WHY IT MATTERS: Digital Transformation
215.1K views | +7 today
Follow
WHY IT MATTERS: Digital Transformation
Get weekly or monthly digest of all posts in your inbox: https://fmcs.digital/wim-subscribe
Curated by Farid Mheir
Your new post is loading...

Popular Tags for this blog

Current selected tags: 'Software Engineering', 'Security'. Clear
Scooped by Farid Mheir
Scoop.it!

Hacksplaining: a website to train #developers on major digital security hacks #security #hacking

Hacksplaining: a website to train #developers on major digital security hacks #security #hacking | WHY IT MATTERS: Digital Transformation | Scoop.it

The best protection against being hacked is well-informed developers. Make your development team into security experts today.

Farid Mheir's insight:

WHY IT MATTERS: amazing reference to understand the most common hacks in digital: SQL injection, cross-site scripting and many more. A reference to bookmark.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

An essential reference for solutions that have become staples of #digitalTransformation : Directory of Products That Assess #Identification Documents & Verify #Identity via @mydiacc HT @fbedard

An essential reference for solutions that have become staples of #digitalTransformation : Directory of Products That Assess #Identification Documents & Verify #Identity via @mydiacc HT @fbedard | WHY IT MATTERS: Digital Transformation | Scoop.it

The DIACC is pleased to publish the first iteration of the Directory of Products That Assess Identification Documents & Verify Identity. This Directory is designed to provide an overview of providers’ solutions which use government issued photo identification cards, combined with biometric facial scans, to establish Digital Identity.

Farid Mheir's insight:

WHY IT MATTERS: I missed that one when it was published last year. The document lists and compares tens of solutions and provides great overview of their characteristics. A great starting point.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

An Absurdly Basic Bug Let Anyone Grab All of Parler's Data via @WIRED HT @NunoBarbeita @umlaut21

An Absurdly Basic Bug Let Anyone Grab All of Parler's Data via @WIRED HT @NunoBarbeita @umlaut21 | WHY IT MATTERS: Digital Transformation | Scoop.it

Parler lacked the most basic security measures that would have prevented the automated scraping of the site's data. It even ordered its posts by number in the site's URLs, so that anyone could have easily, programmatically downloaded the site's millions of posts. Parler's cardinal security sin is known as an insecure direct object reference,

Farid Mheir's insight:

WHY IT MATTERS: security has become central in our age of digital transformation. Yet, it seems, most people are either unaware of basic security principles, or not willing to invest time or money to do it. And I am not even talking of doing it *well*. Just implementing proper security measure. In this case it affect Parler, which in itself I don't much care about (they deserve it for such a stupid mistake). But their lack of security impacts their users privacy as well. And that includes potentially millions of people (in the photo, 68000 video have been geolocated - too bad for keeping your anonymity ;-)

No comment yet.
Scooped by Farid Mheir
Scoop.it!

The Canadian Digital ID & Authentication is taking shape with the release of the Pan-Canadian Trust Framework #PCTF #DIACC

The Canadian Digital ID & Authentication is taking shape with the release of the Pan-Canadian Trust Framework #PCTF #DIACC | WHY IT MATTERS: Digital Transformation | Scoop.it

The purpose of the PCTF Authentication Component is to assure the on-going integrity of login and authentication processes by certifying, through a process of assessment, that they comply with standardized Conformance Criteria.Click here to edit the content

Farid Mheir's insight:

WHY IT MATTERS: geek must-read just off the press is the framework to enable the Canadian digital ID. 

No comment yet.
Scooped by Farid Mheir
Scoop.it!

State of #Cybersecurity 2020 shows that it is mostly a human resources problem - which is not going to be resolved soon and may bee exacerbated with enhanced remote work via @ISACA @CybersecurityHub

State of #Cybersecurity 2020 shows that it is mostly a human resources problem - which is not going to be resolved soon and may bee exacerbated with enhanced remote work via @ISACA @CybersecurityHub | WHY IT MATTERS: Digital Transformation | Scoop.it

The cybersecurity skills gap has been plaguing enterprises for years—but despite garnering much discussion and media coverage, little progress is being made.

State of Cybersecurity 2020 looks at questions such as:

  • How long does it take to fill a cybersecurity role with a qualified candidate?
  • What percentage of cybersecurity candidates are qualified for the role?
  • Is retention improving or worsening?
  • Which cybersecurity skills are in the highest demand?
  • Are HR teams informed partners in the search for qualified cybersecurity candidates?
  • Are cybersecurity teams becoming more gender-balanced, and are diversity programs doing enough to help?
  • What can companies do to staff up more quickly and find better-qualified candidates?
Farid Mheir's insight:

WHY IT MATTERS: this in depth study shows that cybersecurity issues in organizations stem from lack of skilled resources. With covid and remote work on the rise, the importance of cybersecurity is higher than it has ever been.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

How to Enhance Your Security Team #eBook suggests new roles for the #cyberSecurity age we live in: Threat Hunting Analyst, Malware Reverse Engineer, Attack Simulation Specialist and others...

How to Enhance Your Security Team #eBook suggests new roles for the #cyberSecurity age we live in: Threat Hunting Analyst, Malware Reverse Engineer, Attack Simulation Specialist and others... | WHY IT MATTERS: Digital Transformation | Scoop.it

you’ll learn about some of the expert roles that are often the hardest to find or are only required in specific situations. This paper details these roles, their responsibilities and the cross-functional processes that are required to successfully hunt for, respond to and prevent threats as part of a world-class security organization.

Farid Mheir's insight:

WHY IT MATTERS: cybersecurity is a relatively new field of expertise and requires specialists. This paper presents some of them and it is interesting to ask whether you need those skills in your organization and if you do, where you can find them...

Scooped by Farid Mheir
Scoop.it!

Don’t Toss That Bulb, It Knows Your Password: explains how connected devices such as lightbulbs know much about you even after the end of their useful life #IOT #privacy #security

Don’t Toss That Bulb, It Knows Your Password: explains how connected devices such as lightbulbs know much about you even after the end of their useful life #IOT #privacy #security | WHY IT MATTERS: Digital Transformation | Scoop.it

Whether it was here on Hackaday or elsewhere on the Internet, you’ve surely heard more than a few cautionary tales about the “Internet of Things” by now. As it turns out, giving every gadget you own access to your personal information and Internet connection can lead to unintended consequences. Who knew, right? But if you need yet another example of why trusting your home appliances with your secrets is potentially a bad idea, [Limited Results] is here to make sure you spend the next few hours doubting your recent tech purchases.

Farid Mheir's insight:

WHY IT MATTERS: the article explains how this team has successfully retrieved private information from discarded connected devices. It raises concerns about the disposal of connected products which, has everyone knows, will soon included pretty much everything in our homes and offices, from lightbulbs to refrigerators.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

When Your Employees Post Passwords Online in public Trello boards and other public SaaS solutions you may have serious data security issues via @brianKrebs #KrebsOnSecurity

When Your Employees Post Passwords Online in public Trello boards and other public SaaS solutions you may have serious data security issues via @brianKrebs #KrebsOnSecurity | WHY IT MATTERS: Digital Transformation | Scoop.it

Last month’s story about organizations exposing passwords and other sensitive data via collaborative online spaces at Trello.com only scratched the surface of the problem. A deeper dive suggests a large number of government agencies, marketing firms, healthcare organizations and IT support companies are publishing credentials via public Trello boards that quickly get indexed by the major search engines.

Farid Mheir's insight:

WHY IT MATTERS: this article is a reminder that the use of public software as a service tools may lead to exposure of critical and private corporate data. In the past, locking everything down behind corporate firewall and network meant this was not possible. At the same time, remote work and collaboration with partners around the globe was very difficult. CIOs would like to return to the good old days but users certainly do not want that. Proper governance must be enforced with these new tools and systems.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Why everything is #hackable: Computer security is broken from top to bottom via @TheEconomist

Why everything is #hackable: Computer security is broken from top to bottom via @TheEconomist | WHY IT MATTERS: Digital Transformation | Scoop.it
OVER a couple of days in February, hundreds of thousands of point-of-sale printers in restaurants around the world began behaving strangely. Some churned out bizarre pictures of computers and giant robots signed, “with love from the hacker God himself”. Some informed their owners that, “YOUR PRINTER HAS BEEN PWND’D”.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

The Economist has made its April 08 cover "why computers will never be safe" to clearly state that we should all come to terms with the fact that improving our digital security and privacy will come from policies, rules and regulations, as it is impossible to ensure computer systems are built to be safe and un-hackable. I tend to agree with the statement and the conclusion, although I remain confident that over time the computer industry will find a way to make its systems safe by design. But we will live with a legacy of un-secure systems for many decades, so we must learn to deal with it.

argonapproach's comment, May 8, 2017 6:10 AM
nice
Curated by Farid Mheir
Get every post weekly in your inbox by registering here: http://fmcs.digital/newsletter-signup/