Pete Recommends – Weekly highlights on cyber security issues September 8 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – three significant highlights of this week’s column: Effort to undermine American democracy/US Elections “has not stopped,” former Facebook security chief says; How to Use Google Privacy Settings – and – U.S .accuses China of ‘super aggressive’ spy campaign on LinkedIn.

Subjects: Civil Liberties, Cybersecurity, Economy, Intellectual Property, Privacy, Search Engines, Social Media, Spyware

Pete Recommends – Weekly highlights on cyber security issues September 1 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Note – two significant highlights of this week’s column: Woman Sues Border Agents to Make Them Return Data They Seized From Her Phone – and How Yahoo Is Mining For Gold in Your Junk Mail.

Subjects: Civil Liberties, Cybercrime, Cybersecurity, Data Mining, E-Commerce, Email, Government Resources, Privacy

Pete Recommends – Weekly highlights on cyber security issues August 26 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Note – two significant highlight of this week’s column: Doorbell camera videos create dilemma for police, neighborhoods – and Government Leads Industry in Anti-Spoofing Email Protection, Report Finds.

Subjects: Cybercrime, Email, Email Security, Firewalls, Gadgets, Privacy

Banks should brace for impact: The Big Techs are coming!

Data, BI & Analytics expert Siraj Patel discusses the global financial services and products industry in the context of the urgency for existing business models to adapt and innovate in this time of disintermediation, product un-bundling and marketplaces that offer customer rapidly changing banking options.

Subjects: AI, Blockchain, Business Research, Economy

Library Acquisition Patterns: Preliminary Findings

Katherine Daniel, Joseph J. Esposito, Roger C. Schonfeld: Several years ago, we set out to better understand how both library acquisition practices and the distribution patterns of publishers and vendors were evolving over time. Within the academic publishing community, there is a sense that academic libraries are acquiring fewer and fewer books and that university presses are struggling amid declining sales. The latter may certainly be true—a recent UK study found that between 2005 and 2014, retail sales of academic books dropped by 13 percent—but what if the academic libraries that constitute part of that market were in reality not making fewer purchases? As new vendors and acquisition methods disrupt customary means of acquiring books, Joseph Esposito, Ithaka S+R’s frequent collaborator and consultant, was inspired to ask whether book sales were actually depressed, or if they only appeared to be because academic libraries were bypassing the traditional wholesale vendors whose metrics are used by university presses to assess sales to libraries for companies like Amazon.

Subjects: E-Commerce, Electronic Subscriptions, Information Management, Libraries & Librarians, Reference Resources

Pete Recommends – Weekly highlights on cyber security issues August 18 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Note – two significant highlight of this week’s column: AP Exclusive: Google tracks your movements, like it or not; and Hackers can steal data from the enterprise using only a fax number. Although many assume fax machines are no longer in general use, think about your doctors and hospitals – they all continue to use them, as do many states, localities, the federal government, and courts.

Subjects: Congress, Cybercrime, Cybersecurity, Privacy, Search Engines

Pete Recommends – Weekly highlights on cyber security issues August 11 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Note – two highlights of this week’s column: As Russians hack the US grid, a look at what’s needed to protect it; and DARPA is racing against time to develop a tool that can spot ‘deepfakes’.

Subjects: AI, Cybercrime, Cybersecurity, Energy, Privacy

Pete Recommends – Weekly highlights on cyber security issues August 5 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Note – two highlight of this week’s column: the FBI Releases Article on Securing the Internet of Things and Surprising Things the Government Knows About Americans.

Subjects: Computer Security, Cybercrime, Cybersecurity, Energy, Privacy

The 6 Types Of Cyber Attacks To Protect Against In 2018

Lizzie Kardon’s article is a timely guide to the different methods by which cyber attacks are launched and the tools used to deliver them. As the goals and objectives for such attacks differ, it is critical to employ accurate and effective strategic and tactical processes to prevent and to repel attacks that are steadily increasing as the Internet of Things (IoT) expands in arenas that span work, home, government, social media, healthcare and beyond.

Subjects: Computer Security, Cybercrime, Cybersecurity

Pete Recommends – Weekly highlights on cyber security issues July 28 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways our privacy and security is diminished, often without our situational awareness. Note – two highlight of this week’s column: the Supreme Court struggles to define ‘searches’ as technology changes, and how Google employees avoid phishing attempts with a $20 YubiKey security key.

Subjects: Computer Security, Cybersecurity, Email Security, Healthcare, Privacy, Social Media
CLOSE
CLOSE