Warning: include(/home/frost/public_html/digitaltransformation/packages/theme_structura/themes/structura/elements/pagemeta.php): failed to open stream: No such file or directory in /home/frost/public_html/digitaltransformation/updates/concrete5.6.3.3/concrete/core/libraries/view.php on line 488

Warning: include(/home/frost/public_html/digitaltransformation/packages/theme_structura/themes/structura/elements/pagemeta.php): failed to open stream: No such file or directory in /home/frost/public_html/digitaltransformation/updates/concrete5.6.3.3/concrete/core/libraries/view.php on line 488

Warning: include(): Failed opening '/home/frost/public_html/digitaltransformation/packages/theme_structura/themes/structura/elements/pagemeta.php' for inclusion (include_path='/home/frost/public_html/digitaltransformation/libraries/3rdparty:/home/frost/public_html/digitaltransformation/updates/concrete5.6.3.3/concrete/libraries/3rdparty:.:/opt/cpanel/ea-php56/root/usr/share/pear') in /home/frost/public_html/digitaltransformation/updates/concrete5.6.3.3/concrete/core/libraries/view.php on line 488
Viewing 11 to 20 (24 Total)

Careful Application of Big Data Analytics to Prevent and Solve Crimes

Law enforcement organizations can greatly benefit from Big Data Analytics, but they must be very careful in how they apply them. They can learn lessons from customer contact organizations.
https://digitaltransformation.frost.com/expert-insights/viewpoints/careful-application-big-data-analytics-prevent-and-solve-crimes/

Bit by Bit: NIST Advances Quantum Computing

Teleportation has long been the realm of science fiction. From Douglas Adams to Isaac Asimov, storytellers have ensnared us with visions of instantaneous travel. Physical teleportation remains a fantasy. Quantum teleportation, the transfer of quantum inf…
would enable the fabled unbreakable quantum security. Photons in transport can only be read using…s digital security. That includes the common RSA algorithm and https://digitaltransformation.frost.com/expert-insights/viewpoints/bit-bit-nist-advances-quantum-computing/

The Critical Need to Halt Carhacking in Its Tracks

A disturbing new Wired magazine article illustrates the threat of carhacking and why immediate government action is needed to stop it.
threatening security issues can be sorted out. For we are like… security flaw…mouse security game of attacks and solutions that plague IT…t report that came out in October about Cybersecurity and Cars https://digitaltransformation.frost.com/expert-insights/viewpoints/critical-need-halt-carhacking-its-tracks/

MIT's "Enigma" Project Secures Cloud Computation

Google, Facebook, Dropbox... Anyone who stores your data online could give any or all of their customers' data up to the government, or hackers. How many of the services you use do you really trust with that data any further than necessary? MIT's Media La…
c incentives to keep the system functioning. Security deposits and fees ensure the continued opera…ound the processing requirements its form of security would entail. Since the first working https://digitaltransformation.frost.com/expert-insights/viewpoints/mits-enigma-project-secures-cloud-computation/

Moratorium on IoT-enabled Toys, Monitors, Until Strict Security Standards are Imposed

The dangers of IoT connected consumer devices, especially toys and monitors are so great that governments must step in with sales moratoriums until tough new security standards are developed and are in place.
the IoT security risks are so great…to understand security methods and terms like …7 by highly including continually trained IT security professionals.  The same goes for connected https://digitaltransformation.frost.com/expert-insights/viewpoints/moratorium-iot-enabled-toys-monitors-until-strict-security-standards-are-imposed/

Automakers Must Address Vehicle IoT Security Risks Immediately

Automakers must address IoT security risks in vehicles. New report by U.S. Senator Edward Markey who plans to introduce legislation with U.S. Senator Richard Blumenthal.
tical need for companies to bolster their IT security. They must especially pay attention to conne…eakable havoc that could arise with IoT with security breaches. Demonstrating how real the gaps https://digitaltransformation.frost.com/expert-insights/viewpoints/automakers-must-address-vehicle-iot-security-risks-immediately/

The Stepped-Up Need to Immediately Uncover and Address Technology Risks

Categories Tags Safety and security have always been the afterthoughts of almost… and national security to continue repeating this wretched… and security is porous https://digitaltransformation.frost.com/expert-insights/viewpoints/stepped-need-immediately-uncover-and-address-technology-risks/

GM, Toyota, and Target: Easier to do “The Wrong Thing” on Safety and Security?

Why do companies find it easier to cover up mistakes rather than preventing then, detecting them early on, and taking action, and taking full responsibility, and are extreme measures needed to break this behavior pattern?
140319.html 3.  The Target security breach…security https://digitaltransformation.frost.com/expert-insights/viewpoints/gm-toyota-and-target-easier-do-wrong-thing-safety-and-security/