Permettez-moi de vous présenter les 5 tendances des administrations fiscales que Shaun Barry a présentées lors du « Tax Summit in Madrid » en octobre dernier. Que signifie le Cloud Intelligent ? La Sécurité Les Stratégies Data ont le vent en poupe OSINT - L’open source intelligence La montée de la
Tag: cybersecurity
Often, when a cybersecurity incident occurs, the clues to how it happened and who caused it are hidden in network data. In the example discussed here, data scientists were asked to identify who caused a global internet outage by examining a large graph of network data with data visualization. This
Vivimos en la era de la hiperconectividad, nos comunicamos con el mundo en un entorno cada vez más digital. Y, precisamente, una de las principales consecuencias del COVID-19, al margen de las sanitarias y las socioeconómicas, ha sido una significativa aceleración de la digitalización tanto a nivel individual como empresarial.
La seguridad informática es un problema constante en las empresas, pero las soluciones como la analítica llegaron para redefinir y potenciar la ciberseguridad. Es común pensar que los hackers vulneran la seguridad de una empresa de la noche a la mañana, infectando la red y robando datos en cuestión de
You never saw it coming. No indicators of attack on your financial data. Then, you get a letter. Your financial information was exposed in a massive data breach. What do you do now? Your identity is forever at risk. Unfortunately, you can't change where you used to live, when you last
Operators of transmission networks and wholesale electric markets – ISOs (Independent System Operator) and RTOs (Regional Transmission Organizations) – have undergone sweeping changes in recent years, and the pace won’t be letting up anytime soon. With opportunities ranging from the growth of renewables to newly data-rich operating environments, and challenges
Security analytics has gotten a lot of attention in the industry the last few years. That’s not surprising. After all, security analytics can help organizations: Transition from reactive threat firefighting to proactive security risk management. Exploit all available security data to develop better insights and priorities. Maximize the effectiveness of
The Obama administration made great strides in improving the government’s use of information technology over the past eight years, and now it's up to the Trump administration to expand upon it. Let’s look at five possible Trump administration initiatives that can take government’s use of information technology to the next
People come from all over the world to attend this highlight of the season. It’s been a tradition for decades. Hotels book months in advance. Traffic is horrendous in the city center. The coveted tickets can cost thousands of dollars, but tens of thousands of people are lucky enough to score them. In
The cybersecurity challenge exemplifies how global threats have evolved and how governments must combat them. For all the complexity of the Cold War, the United States defense officials knew the nations that posed the biggest threat. The world is much different today. As General Michael Hayden (ret.), former Director of the National Security
Historically, generations could expect to experience one – maybe at best – major technology disruption or transformation in their lifetime. That’s simply not the case today. Today it is more difficult than ever before to know what will transform the technology landscape in the next month or the next year.
Some weeks have passed since the United Kingdom voted, by a margin of 52 per cent for and 48 per cent against, to leave the European Union, the organization it's been a leading member of since 1973. The tumultuous global reaction to the vote has those of us in information
As the federal government’s ability to collect personally identifiable information has increased drastically in recent years, so have attacks targeting that information. Insider threats are of particular concern, according to the Government Accountability Office's 2015 bi-annual High Risk Report. The GAO specifically states, “Risks to cyber assets can originate from
Do you like a good horror story? Then may I suggest “Future Crimes” by Marc Goodman. When it comes to this genre, Wes Craven, John Carpenter and Stephen King have got nothing on Goodman, primarily because Goodman’s story is non-fiction. Scene 1: The present – Your workstation or data center Whether
There's a lot of chatter about analytics in the information security space. That’s actually a massive understatement. Analytics is a common buzzword, and if everyone's talking it, but how do you cut through all the noise? Who is doing what when it comes to analytics? It can be difficult to tell. As part of
What do you get when you add together: Two basketballs; six people wearing black or white t-shirts; and a chest-beating gorilla? Oddly enough, a great analogy for the challenges information security professionals constantly face (more on that in a minute ...). We'll be talking about security challenges of all kinds
Last year at Mobile World Congress (MWC), we saw the reality of the IoT come to fruition. We saw leaders like AT&T showing their prototypes of connected cars, containers, agricultural sites, homes, etc. And it's got me wondering what we'll see at the 2016 MWC. In 2015, communications and media
Featuring a computer-savvy kid and Cold War intrigue, the 1980s movie War Games inspired more than one generation of STEM graduates. Sean Dyer is one Gen X’er who credits the movie for sending him on a path to where he is today as a cybersecurity data scientist. As the fog
My view of the world is shaped by where I stand, but from this spot the future of analytics for 2016 looks pretty exciting! Analytics has never been more needed or interesting. Machine learning established in the enterprise Machine learning dates back to at least 1950 but until recently has
John Beale was one of the highest paid government employees. A 10-year veteran of the Environmental Protection Agency (EPA), Beale defrauded the Federal Government of nearly $1M in employment wages and fraudulent travel. Beale came under suspicion after it was noticed that the he was still being paid wages 19
Barbarians are relentless, and they are inside the gates! That didn't go well for the Romans, and they had the most advanced technologies of their day. So how do we do better against the relentless waves of cyber barbarians attacking virtually everywhere? The answer to that is analytics, which offers early
International Fraud Awareness Week begins on Monday, and you know what that means. Our intrepid team of fraud experts is taking over the State and Local Connection blog! Fellow bloggers, get ready. Each day next week one member of the SAS Fraud and Security Intelligence team will post on a
With so many cybersecurity stories and large scale data breaches in the news, it's no wonder that cybersecurity is a top priority for leaders in many industries. But did you know analytics can help protect your customer and organizational data? Franklin Witter, Principal CyberSecurity Consultant, recently shared these three cybersecurity
Following World War II, an intelligence-sharing partnership was formed between Australia, Canada, New Zealand, the United Kingdom and the United State of America. The original alliance, called Five Eyes, was focused on monitoring the communications of the major global threat at the time – the Soviet Union. As the world
You may not be in London on October 7 to take advantage of the Lancaster Centre for Forecasting's free workshop on promotional forecasting. However, there are still plenty of forecasting educational opportunities coming up this fall: SAS Business Knowledge Series Best Practices in Demand-Driven Forecasting (Chicago, September 24-25) My colleague
During a lighthearted moment in a serious conversation, Howard Schmidt, cyber security advisor to multiple presidents, told a Wall Street Journal interviewer that relying on a government agency as your primary backstop during a major cyber security breach is akin to calling Ghostbusters: you might not get the help you
Technology has brought the world a great deal of good, but the downside is that we’re increasingly vulnerable to some seriously scary stuff: Terrorists taking control of airplanes through the in-flight entertainment system. Governments breaking into secure systems and stealing identities. Thugs messing with the steering of self-driving cars. When
I am a runner – a trail runner to be more precise. There are many trails that I enjoy running near where I live, but what I really anticipate is the opportunity to explore a new trail. Whenever I travel, my trail shoes go with me and I try to
You are going to be spending proportionately more of your IT budget on security than you have previously spent or ever wanted to spend. Why? Because you and everyone else on this planet is engaged in the still early stages of an escalating information arms race, that, while you didn’t
The Internet of Things is coming fast and furious. We clearly know what these “things” are, and were able to see prototypes at last week’s Mobile World Congress (MWC) which hosted some 93,000 attendees. Things = connected life = cars, homes (thermostats, washer and dryers, vacuum cleaners, security systems, refrigerators, etc.),