How Machine Learning Makes IoT Relevant
Many of the manufacturers involved in developing IoT technology are still finding a way through the evolving landscape. Most, however, remain focussed on convenience. Convenience products won’t sell in significant quantities, however. Instead IoT devices that are...
How Artificial Intelligence Is Changing The Retail Landscape
Artificial intelligence is changing retail and businesses that don’t realise this and embrace AI are likely to be left behind. Just look at the numbers - the retail part of the artificial intelligence industry is currently thought to be worth around $26 million....
Oracle Looks at BI Trends
Mobile is taking over the Business Intelligence (BI) world. So is the cloud. And Big Data, especially "unstructured" Big Data, is just beginning to revolutionize the ways that enterprises conduct their strategic planning. Those are a few headline results from a new...
Every Company Should Adopt NIST
Since 2014, massive data breaches have become a common feature of the news. The huge amount of money at stake – Sony's was $100 million, Target's about $110 million – means that more and more companies are taking their information security seriously. This also signals...
Companies Should Adopt the NIST Cybersecurity Framework
Introduction In the past, developing a cybersecurity policy and strategy for an organization involved digesting multiple standards, regulations and assessments. This usually meant deciding on competing priorities with the resulting strategy being compliance based....
Smart and Context aware IoT True Potential
Introduction How do we make independent IoT technologies work together to make communities, cities and regions truly smart? How do we achieve the goal of autonomous decision making, enhancing the functionality of IoT technology? The answer is data analysis, and the...
Information security based on risk not fear
Introduction Fear drives the cybersecurity initiatives deployed by most organizations, but that means spending lots of money and resources trying to achieve something where failure is the only outcome. It is simply not possible to completely prevent hackers getting...
Experts Now Adopt a Riskbased Framework
Introduction For many years security experts have preached that cybersecurity needs a risk based approach. According to a new survey it appears organizations are now taking active heed of that advice, with more and more adopting risk based strategies. This is driven...
Targeted Controls Key to Effective Security
Introduction Most organizations have an attack surface that is constantly expanding. Those that have a security policy aimed only at preventing intruders at the perimeter are doomed to failure. The highest levels of security should be applied only to the most valuable...
Managing Risk with Cyber Insurance
One of the hot topics last year, and undoubtedly this year too, is cyber insurance. Is this the panacea that information security has been waiting for? Cyber insurance is intended to mitigate the loss from any information security incidents. Once a company has...
Traditional BI Losing Out to Modern BI
BI systems are undoubtedly complex and costly to set up. As such, many projects are not completed as planned and are often irrelevant quickly afterwards. Many organizations will even take the step of telling you they have no BI – in spite of the multi-million dollar...
Outsmarting Competitors With Big Data
Over time, the use of big data and advanced analytics is becoming less of an option and more of a requirement. Already, a quarter of investors report revisiting their opinion of a company based on its data and analytics strategy, and by 2018 this number is predicted...