Video Screencast Help
IT Industry Trends
Showing posts tagged with Information Security
Showing posts in English
Guido Sanchidrian | 08 Aug 2012 | 0 comments

"Big Data" is one of the new buzzwords in IT. So it was just a question of time when "Big Data" hits the Information Security arena. Last week I saw a press release from Information Security Forum (ISF) - a very well established non-profit association of leading organisations from around the world. Their latest report shows how "Big Data analytics can improve information security and increase cyber resilience".

For sure "Big Data" analytics have become a standard practice in many aspects of business. Data warehousing, Business Intelligence, visualisation and a variety of sophisticated analyses are commonplace.

In their press release ISF say that "...the insights they [sophisticated analyses] can provide are not yet being widely realised in information security".


My initial thought whilst reading the press...

Guido Sanchidrian | 26 Jul 2012 | 0 comments

Today I found a small article in my daily RSS feeds titled "Miracle Battery-Saver App Harvests Email Addresses for Spamming". The article is a brief analysis of a malicious application that tricks the user by pretending to do something great for saving his/her mobile phone battery life.
It immediately raised a foundational question in my mind: Why do people still trust those type of miracle offers, even clicking on "allow" to the application's permission request to read the user's contacts data (in order to acquire the personal data) and the second permission asks to access the Internet (in order to upload the personal data)?

Theoretically, Spam and its associated malicious code should be extinct already, because every computer user should be aware more or less that this bad stuff exist, and should be suspicious...

Guido Sanchidrian | 03 Jan 2012 | 1 comment

In my last Blog article I wrote about the challenges of mobility and I outlined how to stay secure online whilst traveling. In general, information access is becoming mobile and device-agnostic. This results into new risk implications.

First, everything is revolving around people and information. Devices like desktops, laptops, tablets or smartphones are irrelevant. The most popular devices today won't likely have the same popularity three years from now. Also the applications don't matter that much, because it is not important if organisations use on-premise mail server today and tomorrow they use a cloud-based email service. It is just about getting the information from one place to another. What matters is the people and the intellectual property, the formula to the new chemical compound for example, or credit card details. It is about the data, and the information.