BrandPost: 7 Ways to Prepare for a Cybersecurity Audit

Data breaches, phishing attacks, information disclosure – the Internet can be a scary place. Conducting a cybersecurity audit (or getting a third-party assessment) is a great way to understand your organization’s cybersecurity posture. But, like preparing any exam or review, getting ready for a cybersecurity audit can be intimidating. While every security assessment will be a bit different, here are seven ways you can prepare for your next cybersecurity audit.

Cambridge Analytica And Our Lives Inside The Surveillance Machine

In 2006, a local pollster in Nepal was kidnapped by Maoist rebels while conducting opinion surveys on behalf of the American political strategist Stan Greenberg. The Maoists, who had been waging a long-running insurgency against the government, did not issue their typical ransom demands—money or weapons in exchange for the prisoner. No, they wanted the polling data that Greenberg’s team had collected, evidently to gauge the political climate in the country for themselves. The researchers eventually handed it over. In his book “Alpha Dogs,” the British journalist James Harding cites this story as an example of how the business of political campaigning is being remade, across the globe, by a profusion of fine-grained data about voters and their habits. Where the consultants of the nineteen-sixties and seventies obsessed over how to use television to beam ideal images of their clients into voters’ homes, today’s spinmasters hope that big data will allow them to manipulate voters’ deepest hopes and fears. “What’s the currency of the world now?” one of Greenberg’s partners asks Harding. “It’s not gold, it’s data. It’s the information.”

Transatlantic Cable podcast, episode 29

In this week’s edition of the Transatlantic Cable podcast, Dave and I looked to stay on our usual podcast format, covering four or five stories in 20 minutes or less, but we got a bit sidetracked by the latest Facebook news. After the deep dive, we offer some thoughts on hackers sending bomb threats to schools, a lottery hack, and a PSA about Elon Musk imposters on Twitter. Below are links to the stories we discuss:

Serverless Security for Public Cloud Workloads with Stealthwatch Cloud

Each year goes by and we find more ways to own less and less of what it takes to operate our digital infrastructure. Information Technology began as a business having to build data centers owning everything starting with the real estate all the way to the applications, quickly it moved to public clouds whereby the infrastructure itself was a service managed by the provider and you only needed to manage the virtual servers up through your applications. The latest in this trend is serverless computing.  As you would guess, this is the latest evolution where the service provider owns and operates everything up to the application and you don’t even manage the servers running your code (thus the name “serverless”).

How Being a Workaholic Differs from Working Long Hours — and Why That Matters for Your Health

Hanna, a finance director at an international home care retailer, works long hours. She’s usually in the office from 9am to 5pm, but at home, when her three children go to sleep, she’ll work another four hours, not closing her laptop until midnight. She sometimes also works on weekends. But even though she works 60 to 65 hours per week, she told us that she can “switch off” when she needs to, and that she still feels energetic every day. She hasn’t had to worry about her health.

Watch This 3D ‘Star Wars’ Demo Running on a $60,000 Personal Supercomputer

Video games are about to get more photorealistic thanks to new technology from Nvidia. At the Game Developers Conference in San Francisco this week, the graphics card manufacturer announced that it had cracked ‘ray tracing’—an advanced method of rendering computer graphics that delivers cinematic quality images. In conjunction, Microsoft announced a new API—DirectX Raytracing—to help game companies get the most out of the new technology.

Finding Fraud using Machine Data

Finding Fraud using Machine Data

Organizations and people’s security hygiene can be poor, and criminals know it. Fraudulent activity costs are in the billions worldwide across industries. Over 16 million consumers in the US were victims of identity theft or fraud in 2016 alone. Learning to on-board new data at the speed of the business will ensure your fraud team can detect and investigate data to quickly find anomalies and reduce loss of money, reputation and organizational efficiencies.