A news study from Tech Pro Research reveals that IT security is a growing concern, with more oganizations planning to increase their security spending in 2014.
Many will no doubt be disconcerted over the revelation that real spies roam virtual lands. But they probably wouldn't if they knew who else was likely there and remembered that just because you are alone with your computer does mean you are alone online. Somehow that simple fact continues to elude the masses.
"Those who are rejoicing over the postponement shouldn't pop the champagne corks yet, though," writes Martha Bennett, an analyst at Forrester. "While the extra time is no doubt welcome, headlines such as 'Victory for tech giants on EU data laws' are premature: nothing is finalized, and there is still the chance that the final version is rather more restrictive than many would hope."
Oh yes, we all should worry, lest our efforts with big data meet an untimely end before they barely breathe life. But also because each of us is caught in that big data net and all of us have been flayed and stripped of privacy.
Several IT security firms have released predictions for 2014 in the past couple of weeks, and Kroll has added its Cyber Security Forecast to the growing chorus.
The end of the year is a traditional time to make predictions for the year ahead. Seven leading IT security companies share their thoughts on what is ahead in the New Year.
While I use a considerable number of pixels detailing what marketers get and do wrong in their big data use, I do like to also acknowledge efforts to do right in marketing.
A new field guide offers help in identifying the types of people who are behind the threats to your systems. Some are people you know, others you will never meet.
The new AvePoint governance product has been retooled to work in a hybrid SharePoint 2013 environment.
Yes, LG got busted spying on consumers via Smart TVs. But this is not the only case of using devices to spy on consumers in their homes. Expect a new industry to arise soon in privacy protection which will likely include user-friendly data transmission detectors, device mods, advanced filters, code disruptors (a new kind of anti-virus aimed at manufacturers' coding) and other means for consumers to protect themselves from the items they own.