WHY IT MATTERS: Digital Transformation
214.8K views | +20 today
Follow
WHY IT MATTERS: Digital Transformation
Get weekly or monthly digest of all posts in your inbox: https://fmcs.digital/wim-subscribe
Curated by Farid Mheir
Your new post is loading...

Popular Tags for this blog

Current selected tags: 'Security', 'Trends'. Clear
Scooped by Farid Mheir
Scoop.it!

The Big Tech In Quantum Report: How Google, Microsoft, Amazon, IBM, & Intel Are Battling For The Future Of Computing - and it goes beyond #cryptography

The Big Tech In Quantum Report: How Google, Microsoft, Amazon, IBM, & Intel Are Battling For The Future Of Computing - and it goes beyond #cryptography | WHY IT MATTERS: Digital Transformation | Scoop.it

Download the report to find out:

  • How big tech companies are looking to gain from quantum advances and their strategies for commercializing quantum computing
  • The different approaches they are using to develop their own quantum computers
  • How big tech giants are using partnerships to build out their quantum capabilities and stake out market positions
  • Which strengths and capabilities differentiate each big tech company in quantum
Farid Mheir's insight:

WHY IT MATTERS: quantum computing commercial applications is far in the future. But I found this paper from CBinsights useful as it highlights the many possible applications beyond cryptography.

Scooped by Farid Mheir
Scoop.it!

Brush up on buzzword compliance: Gartner Top Strategic #Technology #Trends for 2022

Brush up on buzzword compliance: Gartner Top Strategic #Technology #Trends for 2022 | WHY IT MATTERS: Digital Transformation | Scoop.it

12 technology trends that will help shape the future of digital business.

Farid Mheir's insight:

WHY IT MATTERS: this report from gartner review the top 12 buzzword you need to master for your geek xmas cocktail conversations ;-) As often with these, they are very generic and could end up being very difficult to implement. Nevertheless they point in the right direction, globally.

Scooped by Farid Mheir
Scoop.it!

Gartner Magic Quadrant for Access Management describes the importance of continuous adaptive risk and trust assessment (CARTA) but highlight cost-reduction as primary goal of IT to move to SaaS sol...

Gartner Magic Quadrant for Access Management describes the importance of continuous adaptive risk and trust assessment (CARTA) but highlight cost-reduction as primary goal of IT to move to SaaS sol... | WHY IT MATTERS: Digital Transformation | Scoop.it

As remote work increases access management tool adoption, and security controls shift to identity, the ability to secure access with AM strategies aligned with continuous adaptive risk and trust assessment is paramount. Cost optimization for IT spending (e.g., AM) will also increase during 2021.

Farid Mheir's insight:

WHY IT MATTERS: as with most quadrants, the most interesting elements lie in the market definition and overview sections, not in the quadrant or ratings themselves. Notable in this quadrant is the fact that Amazon AWS, Salesforce and Google solutions have been excluded, as I assume they would be in top quadrant.

Interestingly, companies continue their move to SaaS solutions (no surprise) and focus on cost-reduction instead of customer satisfaction (weird, no?).

Michael Mendez's curator insight, November 23, 2020 3:53 PM

PayPal is an international payment system. PayPal is a global service that moves the payment amount from your credit card to the merchant without sharing your financial information. We sell the best and fully verified PayPal accounts that will help you in finding solutions to your current problems. This account is verified by credit card and Bank. Remember: card and bank verification takes time.

Scooped by Farid Mheir
Scoop.it!

Studios Ramp Up Virtual Production Efforts Amid Pandemic-Era Filming - will it democratize the production of #fakeVideos as well?

Studios Ramp Up Virtual Production Efforts Amid Pandemic-Era Filming - will it democratize the production of #fakeVideos as well? | WHY IT MATTERS: Digital Transformation | Scoop.it

Girish Balakrishnan, Netflix's director of virtual production, says the workflow using Unreal offers "the ability to connect a DP in New York with VFX artists in London, a director in Los Angeles with an art department in Japan, and performance-capture talent with in-house animation supervisors." The goal is to streamline production across continents "while talent safely works from home."

Farid Mheir's insight:

WHY IT MATTERS: movie production is going digital real fast enabling distributed teams to work collaboratively. Will this mean that the production of hyper realistic fake videos will become easier to produce. One may think so :-(

No comment yet.
Scooped by Farid Mheir
Scoop.it!

