WHY IT MATTERS: Digital Transformation
215.3K views | +3 today
Follow
WHY IT MATTERS: Digital Transformation
Get weekly or monthly digest of all posts in your inbox: https://fmcs.digital/wim-subscribe
Curated by Farid Mheir
Your new post is loading...

Popular Tags for this blog

Current selected tags: 'Security', 'Technology'. Clear
Scooped by Farid Mheir
Scoop.it!

When Your Employees Post Passwords Online in public Trello boards and other public SaaS solutions you may have serious data security issues via @brianKrebs #KrebsOnSecurity

When Your Employees Post Passwords Online in public Trello boards and other public SaaS solutions you may have serious data security issues via @brianKrebs #KrebsOnSecurity | WHY IT MATTERS: Digital Transformation | Scoop.it

Last month’s story about organizations exposing passwords and other sensitive data via collaborative online spaces at Trello.com only scratched the surface of the problem. A deeper dive suggests a large number of government agencies, marketing firms, healthcare organizations and IT support companies are publishing credentials via public Trello boards that quickly get indexed by the major search engines.

Farid Mheir's insight:

WHY IT MATTERS: this article is a reminder that the use of public software as a service tools may lead to exposure of critical and private corporate data. In the past, locking everything down behind corporate firewall and network meant this was not possible. At the same time, remote work and collaboration with partners around the globe was very difficult. CIOs would like to return to the good old days but users certainly do not want that. Proper governance must be enforced with these new tools and systems.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Canada’s Digital ID Future - white paper by Canadian Bankers makes the case for creation of a national federated #digitalID system and regulation - I agree! #security #privacy 

Canada’s Digital ID Future - white paper by Canadian Bankers makes the case for creation of a national federated #digitalID system and regulation - I agree! #security #privacy  | WHY IT MATTERS: Digital Transformation | Scoop.it

In this brief, we highlight why Canada needs a digital identity system, how other countries have made progress in this area and the lessons we can learn from those experiences to build a system in Canada.

Farid Mheir's insight:

WHY IT MATTERS: digital identification is at the base of the digital pyramid of needs. This white papers details the requirements for a national digital identification system that includes proper government regulations. FINALLY!

For more on the digital pyramid of needs: http://fmcs.digital/blog/pyramid-of-digital-needs/ 

No comment yet.
Scooped by Farid Mheir
Scoop.it!

100 days before #cyberattacks are detected is too much as reported by M-Trends 2018 #Cyber Security Trends

100 days before #cyberattacks are detected is too much as reported by M-Trends 2018 #Cyber Security Trends | WHY IT MATTERS: Digital Transformation | Scoop.it

The annual report was compiled by mandiant consultants at FireEye based on hundreds of incident response investigations in many industry sectors. It offers recommendations on how organizations can improve the way they prevent, detect, analyze and respond to cyber attacks.

Farid Mheir's insight:

WHY IT MATTERS: this detailed report on cyber security trends shows an alarming statistic: it takes almost 100 days to detect an intrusion into computer systems. Why is that, given that data security and privacy are so important? Not enough resources? Lack of trained personnel? Hackers too good? Read to find out.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Potent malware that hid for six years spread through routers #security #hacking

Potent malware that hid for six years spread through routers #security #hacking | WHY IT MATTERS: Digital Transformation | Scoop.it

Nation-sponsored Slingshot is one of the most advanced attack platforms ever.

Farid Mheir's insight:

WHY IT MATTERS: malware and viruses are everywhere but it looks like this one was particularly well crafted. Goes to show that state of malware has become very advanced. Protection becomes essential.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Edward Snowden created an app that turns smartphones into security systems aimed at thwarting spies

Edward Snowden created an app that turns smartphones into security systems aimed at thwarting spies | WHY IT MATTERS: Digital Transformation | Scoop.it
Edward Snowden, the former National Security Agency contractor and notorious whistleblower, just launched a new app, Haven.
Farid Mheir's insight:

WHY IT MATTERS: a new twist on security cameras mean there may be a life for all those old phones lying around. If you are a programmer you can also look at the source code to find out how they do what they do...

Scooped by Farid Mheir
Scoop.it!

