Ciberseguridad + Inteligencia
17.2K views | +0 today
Follow
 
Rescooped by Elisa Vivancos from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
onto Ciberseguridad + Inteligencia
Scoop.it!

Infosecurity - Apple iOS 7: A Security Overview

Infosecurity - Apple iOS 7: A Security Overview | Ciberseguridad + Inteligencia | Scoop.it
Apple's new iOS 7, pre-loaded on the new iPhone 5s and 5c, is also available for download to older devices. It is said to include more than 200 new features – here we look at some of the security aspects and issues.

Via Gust MEES
more...
Ciberseguridad + Inteligencia
Inteligencia aplicada a la seguridad TIC,  Ciberseguridad industrial, Privacidad, Gestión de Identidad y Acceso, Seguridad de la información, Seguridad TIC, Estrategias, Políticas, Eventos
Curated by Elisa Vivancos
Your new post is loading...
Your new post is loading...
Rescooped by Elisa Vivancos from Machines Pensantes
Scoop.it!

The World's Biggest DATA BREACHES, In One Incredible Infographic

The World's Biggest DATA BREACHES, In One Incredible Infographic | Ciberseguridad + Inteligencia | Scoop.it
Seeing them all together is jarring.

Via association concert urbain
more...
No comment yet.
Rescooped by Elisa Vivancos from Identidad Digital
Scoop.it!

Quiero desaparecer de Internet: cómo hacerlo paso a paso

Quiero desaparecer de Internet: cómo hacerlo paso a paso | Ciberseguridad + Inteligencia | Scoop.it

Puede llegar un momento en el que las redes sociales y otros servicios de internet dejen de sernos útiles. O igual esa sensación de inutilidad siempre ha estado ahí. Sea por esa razón o por cualquier otra, hay personas que toman la decisión de desaparecer de internet borrando todo rastro de su paso en la medida de lo posible.


Via Emilio
more...
No comment yet.
Rescooped by Elisa Vivancos from 7wData
Scoop.it!

Cloud + Streaming Analytics + Data Science = Five Big Data Trends Now

Cloud + Streaming Analytics + Data Science = Five Big Data Trends Now | Ciberseguridad + Inteligencia | Scoop.it
How streaming analytics, the rise of data science and the growth of cloud could change the digital transformation path for enterprise in the coming months. This year will be the when real-time big data analytics will come to the forefront of the enterprise. Although it has been said before, this year will see a convergence of several factors that will make this prediction a reality. Companies are increasingly using cloud platforms and advanced data processing solutions to derive essential business insights to enhance operational processes, improve customer service and provide executives with critical data points. This market shift is driving the push to create more value from big data and investments in real-time analytics, and growing the need to use data science and machine learning for greater insight. In the coming months, these five factors will enable enterprises to unlock the advanced power of their data: Enterprises are steadily moving their on-premise IT and data processing to the public cloud. This trend is expected to accelerate through this year, driven by the growing availability of pre-built, reliable, scalable platforms-as-a-service (PaaS) for every possible application development and deployment need across the organization. Developers and everyday business users will use these cloud application platforms to design and operate applications, easier and faster, with minimal coding, while focusing on the core business logic. Additionally, the main concerns related to security are diminishing, as the public cloud becomes more robust and secure. This is validated by the growing use of public and private cloud by traditionally cloud-shy conservative businesses like large financial services companies and banks, even for critical business processes. The total cost, complexity, and burden of trying to manage, scale and run large application devops on private infrastructure will only make the cost of public cloud services more and more attractive to enterprises. Real-time analytics and stream processing will truly arrive in 2018. Owing to a large number of successful early adopters, proof-of-value, and proof-of-concept projects, enterprises will begin large-scale implementation of stream processing and advanced real-time analytics as part of their core data processing infrastructure. It will be driven by the key business objectives including competitive pressure, a growing need for fast data processing, the ability to act on business opportunities in real-time, and the demand for contextual and time-relevant customer experiences. To meet this demand, vendors will start offering vertical end-user applications like pre-built churn analytics, anomaly detection, predictive maintenance, recommendation engines and customer 360 frameworks on big data platforms. There will be a shift to derive higher value from data lake investments. Transactional platforms will connect in real-time to big data lakes to enable faster, intelligent processing of data as it arrives. Direct business intelligence (BI) solutions running on top of the data lake providing scalable, fast interactive response to queries spanning very large data sets will get critical mass adoption.
Via Yves Mulkers
more...
No comment yet.
Rescooped by Elisa Vivancos from #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
Scoop.it!

