Tag: big data

This blog post was written by Nick Viney. The Internet of Things (IoT) has already helped to connect our world in so many ways, bringing huge improvements and convenience to our lives, homes and health. But we’re often guilty of taking it for granted and failing to celebrate the many ways in which being connected ...
Read Blog
This blog post was written by Nick Viney. When we think about the 'Internet of Things' (IoT) in sports and fitness, the first things which spring to mind are probably wearable devices, or health monitoring apps that track performance and targets. However, it’s not just activity monitoring hardware that is shaking up the world of ...
Read Blog
This blog post was written by Nick Viney. As recent headlines have highlighted, one thing is clear; there is still a lot of work that needs to be done in the world of cybersecurity. Whether it is companies being breached or personal data being offered to the highest bidder, it is an incredibly challenging job ...
Read Blog
This blog post was written by Nick Viney. With the rapid growth of the Internet of Things (IoT) and data breaches, careers in cybersecurity are becoming much more desirable. Many who choose the path come from backgrounds in maths, computer science, history or philosophy, and as technology becomes more prominent, so does cyber crime. A ...
Read Blog
Los entendidos de la ciencia ficción creen que la Inteligencia Artificial trata sobre encontrar patrones, al aprender con los errores, dividir problemas, y adaptarse para lograr objetivos específicos. Pero la verdad es que la Inteligencia Artificial es una serie de herramientas de lógica increíbles, que permiten la progresión metodológica en el procesamiento de datos. Parece complejo, pero ...
Read Blog
Os entendidos em ficção científica acreditam que Inteligência Artificial é sobre encontrar padrões, aprendendo com os erros, dividindo problemas, e adaptando-se para conseguir objetivos específicos. Mas na verdade IA é uma série de ferramentas de lógica incríveis que permitem progressão metodológica no processamento de dados. Parece complexo, mas quando olhamos para seus componentes base torna-se fácil de ...
Read Blog
Event correlation is the real return on a SIEM investment. In a properly secured network, at least a dozen types of security devices generate events with potentially critical information on ongoing attacks, holes in the network, or operational concerns. SIEM correlation’s job is to turn all this data into a prioritized to-do list for security ...
Read Blog
“On the Internet, nobody knows you’re a dog”.  More appropriately: “On the internet, nothing knows you’re a dog”. An emerging risk in the Internet of Things (IoT)  is associated with the quality of data related to “things”.  The risk is not that the data on or in the thing is corrupted itself. The risk  it ...
Read Blog
Late on July 10, Microsoft released a blog post disclosing that they were aware of a zero-day attack in the wild. This attack exploits a previously unpatched Internet Explorer vulnerability (CVE-2013-3163). It’s interesting that the vulnerability was just patched in this month’s Patch Tuesday (July 9), which is perhaps only a coincidence. Although we do ...
Read Blog