Cyber-Risk & Resilience 2017 details large-scale #cyberattacks & #online threats to #businesses are rising exponentially #tech #digital #data #business #hack #blockchain via @Raconteur @kuriharan

Cyber-Risk & Resilience 2017 details large-scale #cyberattacks & #online threats to #businesses are rising exponentially #tech #digital #data #business #hack #blockchain via @Raconteur @kuriharan | WHY IT MATTERS: Digital Transformation | Scoop.it

In an evermore connected world, large-scale cyberattacks and online threats to businesses are rising exponentially. The Cyber-Risk & Resilience special report, published in The Sunday Times, features insights into the impact cybercriminals can inflict on organisations and individuals. From chatbots spreading fake news, risks concerning personal data, biometrics and fraud, as well as tackling phishing emails, the potential dangers are unprecedented. Also included is an infographic on why hackers hack and an article on the top five ways quantum computing will change cybersecurity for good.

Farid Mheir's insight:

WHY IT MATTERS: the more we digitize our businesses and our lives the more we are exposed to hacking. The explosion of cryptocurrencies hacking and recent months appears to be a strong trend. A great series of articles on the subject is presented here.

Кирилл Беличенко's curator insight, November 30, 2022 6:42 AM

Zagrożenia internetowe i statystyki hakerskie

Scooped by Farid Mheir
Scoop.it!

45 Billion Cameras by 2022 Fuel Business Opportunities for better and for worse #security #privacy #AI #robots

45 Billion Cameras by 2022 Fuel Business Opportunities for better and for worse #security #privacy #AI #robots | WHY IT MATTERS: Digital Transformation | Scoop.it

Exclusive research by us at LDV Capital is the first publicly shared, in-depth analysis which estimates how many cameras will be in the world in 2022. Key Findings include:

  • Most of the pictures captured will never be seen by a human eye.
  • A paradigm shift will take place in the meaning and use of a camera.
  • Over the next five years there will be a proliferation of cameras integrated into products across industries and markets.
  • Where there is growth in cameras there will be tremendous business opportunities in the capture, analysis and interpretation of visual data.
  • Depth capture will double the number of cameras in handheld cameras.
  • By 2022, the number of cameras will be nearly 12X the 2012 figures.
  • Your smartphone will have between 4 and 10 cameras by 2022.
  • The Internet of Eyes will be larger than the Internet of Things.
  • In the next five years, robotics will have 20X more integrated cameras.
  • By 2022, all new vehicles will be equipped with more than 25 cameras and this does not include Lidar or Radar.
Farid Mheir's insight:

WHY IT MATTERS: cameras will become ubiquitous and AI systems will analyze those images to provide business services but also track our every move. This reports presents trends in this area.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

The Periodic Table of Cybersecurity Startups @CBinsights

The Periodic Table of Cybersecurity Startups @CBinsights | WHY IT MATTERS: Digital Transformation | Scoop.it

A periodic table of cybersecurity to navigate the key players in the space, including startups, industry categories, investors, and exits.

Farid Mheir's insight:

WHY IT MATTERS: with digital transformation often comes increased level of digital threats. Good to keep in mind that there are tools to help reduce the risk of attacks or their impact when they happen.

Ocean´s five's curator insight, October 31, 2017 6:44 AM
Las 140 startup de la tabla periódica. Así son las empresas que definen la industria de seguridad cibernética. Entre las categorías se encuentran:

-Seguridad móvil: Zimperium y Appthority.

-Cyber Insurance: RedSeal Networks y Cyence.

-Administración de identidad y acceso: OneLogin.

-Seguridad de red y punto final: Tanium, Cloudflare , Illumio y Zscaler .

-Seguridad contra el fraude:ThreatMetrix.
Scooped by Farid Mheir
Scoop.it!

4% to 10% of #web #encrypted #https traffic is intercepted

4% to 10% of #web #encrypted #https traffic is intercepted | WHY IT MATTERS: Digital Transformation | Scoop.it
Overall we found out that HTTPS interceptions are more prevalent than expected (4% - 10%) and pose serious security risks as they downgrade the encryption used to secure web communications. Furthermore, the HTTPS implementations used for interception do not have the same automatic update mechanisms that browsers do, making fixes less likely to be rolled out. Intercepting middleboxes have also contributed to the delayed release of TLS 1.3 in browsers. It is our hope that raising awareness around this issue will help software vendors that rely on interception to realize the risks of this practice.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

This is a technical article that sheds light onto a potential security risk that all digital professionals should be aware of as we generally assume that SSL and HTTPS will keep our conversations secure over the Internet.

