In the age of Big Data where volume, velocity and variety of data is increasing complexity both internally and externally, integrating new data sources is bringing organizations tremendous opportunities to mitigate threats in new, innovative ways.
Scientists in Australia's Rainforests and California's Beaches Use Business Analysis to Collect Data and Save the Ecosystem
June 3, 2013
As environmental regulations increase, industrialization’s effects stretch further and ecological scientists grasp for new ways to collect vital data, some parties are all reaching for the same thing: business intelligence.
Back in time, I was getting a personal tour of historic computers in the Smithsonian by none other than the famous computer scientist Captain Grace Murray Hopper, who is said to have coined the term “computer bug.”
As fraud controls get stronger, criminal elements start teaming up to beat the system. But, as Jason Lelio points out, collusions schemes get harder and harder when faced with stringent internal controls.
For many of Boston's hotel security directors, the day started like so many other Marathon Mondays, a calm morning full of excitement and anticipation for the events about to begin in the quaint New England town of Hopkinton, 26.2 miles from the Marathon's finish line in Boston's historic Copley Square.
University research funded by the Alarm Industry Research and Educational Foundation (AIREF) provides a look into the mind of a burglar by examining the behaviors of convicted offenders in three states.
For the next generation of enterprise security leaders, is there a clear path forward to success? Enterprise security leaders discuss mentorships, education, certifications and the skills new CSOs and CISOs will need to succeed in their evolving roles and bring value to the business. But the problem is: with existing security leadership roles varying so widely, is the development of a uniform skill set even possible?