Security & the ‘Weaponization’ of Misinformation

New media, it would appear, now outpaces the old. More data is consumed and processed than at any time before in human history. But as we hasten into a world where the immediate is often favoured over the verified, the attention-grabbing over the considered, and the assumed over the researched in terms of how we […]… Read More

The post Security & the ‘Weaponization’ of Misinformation appeared first on The State of Security.

Continue reading Security & the ‘Weaponization’ of Misinformation

Security & the ‘Weaponization’ of Misinformation

New media, it would appear, now outpaces the old. More data is consumed and processed than at any time before in human history. But as we hasten into a world where the immediate is often favoured over the verified, the attention-grabbing over the considered, and the assumed over the researched in terms of how we […]… Read More

The post Security & the ‘Weaponization’ of Misinformation appeared first on The State of Security.

Continue reading Security & the ‘Weaponization’ of Misinformation

Amazon will truck your massive piles of data to the cloud with an 18-wheeler

img_20161130_103941 Meet AWS Snowmobile, a tractor-trailer for when your big data is just too damn big. The truck houses a container that can store up to 100 petabytes of data. Real-life data hoarders can contract Amazon to move exabytes of data to the cloud using the new tricked-out trucks. Snowmobile attaches directly to your data center with power and network fibre to move critical information to AWS,… Read More Continue reading Amazon will truck your massive piles of data to the cloud with an 18-wheeler

What pool of top cybersecurity talent? It does not exist.

I was struck by a recent bleat that Whitehall is not “cool” enough to attract top cybersecurity talent. There is no pool of “top cyber security talent”. There are ten vacancies for every candidate. And the quality and motivation of many of the candidat… Continue reading What pool of top cybersecurity talent? It does not exist.

Hutton Hotel Warns of Payment Card Breach That Lasted Over 3 Years

Hutton Hotel became the latest hospitality company to warn customers of a data breach that may have compromised their payment card details. The Nashville, Tenn.-based upscale hotel announced the security incident on Friday, stating it was notified of the potential breach by its payment processor. Subsequently, the company said it began an investigation, engaging a […]… Read More

The post Hutton Hotel Warns of Payment Card Breach That Lasted Over 3 Years appeared first on The State of Security.

Continue reading Hutton Hotel Warns of Payment Card Breach That Lasted Over 3 Years

Collaboration Is Key to Information Security

The challenges facing security professionals certainly aren’t getting any easier – nor are they likely to do so anytime soon. Not only are the skills and knowledge that we need to operate evolving at an ever-relentless pace but also rapidly diversifying far beyond the familiar technical and governance areas we have been used to. When it […]… Read More

The post Collaboration Is Key to Information Security appeared first on The State of Security.

Continue reading Collaboration Is Key to Information Security