Кирилл Беличенко's curator insight, November 30, 2022 6:44 AM

Statystyki włamań do stron internetowych i kradzieży danych

Scooped by Farid Mheir
Scoop.it!

Your #heart can be #hacked: FDA recalls half-a-million pacemakers over hacking fears

Your #heart can be #hacked: FDA recalls half-a-million pacemakers over hacking fears | WHY IT MATTERS: Digital Transformation | Scoop.it

Turns out former Vice President (and erratic shooter) Dick Cheney was right all along: Your heart can be hacked. At least if you have a pacemaker, that is. On Tuesday, the FDA recalled 465,000 of the medical devices -- the ones that help control your heart beat -- citing security vulnerabilities. The pacemakers, which come from health company Abbott (formerly St. Jude Medical), require a firmware update. Fortunately, it can be installed by a health care provider in just three minutes.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

Was just a question of time before it happened. Everything is connected and the trend is clear that nothing will escape the insertion of software into all kinds of devices. You have to know which ones are safe and which ones are not.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

#bitcoin mining is huge business - look at how profitable is Bitmain, a chinese R&D custom mining hardware

#bitcoin mining is huge business - look at how profitable is Bitmain, a chinese R&D custom mining hardware | WHY IT MATTERS: Digital Transformation | Scoop.it

Bitmain will probably make around $200M-$250M in profits this year just from their BM1387 chip (they have other products, including a Scrypt ASIC). Even after including ongoing R&D and other future investment, they are likely worth well over $1 Billion as a business and are probably the largest and most profitable company in Bitcoin.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

With bitcoin value at 4K$ USD, companies that specialize in dedicated hardware to mine bitcoins have become more profitable than ever. I find it interesting that this one, bitmain, which appear to be the leader, is Chinese. Morever, one should notice that mining bitcoin is very similar to cracking password or encryption, but it seems that these devices cannot be used for that purpose (https://security.stackexchange.com/questions/62800/is-it-possible-to-use-bitcoin-miners-to-decrypt-files-communication ) . however, the expertise can easily be refocussed on password cracking of encryption.

Scooped by Farid Mheir
Scoop.it!

How a digital footprint is used to track you online and how to erase it

How a digital footprint is used to track you online and how to erase it | WHY IT MATTERS: Digital Transformation | Scoop.it
Anonymity, like security, has many layers. Observers have developed methods of piercing anonymity which involve differing levels of technology.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

A relatively technical explanation of the methods used to track people on the web.

Adam MacGregor's curator insight, November 27, 2017 1:28 PM
An amazing guide on how to strengthen your digital profile. This link teaches you how to reduce the amount of info that goes onto the web.
Scooped by Farid Mheir
Scoop.it!

How to remain completely #anonymous and hidden #online

How to remain completely #anonymous and hidden #online | WHY IT MATTERS: Digital Transformation | Scoop.it
These are the steps you can take and the tools you'll need to remain anonymous and hidden online. Tor, VPN, burner emails, encryption, bitcoin, etc.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Discusses different solutions to remain anonymous online, from TOR to bitcoins.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Cybersecurity make headlines: How Business Is Protecting Itself is Fortune magazine July cover

Cybersecurity make headlines: How Business Is Protecting Itself is Fortune magazine July cover | WHY IT MATTERS: Digital Transformation | Scoop.it
Businesses are under attack from cybercriminals. Here’s what companies are doing to safeguard their digital assets from hackers.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Do I really need to say why. Just read it.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

How one man managed to Accidentally Stop a Global Cyber Attack and how he did it #wannaCrypt #malware

How one man managed to Accidentally Stop a Global Cyber Attack and how he did it #wannaCrypt #malware | WHY IT MATTERS: Digital Transformation | Scoop.it
I believe they were trying to query an intentionally unregistered domain which would appear registered in certain sandbox environments, then once they see the domain responding, they know they’re in a sandbox the malware exits to prevent further analysis. This technique isn’t unprecedented and is actually used by the Necurs trojan (they will query 5 totally random domains and if they all return the same IP, it will exit); however, because WannaCrypt used a single hardcoded domain, my registration of it caused all infections globally to believe they were inside a sandbox and exit…thus we initially unintentionally prevented the spread and and further ransoming of computers infected with this malware. Of course now that we are aware of this, we will continue to host the domain to prevent any further infections from this sample.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Every system has its flaws, even malware and viruses. You just have to find them. This guy did and managed to stop a recent very bad version called WannaCrypt and this his explanation of how he did it. Fascinating read.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

