Would that I was as confident.
CBR reports:
A new survey has revealed that 61% of energy security professionals believe their organisation could detect a critical system breach within 24 hours.
94% of executives agreed that their organisation is a target for cyber criminals, with 86% of respondents saying that they could detect a breach in less than one week.
49% of respondents believe their organisation could detect a cyberattack within 24 hours, while just 3% said it would take more than a month to identify it.
Read more on CBR.
For some, it’s all confident statements until
there’s a “sophisticated” attack by “state actors.”
[From
the article:
These levels of confidence notwithstanding,
Mandiant’s
M-Trends 2015 report has revealed that the average time required
to detect an advanced persistent threat on a corporate network is 205
days. Additionally, in the 2015
Data Breach Investigations Report, whose key takeaways can be
found here,
Verizon reported that two-thirds of targeted attacks generally took
months to detect.
This apparent gap in understanding is especially
significant given an analysis
earlier this year that found that the United States’ power grid
experiences targeted attacks, both digital and physical in nature,
every four days.
There's money to be made, but I find what they say
about Contracts most interesting.
John Danaher writes:
You have probably noticed it already. There is a strange logic at the heart of the modern tech industry. The goal of many new tech startups is not to produce products or services for which consumers are willing to pay. Instead, the goal is create a digital platform or hub that will capture information from as many users as possible — to grab as many ‘eyeballs’ as you can. This information can then be analysed, repackaged and monetised in various ways. The appetite for this information-capture and analysis seems to be insatiable, with ever increasing volumes of information being extracted and analysed from an ever-expanding array of data-monitoring technologies.
The famous Harvard business theorist Shoshana Zuboff refers to this phenomenon as surveillance capitalism and she believes that it has its own internal ‘logic’ that we need to carefully and critically assess.
Read more on Institute
for Ethics & Emerging Technologies.
(Related) I doubt we'll see anyone talk about a
similar here, Again, too much money.
Strange, but apparently Gawker thinks there is
evidence (that they don't already have?) that will help them defend
the lawsuit. Perhaps one of my lawyer friends could explain what
that could be.
AP reports:
A federal judge has ordered the FBI to turn over evidence related to professional wrestler Hulk Hogan’s sex tape.
Gawker sued the FBI after it refused a Freedom of Information Act request for the evidence, which could find its way into Hogan’s invasion of privacy suit against the gossip site. Hogan sued Gawker after it published parts of the sex tape in 2012.
Read more on Tampa
Bay Tribune.
Worth a try? For a passing grade, my students'
policies should include at least what this automated tool
does.
Now you have no excuse not to have a privacy
policy for your web site or business. The Office of the Privacy
Commissioner of New Zealand has launched Priv-o-matic
(I kid you not about the name!):
Get
your privacy statement sorted. It takes five minutes.
All
you’ll need is a good understanding of your business.
If you’ve been procrastinating, try using
this free tool. There are also tips provided for NZ entities
that non-NZ entities may also find informative.
Perhaps a preview of how the Internet of
(Annoying) Things will work. Imagine messages that “Alert” you
to the fact that you will need an oil change in a mere 250 mile, the
lint filter in you dryer needs to be cleared, there is a bulb out on
your Christmas tree, etc., etc. and so forth.
Chevrolet
Adds Theft Alarm Feature: Now Your Car Can Text You If It's Being
Stolen
… One of the company's newest offerings is a
safety feature that notifies owners in the unlikely event that their
vehicles are being stolen. It's already available for Buick,
Cadillac, and GMC models, and it's now available on Chevrolet
vehicles, too.
The feature is called "Theft Alarm
Notification".
… If you're an OnStar subscriber, you can
opt-in to Theft Alarm Notification and select how you'd like to be
notified when a would-be thief triggers your car alarm. You can
choose to receive a text message, email, or phone call.
Perspective.