The 11 Biggest Data Breaches of 2020 (So Far) highlights how the breach happened to show where vulnerabilities exists - and with everyone working remotely, this has become to of mind for many execu...

The 11 Biggest Data Breaches of 2020 (So Far) highlights how the breach happened to show where vulnerabilities exists - and with everyone working remotely, this has become to of mind for many execu... | WHY IT MATTERS: Digital Transformation | Scoop.it

We've reached the halfway mark of 2020, so it's a good time to take a look at the biggest data breaches of the year so far. And to clarify, when we say "big," we're talking about the importance of the story as much as the number of records exposed. Each of the data breaches on this list has something to teach businesses and consumers about how sensitive data is most likely to be exposed in 2020. (Credential stuffing is a major player, but don't count out the good old-fashioned human error!). Let's talk about 11 major breaches: what data was compromised, how it was exposed, and what we can learn from the story.

Farid Mheir's insight:

WHY IT MATTERS: every is working remotely and thus the potential for data breaches increases. This article highlights "how" the breach happened, which should provide good insights into the most common vulnerabilities...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

2020 Data Breach Investigations Report is an annual compilation by Verizon that provides amazing overview of 4,000 #cybersecurity attacks

2020 Data Breach Investigations Report is an annual compilation by Verizon that provides amazing overview of 4,000 #cybersecurity attacks | WHY IT MATTERS: Digital Transformation | Scoop.it

Stay ahead of threats with the insights in the 2020 Data Breach Investigations Report (DBIR) from Verizon Enterprise Solutions. Read the official report now.

Farid Mheir's insight:

WHY IT MATTERS: the report is extensive and provides amazing insights into the most common security breaches. For example, the figure 22 shows that port 23 (telnet) and port 22 (SSH) remain most popular by far attack points. Many more insight in there...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Passwords remain the weak link in #cybersecurity as *gasp* 123456 and variations remain the most used: why do we still use them and why are password generators not the norm?

Passwords remain the weak link in #cybersecurity as *gasp* 123456 and variations remain the most used: why do we still use them and why are password generators not the norm? | WHY IT MATTERS: Digital Transformation | Scoop.it

Most cyber attacks and data breaches remain the result of weak passwords. So, why are we still using them?

Farid Mheir's insight:

WHY IT MATTERS: I've been writing about this since the beginning of this blog and 7 years later I feel the need to remind everyone to use a password generator at home and at work. This is even more important as remote work means we will connect remotely to many more systems in the future.

gladysiak.krzysztof@gmail.com's curator insight, May 29, 2020 1:07 PM
Ważne, by tworzyć odpowiednio skomplikowane znakowo hasła celem zwiększenia bezpieczeństwa w sieci 
Scooped by Farid Mheir
Scoop.it!

Triangulation fraud: what is it, why is it bad, and what to do about it - confessions from Nina Kollars at #defCon is a great explanation of the fraud that plagues eCommerce retailers HT @nianasavage

In 2018 I somewhat innocently bought very expensive coffee (Nespresso capsules) online from Ebay. What followed was a series of unexpected additional packages from the manufacturer Nespresso and a lurking suspicion that something had gone terribly--if not criminally--wrong as a result of my purchase. This talk chronicles the obnoxious amounts of obsessive research and tracking that became my new hobby--stalking Nespresso fraudsters and my decidedly non-technical attempts at developing a generic search profile and reporting the fraudsters to anyone who would listen, to include : the persons whose identities had been stolen, Nespresso, Ebay, and the FBI. Ultimately I just ended up with a LOT of coffee; a lingering sense that I had committed several crimes; and no faith left in humanity.

Farid Mheir's insight:

WHY IT MATTERS: a short and entertaining video on triangulation fraud in eCommerce websites. If you buy online listen to this. If you sell online, this is the kind of crap you have to deal with.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Gartner Report on #Security Organization Dynamics shows how complex it has become to make companies secure - which begs the question "who's RESPONSIBLE when a security breach occurs?" @Gartner

Gartner Report on #Security Organization Dynamics shows how complex it has become to make companies secure - which begs the question "who's RESPONSIBLE when a security breach occurs?" @Gartner | WHY IT MATTERS: Digital Transformation | Scoop.it

The growing cyber skills shortage drives security organizations to look for ways to mitigate the pain and danger that short-staffed security teams can experience. In its report, Security Organization Dynamics, Gartner outlines this ongoing challenge and notes how, “Persistent security skills shortages have forced security leaders to explore new ways of obtaining and managing security capabilities.”