More reasons to enable #2FA 2 factor authentication, never reuse #password & register to @HaveIbeenPwned

More reasons to enable #2FA 2 factor authentication, never reuse #password & register to @HaveIbeenPwned | WHY IT MATTERS: Digital Transformation | Scoop.it
The short version: I'm loading over 1 billion breached accounts into HIBP. These are from 2 different "combo lists", collections of email addresses and passwords from all sorts of different locations. I've verified their accuracy (including my own record in one of them) and many hundreds of millions of the
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Pretty much your whole life is online and digitize today. Your only protection from crooks is strong passwords that you never reuse. This article provides in depth discussion on the millions of passwords that are being sold for few dollars on the dark web. It should help you understand why this is important and what to do to be more secure.

argonapproach's comment, May 8, 2017 6:09 AM
good
Scooped by Farid Mheir
Scoop.it!

Two Factor Authentication Tutorials guides you to turn on #2FA on most popular websites #DO-IT #NOW

Two Factor Authentication Tutorials guides you to turn on #2FA on most popular websites #DO-IT #NOW | WHY IT MATTERS: Digital Transformation | Scoop.it
Many of the world’s largest online and mobile properties offer 2FA to help prevent fraudulent activity and protect your accounts. To see if the sites and apps you use offer 2FA, and to get detailed step-by-step instructions on how to Turn It On, start here.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Maybe the most important security measure you can take today, this 2FA website gives step-by-step guidance on how to enable it on most popular websites like Apple, Google, Facebook and others. 

For more on protection your digital self, read this blog post and do the other 9 actions in there: http://fmcs.digital/blog/digital-moi-get-started-10-actions/ 

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Why everything is #hackable: Computer security is broken from top to bottom via @TheEconomist

Why everything is #hackable: Computer security is broken from top to bottom via @TheEconomist | WHY IT MATTERS: Digital Transformation | Scoop.it
OVER a couple of days in February, hundreds of thousands of point-of-sale printers in restaurants around the world began behaving strangely. Some churned out bizarre pictures of computers and giant robots signed, “with love from the hacker God himself”. Some informed their owners that, “YOUR PRINTER HAS BEEN PWND’D”.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

The Economist has made its April 08 cover "why computers will never be safe" to clearly state that we should all come to terms with the fact that improving our digital security and privacy will come from policies, rules and regulations, as it is impossible to ensure computer systems are built to be safe and un-hackable. I tend to agree with the statement and the conclusion, although I remain confident that over time the computer industry will find a way to make its systems safe by design. But we will live with a legacy of un-secure systems for many decades, so we must learn to deal with it.

argonapproach's comment, May 8, 2017 6:10 AM
nice
Scooped by Farid Mheir
Scoop.it!

Fake Chrome Font Pack Update Alerts Infecting Visitors with Spora Ransomware via @BleepinComputer1

Fake Chrome Font Pack Update Alerts Infecting Visitors with Spora Ransomware via @BleepinComputer1 | WHY IT MATTERS: Digital Transformation | Scoop.it
Yesterday, Brad Duncan, a Threat Intelligence Analyst for Palo Alto Networks Unit 42, wrote a blog article discussing how the EITest Chrome Font Update campaign, which was previously discovered by Kafeine, is now distributing the Spora Ransomware instead.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

I wrote about social engineering in the past and find this to be one of the most important security concern we should have when thinking about digital transformation: the end user. It is essential to educate users so they do not fall prey to scams like this one.

 

See here fro more on this topic: fmcs.digital/blog 

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Mitigating the Risks of Social Login via @hbr

Mitigating the Risks of Social Login via @hbr | WHY IT MATTERS: Digital Transformation | Scoop.it

These third party login tools promise more traffic, more subscribers, more members, more customers and more sales — and those promises have come true: as some have noted, up to 80% of web users choose Facebook Connect or another social authentication option when it’s available (as opposed to signing up for a site with their email address), and Facebook itself has claimed that social authentication increases registration by 30-200%. (...) But is that promise worth the price of losing direct access to your customers’ contact information and profiling information — or for that matter, direct access to customers themselves?

