You are here
Home > Articles (Page 14)

Big data privacy concerns spur research, innovation

Big data privacy concerns are becoming common. Many organizations already have the data they need –but they’re afraid to use it. A group of MIT professors, all panelists at the MIT Sloan CIO Symposium, offered some enlightening -- and chilling -- potential uses for gathered and analyzed data. For researchers,

How the word ‘hacker’ got corrupted

What is generally called "hacking" today was originally called "cracking" in technical circles - as in cracking a safe. Hacking, in its original meaning, has nothing to do with malicious behavior. The term "hacker" seems to have originally developed decades ago at the Massachusetts Institute of Technology in the United States,

Yahoo! says it had 13,000 data requests

Yahoo! said that it had received up to 13,000 requests for information from US law enforcement agencies in the last six months. Yahoo! is one of the popular tech giants that came under heightened scrutiny since government contractor Edward Snowden leaked details of PRISM, a vast program that saw nine

The Most Overlooked Part of Your Data Security

In their rush to replace outdated hardware and IT infrastructure, organizations fail to manage and dispose these properly.  During a recent IT asset disposal project for a large New York bank, a chain-of-custody audit revealed three computers were untracked. An IT director was suspected of taking them. More>>

Top