Artificial Intelligence will boost the SOCs of tomorrow

When it comes to Big Data, some see it as the beginning of a new world. But others are frightened of what it represents; namely, a gigantic volume of data. If one thing is sure, it’s that Big Data is at the heart of some of our biggest concerns today. Our ecosystem, brimming with personal information systems (smartphones, tablets, etc.) and connected objects, is sending the volume of available data into exponential growth, to the point where human intelligence alone simply isn’t enough to process it anymore.

Continue reading

Transformational teams: the link in your digital transformation chain

transformational team

Here I outline the four main elements in the “transformational team” equation: agility, innovation, curiosity, and pleasure. This is a new way of working, with a team often comprised of original and iconoclastic IT profiles. In this article, I offer a few examples of the profile types which could be used to build a new transformational team. Continue reading

The 5 golden rules of new digital security

The 5 golden rules of new digital security

When it comes to security, digital transformation brings about new demands and new risks. To enable users to adopt these new services in total confidence whilst fully understanding the data risks for the company, a global approach should be put into place. Here I set out the 5 golden rules that I would recommend to new IT Security Managers (ITSM). Continue reading

The Internet of Things has a child privacy problem

The Internet of Things has a child privacy problem

Copyright -The Washington Post/Worldcrunch- Karen Turner

“In sum: Alexa is kinda my new best friend,” writes Rebecca Hanover, an author and blogger on Mommyproof. As a mother of young children, it’s not hard to see why: Hanover details the joys of virtual assistant Amazon Echo, which functions as a kind of combined kitchen helper, child entertainer and DJ. “Is it weird that Alexa feels like my trusty little friend during that six pm witching hour, gently guiding me through dinnertime?” Continue reading

Hackers Now Use QR Codes To Ensnare Users

Hackers Now Use QR Codes To Ensnare Users

Copyright – Les Echos – Fabien Rech

Hackers have started sending fraudulent emails using QR code technology, masquerading as a national communications provider to get client usernames and passwords.

It is a first in the history of hacking. Vade Retro, a company that specializes in mailbox protection, recently announced it had detected the first use of fraudulent emails using QR codes — two-dimensional barcodes used to store digital information that can be deciphered by a smartphone. Continue reading