just read it.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

More reasons to enable #2FA 2 factor authentication, never reuse #password & register to @HaveIbeenPwned

More reasons to enable #2FA 2 factor authentication, never reuse #password & register to @HaveIbeenPwned | WHY IT MATTERS: Digital Transformation | Scoop.it
The short version: I'm loading over 1 billion breached accounts into HIBP. These are from 2 different "combo lists", collections of email addresses and passwords from all sorts of different locations. I've verified their accuracy (including my own record in one of them) and many hundreds of millions of the
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Pretty much your whole life is online and digitize today. Your only protection from crooks is strong passwords that you never reuse. This article provides in depth discussion on the millions of passwords that are being sold for few dollars on the dark web. It should help you understand why this is important and what to do to be more secure.

argonapproach's comment, May 8, 2017 6:09 AM
good
Scooped by Farid Mheir
Scoop.it!

The Internet Health Report: @mozilla 

The Internet Health Report: @mozilla  | WHY IT MATTERS: Digital Transformation | Scoop.it

Mozilla’s new open source initiative to document and explain what’s happening to the health of the Internet. Combining research from multiple sources, we collect data on five key topics and offer a brief overview of each.

Farid Mheir's insight:

Mozilla has always been promoting Internet security and privacy and this new report paves the way for a very interesting ongoing look at key elements of the public Internet.

No comment yet.
Curated by Farid Mheir
Get every post weekly in your inbox by registering here: http://fmcs.digital/newsletter-signup/