Gartner points out that hiring may not be the only option for filling the gap, cautioning that, “Few, if any, enterprises can afford to perform all security functions in-house. Consider selective outsourcing of functions, especially those that are operationalized or ad hoc.”

Farid Mheir's insight:

WHY IT MATTERS: security, especially digital security and privacy, have become a central theme of digital transformation plans. Here Gartner surveys 300+ organizations to show different organizational structures for large, medium and small businesses.

My conclusion: there are too many people in charge of security, the governance is too complex and it is not clear who is RESPONSIBLE when a breach occurs...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Akamai state of internet reports that #retailers are most at risk of #credentialAbuse with 10B of the 28B attempts over 8 months in 2018 - and situation same in 2019 via Akamai Security Intelligenc...

Akamai state of internet reports that #retailers are most at risk of #credentialAbuse with 10B of the 28B attempts over 8 months in 2018 - and situation same in 2019 via Akamai Security Intelligenc... | WHY IT MATTERS: Digital Transformation | Scoop.it

Credential abuse and botnets abusing retailer inventories is a rising problem that needs attention. On average, organizations report experiencing 12.7 credential stuffing attempts each month, with each attempt targeting 1,252 accounts. We detected nearly 28 billion credential stuffing attempts between May and December 2018. Within the retail industry, the apparel vertical, experienced 3.7 billion attempts on its own, making it the largest targeted industry during the same timeframe. So why is retail, as well as apparel, such at hot target? Short answer? Money.

Farid Mheir's insight:

WHY IT MATTERS: I find the number just huge and thus a cause for concern in the design of my systems, strategies and recommendations to my clients. I also include the definition of credential stuffing because 1) I did not know and 2) it shines a light into the power of having a global CDN network to perform those analyses...

2019 report: https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/soti-security-media-under-assault-report-2019.pdf

 

Credential abuse attempts were identified as unsuccessful login attempts for accounts using an email address as a username. In order to identify abuse attempts, as opposed to real users who can’t type, two different algorithms are used. The first is a simple volumetric rule that counts the number of login errors to a specific address. This differs from what a single organization might be able to detect because Akamai is correlating data across hundreds of organizations.
The second algorithm uses data from our bot detection services to identify credential abuse from known botnets and tools. A well-configured botnet can avoid volumetric detection by spreading its traffic amongst many targets, by using a large number of systems in its scan, or spreading the traffic out over time, just to mention a few countermeasures.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Why don't we see mobile phone sensors leveraged more often for worker safety and security in business environments? Google’s Personal Safety app detects car accidents and automatically calls 911

Why don't we see mobile phone sensors leveraged more often for worker safety and security in business environments? Google’s Personal Safety app detects car accidents and automatically calls 911 | WHY IT MATTERS: Digital Transformation | Scoop.it

Google is working on a new app for its Pixel smartphones that will use hardware sensors to detect an auto accident and automatically call emergency services if a person fails to respond.

Farid Mheir's insight:

WHY IT MATTERS: mobile phones are very personal devices that you carry with you all the time. I expect that solutions like this one, always listening in the background and reacting when a specific event occurs, will become the norm in the future. Already Alexa-siri-google are listening constantly, now solutions that merge the other sensors of the device - accelerometer, etc. - are natural extensions. They can be used for good as here - or for bad as with eavesdropping solutions that Edward Snowden made popular. I am surprised that few business applications have leveraged this already, for worker security in dangerous environment (fall detection, broken glass detection, earthquake detection, etc.) can all be included into business apps where the issues of privacy can be weighed against worker security and safety, especially for workers on the road or working in areas where they are alone (woods, etc.)

Casey Reeves's curator insight, October 18, 2019 11:35 PM
Driving safety is the focus of my personal research stemming from my job with the Postal Service. While I research accident theory and causation and ways to prevent, we do explore the possibilities of technology in case of a vehicle accident. We have technology in place in the scanners that mail carriers take with them to detect emergency situations. I personally worked with a supervisor that saved an employee's life due to his skilled use of that technology. This article provides information on another tool that can be beneficial to the safety of drivers in any company. 
Scooped by Farid Mheir
Scoop.it!

