Google

GDPR and the technology market

Question: will the new privacy policies and laws impact the technology market? This is an interesting question to ask ourselves; whether we are consumer of the technology market or technology vendors the impact of the new technologies (from cloud to IoT, from industry 4.0 to big data just to name the most acknowledged from a marketing point of view) privacy regulations can affect heavily our behaviours and the market. so let try to understand what could be the implications of this new focus on privacy and data protection. First of all we should try to understand what we are talking…

Why IT companies are so concerned by latest (and future) USA administration moves.

Latest USA administration moves are rising a lot of concerns towards the IT community, and a lot of concerns worldwide. There are, of course, different sentiments related to political beliefs, ethics and moral considerations that should be considered. I will not enter here in the political, ethical and moral arena to present my personal point of view on the specific subject but I would like make some considerations on the IT sector reactions to what is happening. It is an easy prediction that the future economic outlook will be impacted by USA administration approach and actions, and this can cause…

The IoT Files – Business Models

The IoT Files – Business Models Ok we talked about security, privacy and infrastructure in the last post Here we are. do we really think that IoT will work in the current business model environment? Well I have to tell you, probably it would not. The key factor of IoT will be if it will be able to generate revenue? the problem of revenue is related to the fact they should cover the infrastructure costs, in order to do so, since we already seen that infrastructure costs will be big, as well as security, privacy implication that have, also, a cost, selling devices will not be…

The IoT Files – intro and security

The IoT Files – intro and security I will start a series of posts on the IoT (Internet o Things) since it seems me that most of the talking about IoT are missing some key aspects. I will start with a general introduction, taken from a webinar I delivered recently. There is a lot of rumors around IoT lately. It seems the new holy grail of the technology industry, the panacea that will solve every business pain and will drive us to the next point. All those talking are interesting, but somehow a little bit apologetic, since there is a…

What is Democracy?

What is Democracy? Reading or listening news we can easily make a shortlist of how difficult it is to have in place and maintain such a thing known as democracy. In the Middle east and Africa we have a lot of countries who have been struggling to land there for a long time […] The rest of the article can be found on Daft Blogger eJournal http://www.daftblogger.com/what-is-democracy/ Related articles Global Banks Have Become A Mafia Criminal Enterprise Apartheid; in Defense of the Indefensible Fascism grips Israel Making a Mockery of Democracy Jailhouse democracy: How the US rules the Middle East through puppet dictators South Africa: Has democracy…

World Dictionary New Words and Meaning: Communist

– They’re “Communists“. – This is a common way to express a feeling against someone. Communist and communism have lost the original meaning to be used, nowadays, as a synonymous of “Bad Guy that is against Freedom, Truth, Democracy, Life, God and everything holy and so, as a matter of fact, terrorist, killer and all the worse” After the end of the so-called “cold War” and the downfall of the former USSR what is left is just an abused and empty word “communism” still used as a propaganda flag to show the “enemy” in a general way. If you’re against me so you’re “communist”, so…

PRISM Lessons On Privacy, Cloud and US IT Companies

PRISM Lessons On Privacy, Cloud and US IT CompaniesTECHNOLOGY PRISM Lessons On Privacy, Cloud and US IT Companies By Antonio Ieranò on August 31, 2013 at 7:17 PM Contents [hide] 1 Could we have anticipated this? 2 Security is a trust based affair 3 Cloud considerations 4 Privacy and encryption 5 Conclusion Every day new information emerges on the extension of NSA’s PRISMprogram. We discovered that e-mail, phone calls, services, even conference systems have been cracked and gone under illegal surveillance. We also learned that the NSA paid US tech giants like Microsoft, Google, Yahoo, AOLto allow this and when this was not possible resources were brutally hacked. Related articles The death of the cloud has…

check out my new article on hakin9

http://hakin9.org/read-hakin9s-qr-code-hacking-issue-and-get-knowledge-how-to-protect-yourself-from-data-loss/ Read Hakin9‘s QR Code Hacking Tutorial and Learn How To Avoid Data Loss You received this newsletter because you subscribed to autoresponder address list of Hakin9 magazine. If you want to unsubscribe please click the link. Dear Readers, we are pleased to inform you that our new tutorial about QR code hacking has just arrived. You can download it here. In this issue you will find articles such as: QR Code Hacking BASICS Hacking QR CodesBy Rishabh Rastogi An information security, risk and governance minded professional who thrives on evaluating technologies and business processes from a critical perspective. Popularly…

E-mail requirements change for a safe use in the post PRISM internet

Recently is mounting a serious concern about e-mail use and misuse, after PRISM the question is if e-mail can still be used as a safe communication media both for personal and enterprise use. This is a difficult question since e-mail has always been a low security- high risk area in the enterprise as well as in the private world. When talking about mail we should remember what email really is: Email is a simple method to transfer information from a computer to another, the used protocol SMTP is a plain text protocol that pass all the information in clear text….

Posts navigation
Stop censorship
%d bloggers like this: