WHY IT MATTERS: Digital Transformation
214.9K views | +8 today
Follow
WHY IT MATTERS: Digital Transformation
Get weekly or monthly digest of all posts in your inbox: https://fmcs.digital/wim-subscribe
Curated by Farid Mheir
Your new post is loading...

Popular Tags for this blog

Current selected tags: 'Technology', 'Strategy', 'Security'. Clear
Scooped by Farid Mheir
Scoop.it!

This #startup AID:Tech is creating legal identities for a billion people and makes the case why having a #digitalIdentity has become essential for us all via @WEForum

This #startup AID:Tech is creating legal identities for a billion people and makes the case why having a #digitalIdentity has become essential for us all via @WEForum | WHY IT MATTERS: Digital Transformation | Scoop.it

A billion people in the world have no legal identity. Without an ID they can’t open a bank account, get a loan, or even vote. Now a tech entrepreneur has come up with an answer.

Farid Mheir's insight:

WHY IT MATTERS: an amazing article from WEF about how important digital identity is. The diagram is also a great summary of the potential use cases for digital IDs. In short: its way more than a digital version of your passport.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Canada’s Digital ID Future - white paper by Canadian Bankers makes the case for creation of a national federated #digitalID system and regulation - I agree! #security #privacy 

Canada’s Digital ID Future - white paper by Canadian Bankers makes the case for creation of a national federated #digitalID system and regulation - I agree! #security #privacy  | WHY IT MATTERS: Digital Transformation | Scoop.it

In this brief, we highlight why Canada needs a digital identity system, how other countries have made progress in this area and the lessons we can learn from those experiences to build a system in Canada.

Farid Mheir's insight:

WHY IT MATTERS: digital identification is at the base of the digital pyramid of needs. This white papers details the requirements for a national digital identification system that includes proper government regulations. FINALLY!

For more on the digital pyramid of needs: http://fmcs.digital/blog/pyramid-of-digital-needs/ 

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Cybersecurity make headlines: How Business Is Protecting Itself is Fortune magazine July cover

Cybersecurity make headlines: How Business Is Protecting Itself is Fortune magazine July cover | WHY IT MATTERS: Digital Transformation | Scoop.it
Businesses are under attack from cybercriminals. Here’s what companies are doing to safeguard their digital assets from hackers.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Do I really need to say why. Just read it.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Proactive Defense: Understanding the 4 Main Threat Actor Types

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Key Takeaways

  • Understanding the four main threat actor types is essential to proactive defense.
  • Cyber criminals are motivated by money, so they’ll attack if they can profit.
  • Hacktivists want to undermine your reputation or destabilize your operations. Vandalism is their preferred means of attack.
  • State-sponsored attackers are after information, and they’re in it for the long haul. They’re difficult to identify, so you’ll need to be on top of your security.
  • Insider threats could be malicious, but they could also be well-meaning people who have been led astray. Training and user behavior analytics are the way forward.
Farid Mheir's insight:

Good to know.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

The Internet Health Report: @mozilla 

The Internet Health Report: @mozilla  | WHY IT MATTERS: Digital Transformation | Scoop.it

Mozilla’s new open source initiative to document and explain what’s happening to the health of the Internet. Combining research from multiple sources, we collect data on five key topics and offer a brief overview of each.

Farid Mheir's insight:

Mozilla has always been promoting Internet security and privacy and this new report paves the way for a very interesting ongoing look at key elements of the public Internet.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Forrester Wave: Digital Risk Monitoring 

Forrester Wave: Digital Risk Monitoring  | WHY IT MATTERS: Digital Transformation | Scoop.it

When it comes to the myriad risks companies face across digital channels — social, mobile, and web — security and risk (S&R) pros track a much smaller portion of their environment than they realize. Without comprehensively and persistently monitoring risk in digital channels, companies remain susceptible to a wide variety of brand, cyber, and physical risk events. Despite the high stakes, many organizations struggle to improve digital risk visibility and mitigate related risks.

Farid Mheir's insight:

Use this link to access the Forrester report for free on solutions to help protect your organization from the digital threats your corporation faces on its brand, cyber presence or physical locations.

 

WHY THIS IS IMPORTANT

First, the paper describes the various risks you may face in a digital world. If you don'T know the difference between OSINT, TECHINT, SIGINT, HUMINT, CHINT then you must read it.

Good to know.

Second, it lists the various ways in which you can protect yourself.

Interesting.

Finally, it lists tools you can use to secure your company.

Useful.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

2016 Trusted Access Report: The current state of device security health

2016 Trusted Access Report: The current state of device security health | WHY IT MATTERS: Digital Transformation | Scoop.it

5 key recommendations

  1. Don’t reject BYOD — be prepared for it. Give your IT administrators actionable data on device ownership and health that can inform risk-based access control decisions.
  2. Encourage safe computing practices and good security hygiene, such as running regular security updates or using device encryption, passcodes and additional authentication to protect systems and data.
  3. Configure systems and deploy policies that enable automatic updates for as much software as possible to remove some of the friction that users feel when manually installing updates. We found that an overwhelming number of out-of-date browsers and systems don’t take basic steps like enabling automatic updates.
  4. Switch to browser platforms that update more frequently and automatically, like Google Chrome.
  5. Disable Java and prevent Flash from running automatically on corporate devices, and enforce this on user-owned devices through endpoint access policies and controls.
Farid Mheir's insight:

DUO security publishes a report on security findings from over 2M devices its software is installed on and provides recommendations from its findings

 

WHY THIS IS IMPORTANT

Security is better, it seems, when users use software that update themselves automatically. Unfortunately, because enterprises have to pay to keep software up to date, most computers are out of date from a security standpoint. Leaders should prioritize keeping systems up to date or favour solutions with automated and free updates. As the paper describes, there are many out there, you just have to look for them carefully.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Your smartphone is leaking your information

This talk was given at a local TEDx event, produced independently of the TED Conferences. Bram is a PhD student in computer science at the Expertise Centr
Farid Mheir's insight:

An 8 minute video that will make you rethink your hunt for free wifi in public spaces...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Security researchers identify 1,600 Internet of Things devices with a drone over Texas

Security researchers identify 1,600 Internet of Things devices with a drone over Texas | WHY IT MATTERS: Digital Transformation | Scoop.it
Praetorian tracking all IoT devices in Austin, Texas running on ZigBee protocol, similar to the Shodan scanner.
Farid Mheir's insight:

A project has been devised to map all internet of things devices in the Austin Texas area, and identify vulnerabilities. Cool demonstrations of what you can do with a drone and some technology skills.


See the full map here:

https://www.praetorian.com/iotmap/ 


WHY THIS IS IMPORTANT?

There will be 9B IoT devices soon and many more in the future. Great opportunities but it needs to be safe and private.

Tracy Harding's comment, September 1, 2015 9:19 AM
You need to work on formatting of your replies. This is one giant sentence. Remember the requirements. You need a 2-3 sentence summary, at least 1 sentence of IR implications and 1 sentence about your thoughts.
Farid Mheir's comment, September 1, 2015 9:23 AM
@Tracy Harding: not sure I understand your comment re: formatting. Can you be more specific and email me a screengrab? thank you!
Farid Mheir's comment, September 1, 2015 9:24 AM
@Jake D'Imperio gis thank you for the comment!
Curated by Farid Mheir
Get every post weekly in your inbox by registering here: http://fmcs.digital/newsletter-signup/