80 IoT Statistics for 2019 and why the next big #security and #privacy threats will come from your devices, not the #Web #Infographic

80 IoT Statistics for 2019 and why the next big #security and #privacy threats will come from your devices, not the #Web #Infographic | WHY IT MATTERS: Digital Transformation | Scoop.it

IoT has been and will be the talk of the town for many years to come. Learn the latest internet of things statistics, forecasts and facts for 2019.

The IoT is defined by everyday objects, interconnected via the internet in order to send and receive data. The reason why we connect these objects is simple: for convenience. To help you understand this technology better in 2019, we’ve created the following list of Internet of Things statistics.

Being able to arm your security system remotely, or start your washer, turn your lights on or off, or adjust the thermostat while being nowhere near them is a convenience our grandparents fantasized about. Looks like we will probably never have to worry about leaving the stove on again.

Farid Mheir's insight:

WHY IT MATTERS: with everything connected to the Internet, possibilities are endless, for good and bad...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

The Future of Security Guards from Securitas presents a #date-driven future full of technology - the transformation of a still very manual industry

The Future of Security Guards from Securitas presents a #date-driven future full of technology - the transformation of a still very manual industry | WHY IT MATTERS: Digital Transformation | Scoop.it

Securitas 2018 investor update conference presents the strategy for the future.

Farid Mheir's insight:

WHY IT MATTERS: the security industry will be transformed with digital technologies, sensors, big data, drones, AI and other disruptive technologies. Start the video around 1:20:00 in the section #3

No comment yet.
Scooped by Farid Mheir
Scoop.it!

This Tech Would Have Spotted the Secret Chinese Chip in Seconds via @IEEE_Spectrum

This Tech Would Have Spotted the Secret Chinese Chip in Seconds via @IEEE_Spectrum | WHY IT MATTERS: Digital Transformation | Scoop.it

So why isn’t this system in widespread use? After all, much of it has been available since 2014. (Tehranipoor even described some in his 2017 article for IEEE Spectrum about the dangers of cloned chips.) “Sometimes a technology is ready, but it’s not used by companies because an attack hasn’t been seen to be real,” Tehranipoor says. This attack might be enough to change that perception, he says.  

Farid Mheir's insight:

WHY IT MATTERS: as the article states, technology sometimes exists but most don'T feel this is an important issue - until it is too late or catastrophic event occurs. We can extrapolate this concern to pretty much everything regarding cybersecurity these days...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Email Threat Report explains in simple terms how hackers impersonate friends and colleagues in emails with tremendous success rates #phishing #email #threat

Email Threat Report explains in simple terms how hackers impersonate friends and colleagues in emails with tremendous success rates #phishing #email #threat | WHY IT MATTERS: Digital Transformation | Scoop.it

As the point of entry for 91% of cyber attacks, email is every organization’s biggest vulnerability. From malware to malware-less attacks including impersonation attacks like CEO fraud, a single malicious email can cause significant brand damage and financial losses. Understanding these ever evolving attacks and identifying the tactics used, is key to staying one step ahead of cyber criminals.

Farid Mheir's insight:

WHY IT MATTERS: this very good paper explains in simple terms how hackers impersonate friends and colleagues in emails with tremendous success rates. Be aware!

Scooped by Farid Mheir
Scoop.it!

100 days before #cyberattacks are detected is too much as reported by M-Trends 2018 #Cyber Security Trends

100 days before #cyberattacks are detected is too much as reported by M-Trends 2018 #Cyber Security Trends | WHY IT MATTERS: Digital Transformation | Scoop.it

The annual report was compiled by mandiant consultants at FireEye based on hundreds of incident response investigations in many industry sectors. It offers recommendations on how organizations can improve the way they prevent, detect, analyze and respond to cyber attacks.

Farid Mheir's insight:

WHY IT MATTERS: this detailed report on cyber security trends shows an alarming statistic: it takes almost 100 days to detect an intrusion into computer systems. Why is that, given that data security and privacy are so important? Not enough resources? Lack of trained personnel? Hackers too good? Read to find out.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

How China is using facial recognition as the sharp end of their big data drive for total surveillance via @WashingtonPost #video #surveillance #security #privacy #nowhere2hide

How China is using facial recognition as the sharp end of their big data drive for total surveillance via @WashingtonPost #video #surveillance #security #privacy #nowhere2hide | WHY IT MATTERS: Digital Transformation | Scoop.it

Facial recognition is the new hot tech topic in China. Banks, airports, hotels and even public toilets are all trying to verify people’s identities by analyzing their faces. But the police and security state have been the most enthusiastic about embracing this new technology.

Farid Mheir's insight:

WHY IT MATTERS: this article and video from the Washington Post provide a great over view of what China is doing with face and object recognition as part of its massive 500M cameras (2020 estimates). Nowhere to hide...

Same topic, see the BBC report and video: 7 minutes to get arrested http://www.bbc.com/news/av/world-asia-china-42248056/in-your-face-china-s-all-seeing-state 

Or the very good Bloomberg article : https://www.bloomberg.com/news/articles/2018-01-17/china-said-to-test-facial-recognition-fence-in-muslim-heavy-area 

PredictX's curator insight, March 19, 2018 10:12 AM

"Banks, airports, hotels and even public toilets are all trying to verify people’s identities by analyzing their faces." Another unnerving #bigdata trend to look out for in China.

Scooped by Farid Mheir
Scoop.it!

The downside of #drones & #AI- Researchers Create Video to Call for Autonomous Weapons Ban at UN @FLIsrisk

The downside of #drones & #AI- Researchers Create Video to Call for Autonomous Weapons Ban at UN @FLIsrisk | WHY IT MATTERS: Digital Transformation | Scoop.it

In response to growing concerns about autonomous weapons, a coalition of AI researchers and advocacy organizations released a fictitious video on Monday that depicts a disturbing future in which lethal autonomous weapons have become cheap and ubiquitous. The video was launched in Geneva, where AI researcher Stuart Russell presented it at an event at the United Nations Convention on Conventional Weapons hosted by the Campaign to Stop Killer Robots. Russell, in an appearance at the end of the video, warns that the technology described in the film already exists and that the window to act is closing fast.

Farid Mheir's insight:

WHY IT MATTERS: there is often a downside to advanced technology, especially those that can allow its owner dominance. In this video scenario, humans weaponize drones with AI. But the real danger is for superintelligent AI to turn against us humans. 

For more, read the amazing book Superintelligence: http://sco.lt/5uYgyn 

Scooped by Farid Mheir
Scoop.it!

Cyber-Risk & Resilience 2017 details large-scale #cyberattacks & #online threats to #businesses are rising exponentially #tech #digital #data #business #hack #blockchain via @Raconteur @kuriharan

Cyber-Risk & Resilience 2017 details large-scale #cyberattacks & #online threats to #businesses are rising exponentially #tech #digital #data #business #hack #blockchain via @Raconteur @kuriharan | WHY IT MATTERS: Digital Transformation | Scoop.it

In an evermore connected world, large-scale cyberattacks and online threats to businesses are rising exponentially. The Cyber-Risk & Resilience special report, published in The Sunday Times, features insights into the impact cybercriminals can inflict on organisations and individuals. From chatbots spreading fake news, risks concerning personal data, biometrics and fraud, as well as tackling phishing emails, the potential dangers are unprecedented. Also included is an infographic on why hackers hack and an article on the top five ways quantum computing will change cybersecurity for good.

Farid Mheir's insight:

WHY IT MATTERS: the more we digitize our businesses and our lives the more we are exposed to hacking. The explosion of cryptocurrencies hacking and recent months appears to be a strong trend. A great series of articles on the subject is presented here.

Кирилл Беличенко's curator insight, November 30, 2022 6:42 AM

Zagrożenia internetowe i statystyki hakerskie

Scooped by Farid Mheir
Scoop.it!

45 Billion Cameras by 2022 Fuel Business Opportunities for better and for worse #security #privacy #AI #robots

45 Billion Cameras by 2022 Fuel Business Opportunities for better and for worse #security #privacy #AI #robots | WHY IT MATTERS: Digital Transformation | Scoop.it

Exclusive research by us at LDV Capital is the first publicly shared, in-depth analysis which estimates how many cameras will be in the world in 2022. Key Findings include:

  • Most of the pictures captured will never be seen by a human eye.
  • A paradigm shift will take place in the meaning and use of a camera.
  • Over the next five years there will be a proliferation of cameras integrated into products across industries and markets.
  • Where there is growth in cameras there will be tremendous business opportunities in the capture, analysis and interpretation of visual data.
  • Depth capture will double the number of cameras in handheld cameras.
  • By 2022, the number of cameras will be nearly 12X the 2012 figures.
  • Your smartphone will have between 4 and 10 cameras by 2022.
  • The Internet of Eyes will be larger than the Internet of Things.
  • In the next five years, robotics will have 20X more integrated cameras.
  • By 2022, all new vehicles will be equipped with more than 25 cameras and this does not include Lidar or Radar.
Farid Mheir's insight:

WHY IT MATTERS: cameras will become ubiquitous and AI systems will analyze those images to provide business services but also track our every move. This reports presents trends in this area.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

The Periodic Table of Cybersecurity Startups @CBinsights

The Periodic Table of Cybersecurity Startups @CBinsights | WHY IT MATTERS: Digital Transformation | Scoop.it

A periodic table of cybersecurity to navigate the key players in the space, including startups, industry categories, investors, and exits.