… The five largest
publicly traded health insurance companies (UnitedHealth, Anthem,1
Aetna, Humana and Cigna) — all of which were party to an amicus
brief in support of the subsidies filed
by America’s Health Insurance Plans, a trade group for insurance
companies — rose an average of 1 percent over their opening prices
by 11 a.m. Thursday. The bounce started at approximately 10:10
a.m., right when SCOTUSblog first announced
the Supreme Court’s decision.
That rise amounted to a $3 billion increase in the
combined market capitalization of the five companies. And that
figure underestimates the decision’s real benefit to these
companies.
Another interesting toy. Forward Looking InfraRed
is the technology used in heat seeking missiles. What could possibly
go wrong?
New FLIR
One Thermal Imaging Accessory Launched for Android and iOS
… The highlight of the FLIR One accessory is
that it transforms a mobile device to into a thermal
imager that with infrared can show heat images and measures
temperature.
… The FLIR One can be attached to the
Micro-USB connector for Android or to a Lightning connector for iOS
devices. The new FLIR One is powered by an internal battery and
features a Lepton thermal camera core, which is four times the
resolution of the previous version.
The company claims that the FLIR One can show
temperature variations of less than a tenth of a degree.
A bit of an overreaction? Even in an appropriate
context, it's politically incorrect. Pretend the Civil War never
happened? (Digest Item #2)
Apple Pulls
American Civil War Games
Apple has pulled
all games from the App Store which feature the Confederate flag.
This means any and all games concerning the American Civil War have
disappeared, with Apple telling affected developers this is because
their game “includes images of the confederate flag used in
offensive and mean-spirited ways.”
This is in response to the racially motivated mass
murder at the Emanuel African Methodist Episcopal Church on June
17th. In the aftermath of the killing and the debate that ensued,
retailers
banned sales of the Confederate flag. However, Apple is going
one step further and trying to rewrite history.
In order to have their games reinstated to the App
Store, Apple is asking developers to remove all traces of the
Confederate flag. Thus ignoring the fact that, as unsavory as it may
be, the Confederate flag is a part of history. We can only imagine
Apple would remove Hitler
from the movie Downfall if it had its way.
I have students who read. Two of them!
Three Tools
to Help Students Find Books to Read This Summer
… The Book
Seer is a neat book recommendation engine that I discovered few
years ago through Kristen Swanson's Teachers
as Technology Trailblazers blog. The Book Seer is very easy to
use. To get a book recommendation just type in the title and author
of a book that you've recently read and the Book Seer will spit out a
list of related titles and authors that you might enjoy.
… Your
Next Read is a neat little site that provides you with a web of
book recommendations based on the authors and books you already like.
… Click on any of the books appearing in the web to create another
new web.
… Your
Next Read 2Titles
takes a slightly different approach to making book recommendations.
On 2Titles
you answer a series of eight questions about your personality and
interests before answering questions about books you've previously
read.
Strange promotion, but a Coke for the troops is
worth a click.
Every Click
is a Coke for the Troops
Maybe, sometimes, there isn't an App for
that, possibly.
Make your
own app with these DIY services
Appy
Pie prides itself on being simple and easy to use—hence their
tagline, “make an app, as easy as pie.” Their code-free
drag-and-drop app builder is easy to navigate (and supported with
helpful pop-ups, video tutorials, and a live chat box), and even a
complete tech newbie will be able to create a professional-looking
app in a few hours.
Como
makes app-making even easier than Appy Pie does. Como is
very similar to Appy Pie, but with one major (possibly game-changing)
difference—in the second step of Como’s app-building process,
they ask you to input your Facebook page or website URL, and then
they pull your existing content and info to create a template for
your app.
GoodBarber
is all about sexy mobile apps—heck, even their splash page is a
minimalist rainbow blend of watercolors and text. While Appy Pie
offers up a few generic stock photos, and Como gives you four or five
basic themes, GoodBarber has an entire theme library, complete with
custom fonts and high-resolution stock photos from Unsplash (a free
stock photo library).
(Related) Don't make your App too good. Dilbert
shows us why...
No comments:
Post a Comment