Whilst cyber and intelligence are two tightly-knit notions, the bridges between these two worlds need to be extended, because the massive increase in available data means that using it needs to easier. Harmonising the data, sharing and diffusing it, and making it available to services or specialists are the next issues that will need to be addressed to guarantee the quality and availability of this data. Continue reading
How can we meet customers’ new expectations in the real estate market? Whether they’re buyers, sellers, landlords or tenants, everyone now expects interactions as fluid as those they are accustomed to in the digital world. In response, the industry’s stakeholders must adapt: from the purchasing journey to related services, the time has come for them to take a customer-centric approach. Read on to find out why. Continue reading
In 2008, now ten years ago, in Georgia we were observing the first documented example of the use of “cyber” tools supporting the Russian Army’s air-land operations. The incident took place barely a year after the near-paralysis of Estonia following a cyberattack. Cyber has, since, fully entered the field of military actions by revolutionising the ways in which it can be used. Continue reading
Intelligence sensors are now able to collect considerable quantities of data. But without any real control over it this work will be in vain. Data governance is therefore absolutely necessary in order to optimise and normalise inter-ministerial and inter-agency interoperability. Continue reading
A federal judge in New York has weighed in on this digital gray area. Continue reading
Formatting iPhones and iPads, as well as Android smartphones and tablets, in such a way as to make data recovery impossible is a simple and quick operation — thanks to the latest encryption tools.
When formatting the memory of a PC, a Mac, a smartphone or a tablet before selling it, the data is not completely erased. The software limits itself to making the disk “overwritable,” without proceeding with the physical removal of the data present. With the right programs, the next owner of the device could retrieve sensitive information. Continue reading