Farid Mheir's insight:

WHY THIS IS IMPORTANT

Social logins are very useful but they carry security and privacy concerns that every company must examine as they move to digitalize everything. In "Kill the password" (fmcs.digital/blog/kill-the-password-a-string-of-characters-wont-protect-you/), the author shows the impact of having multiple websites and applications connected with one another. This is a security concern that must be addressed, mitigated or at the very least highlighted so that everyone involved is aware of the risks and the benefits.

Other articles:

axiomzaftig's comment, February 6, 2017 10:05 PM
Good
heartbeatdisc's comment, February 6, 2017 10:23 PM
Breathtaking...!!
Wo's curator insight, February 10, 2017 7:18 AM
Let the word spread :)
Scooped by Farid Mheir
Scoop.it!

Proactive Defense: Understanding the 4 Main Threat Actor Types

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Key Takeaways

  • Understanding the four main threat actor types is essential to proactive defense.
  • Cyber criminals are motivated by money, so they’ll attack if they can profit.
  • Hacktivists want to undermine your reputation or destabilize your operations. Vandalism is their preferred means of attack.
  • State-sponsored attackers are after information, and they’re in it for the long haul. They’re difficult to identify, so you’ll need to be on top of your security.
  • Insider threats could be malicious, but they could also be well-meaning people who have been led astray. Training and user behavior analytics are the way forward.
Farid Mheir's insight:

Good to know.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

The Internet Health Report: @mozilla 

The Internet Health Report: @mozilla  | WHY IT MATTERS: Digital Transformation | Scoop.it

Mozilla’s new open source initiative to document and explain what’s happening to the health of the Internet. Combining research from multiple sources, we collect data on five key topics and offer a brief overview of each.

Farid Mheir's insight:

Mozilla has always been promoting Internet security and privacy and this new report paves the way for a very interesting ongoing look at key elements of the public Internet.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Meet your digital twin & the #digital #exhaust you leave behind via @fmheir #PrivacyAware 

Meet your digital twin & the #digital #exhaust you leave behind via @fmheir #PrivacyAware  | WHY IT MATTERS: Digital Transformation | Scoop.it

You have a twin – a “digital” twin. It does everything you do.

The same way you exercise your body to stay fit, or brush your teeth to prevent long-term decay and problems, your digital twin needs care so that it does not become a problem in the future. Get to know this twin and you can manage it, secure it and protect it. Here is how to do this.

 

Farid Mheir's insight:

Read this important post to understand just how many traces we leave behind as we lead our daily lives.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Are You Sure You Want to Know What Google/Apple/Facebook Knows About You? #privacyAware @dataPrivacyDay 

Are You Sure You Want to Know What Google/Apple/Facebook Knows About You? #privacyAware @dataPrivacyDay  | WHY IT MATTERS: Digital Transformation | Scoop.it

The Wall Street Journal did an interesting piece looking at Google, privacy and the extent of their knowledge (as well as other entities like Facebook). I suggest you read it for the details. The following image gives some insight into just how much Google has on one WSJ reporter.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

On this Data Privacy Day 2017, I thought I would review what Google, Apple, Facebook and others know about me. Unfortunately, it looks like this information is difficult to find and pretty much the only data we can find is from Google. So, let's assume Apple, Facebook, twitter, and others know as much if not more.

Google tools that will show you what they know about you:

Other articles about those tools:

Wo's curator insight, January 31, 2017 3:05 PM
Yut got to know this!
Scooped by Farid Mheir
Scoop.it!

Your #browser has a 'fingerprint' & online #trackers use it to follow your online activity #PrivacyAware 

Your #browser has a 'fingerprint' & online #trackers use it to follow your online activity #PrivacyAware  | WHY IT MATTERS: Digital Transformation | Scoop.it
Online tracking is no longer about "cookies." New technology helps trackers link online breadcrumbs — including across devices — through browser settings, battery levels and other details.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

We are being tracked everywhere as I reported in a previous article about behavioral tracking: http://fmcs.digital/blog/behavioral-tracking-explained-in-9min-video-by-gary_kovacs-via-ted-mustsee-privacyaware-dataprivacyday/ 

This new tracking method is very clever as it uses your browser configuration settings to derive an almost unique fingerprint to track you everywhere, even in the absence of cookies or ad beacons on a web page. On this Data Privacy day 2017, be aware, and be careful.

Curated by Farid Mheir
Get every post weekly in your inbox by registering here: http://fmcs.digital/newsletter-signup/