Farid Mheir's insight:

WHY IT MATTERS: with digital transformation often comes increased level of digital threats. Good to keep in mind that there are tools to help reduce the risk of attacks or their impact when they happen.

Ocean´s five's curator insight, October 31, 2017 6:44 AM
Las 140 startup de la tabla periódica. Así son las empresas que definen la industria de seguridad cibernética. Entre las categorías se encuentran:

-Seguridad móvil: Zimperium y Appthority.

-Cyber Insurance: RedSeal Networks y Cyence.

-Administración de identidad y acceso: OneLogin.

-Seguridad de red y punto final: Tanium, Cloudflare , Illumio y Zscaler .

-Seguridad contra el fraude:ThreatMetrix.
Scooped by Farid Mheir
Scoop.it!

Cybersecurity make headlines: How Business Is Protecting Itself is Fortune magazine July cover

Cybersecurity make headlines: How Business Is Protecting Itself is Fortune magazine July cover | WHY IT MATTERS: Digital Transformation | Scoop.it
Businesses are under attack from cybercriminals. Here’s what companies are doing to safeguard their digital assets from hackers.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Do I really need to say why. Just read it.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Amazing to see how so many people #trust companies & manufacturers with #security #privacy

Amazing to see how so many people #trust companies & manufacturers with #security #privacy | WHY IT MATTERS: Digital Transformation | Scoop.it

With the Supreme Court slated to rule next term on whether cellphone location data requires a search warrant, a new poll shows that a majority of U.S. adults support law enforcement accessing certain personal data for someone under investigation, but only if it's authorized by a warrant. Polling was conducted June 8 through June 12 among 2,200 U.S. adults. Morning Consult is the official polling partner of POLITICO, Vox, Fortune, and Bloomberg News.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

You have to trust companies and manufacturers with your private data to interact with them or use their products. What are people who distrust those companies doing? Not buying on Amazon? Not buying a smartphone? I guess not.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

More reasons to enable #2FA 2 factor authentication, never reuse #password & register to @HaveIbeenPwned

More reasons to enable #2FA 2 factor authentication, never reuse #password & register to @HaveIbeenPwned | WHY IT MATTERS: Digital Transformation | Scoop.it
The short version: I'm loading over 1 billion breached accounts into HIBP. These are from 2 different "combo lists", collections of email addresses and passwords from all sorts of different locations. I've verified their accuracy (including my own record in one of them) and many hundreds of millions of the
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Pretty much your whole life is online and digitize today. Your only protection from crooks is strong passwords that you never reuse. This article provides in depth discussion on the millions of passwords that are being sold for few dollars on the dark web. It should help you understand why this is important and what to do to be more secure.

argonapproach's comment, May 8, 2017 6:09 AM
good
Scooped by Farid Mheir
Scoop.it!

2017 DBIR: Understand Your Cybersecurity Threats

2017 DBIR: Understand Your Cybersecurity Threats | WHY IT MATTERS: Digital Transformation | Scoop.it

The 2017 DBIR reveals what’s really happening in cyber security. This year’s report is based on analysis of over 40,000 incidents, including 1,935 confirmed data breaches. That means you get a detailed insight into the cyber security threats you face.

Read the report and discover:

  • The biggest cyber security threats in your sector and what you can do to mitigate them.
  • Who’s behind the attacks and how they’re getting in.
  • What motivates the cybercriminals.
  • How nine incident patterns can help you predict what the cybercriminals will do next.

 

Farid Mheir's insight:

WHY THIS IS IMPORTANT

This annual report on cybersecurity from Verizon is one of the best as it analyzes data from 2,000 breaches to draw a portrait of cybersecurity threats that is factual. Must read.

No comment yet.
Curated by Farid Mheir
Get every post weekly in your inbox by registering here: http://fmcs.digital/newsletter-signup/