#CyberSécurité: Effet #RGPD ? � #Microsoft ouvre en temps et en heure quatre centres de données en #France

#CyberSécurité: Effet #RGPD ? � #Microsoft ouvre en temps et en heure quatre centres de données en #France | Ciberseguridad + Inteligencia | Scoop.it
“Conséquence : les clients du géant américain peuvent à présent héberger leurs données dans deux zones : en région parisienne et à Marseille.”
Via Frederic GOUTH
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Polisis

Automated Analysis of Privacy Policies
Elisa Vivancos's insight:
Análisis automático de políticas de privacidad. Resultados en modo gráfico.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Los datos que ponen en entredicho la ciberseguridad de las...

Los datos que ponen en entredicho la ciberseguridad de las... | Ciberseguridad + Inteligencia | Scoop.it
Una enorme falta de sensibilización sobre los riesgos cibernéticos ponen en jaque a las infraestructuras críticas de nuestro país, especialmente las
more...
No comment yet.
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

IoT attacks: 10 things you need to know | #CyberSecurity #Infographic #InternetOfThings #CyberAttacks #ICT

IoT attacks: 10 things you need to know | #CyberSecurity #Infographic #InternetOfThings #CyberAttacks #ICT | Ciberseguridad + Inteligencia | Scoop.it
IoT attacks are on the rise. As the technology becomes more relevant to our lives, we take a look at what the state of play is.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Cyberattacks

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Amnesia

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Amnesia&tag=BrickerBot

 


Via Gust MEES
more...
Scooped by Elisa Vivancos
Scoop.it!

El doxxing o el nuevo peligro que amenaza a las democracias . Noticias de Alma, Corazón, Vida

El doxxing o el nuevo peligro que amenaza a las democracias . Noticias de Alma, Corazón, Vida | Ciberseguridad + Inteligencia | Scoop.it
Ciberseguridad: El doxxing o el nuevo peligro que amenaza a las democracias . Noticias de Alma, Corazón, Vida. ¿Cuáles son los nuevos riesgos para los Estados y los sistemas electorales? ¿Quién está detrás de estos ataques? Intentamos poner algo de luz a estas y otras cuestiones
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

'Big data', una oportunidad para mejorar la ciberseguridad

'Big data', una oportunidad para mejorar la ciberseguridad | Ciberseguridad + Inteligencia | Scoop.it
Las herramientas de analítica de 'big data' están en primera línea de defensa para construir modelos que ayuden predecir el comportamiento y lo
Elisa Vivancos's insight:
Watson
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Shodan, la alternativa a Google más peligrosa

Shodan, la alternativa a Google más peligrosa | Ciberseguridad + Inteligencia | Scoop.it
En un mundo hiperconectado y unido por el Internet de las Cosas. Shodan se trata de un buscador no exento de peligros en el que puedes encontrar cualquier
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Las mejores herramientas de Hacking para este 2017

Las mejores herramientas de Hacking para este 2017 | Ciberseguridad + Inteligencia | Scoop.it
Recopilamos las mejores herramientas Hacking para poder auditar y mejorar la seguridad de nuestros equipos y redes este nuevo 2017.
more...
No comment yet.
Rescooped by Elisa Vivancos from Technology in Business Today
Scoop.it!

Beyond Bitcoin: 4 surprising uses for Blockchain

Beyond Bitcoin: 4 surprising uses for Blockchain | Ciberseguridad + Inteligencia | Scoop.it
Blockchain, the technology originally designed to run Bitcoin, could be used to make the world a better place. Here's how.
Via TechinBiz
more...
Jean-Marie Grange's curator insight, January 9, 2017 10:25 AM
Useful applications of Blockchain technology. I think the music industry has a very good opportunity to better distribute revenues using Blockchain
rodrick rajive lal's curator insight, January 10, 2017 4:17 AM
Think of it, Blockchain and Bitcoins might be the next big thing after demonetization of hard currency and the building up of a cashless economy!
 
Rescooped by Elisa Vivancos from Technology in Business Today
Scoop.it!

Where Cybercriminals Go To Buy Your Stolen Data

Where Cybercriminals Go To Buy Your Stolen Data | Ciberseguridad + Inteligencia | Scoop.it
What malicious sites provide both free and paid access to stolen credit cards, company databases, malware and more?
Via TechinBiz
more...
No comment yet.
Rescooped by Elisa Vivancos from SME Cyber Security
Scoop.it!

Five Benefits GDPR Compliance Will Bring To Your Business

Five Benefits GDPR Compliance Will Bring To Your Business | Ciberseguridad + Inteligencia | Scoop.it
The EU's new regulations may bring challenges, but they also present an enormous opportunity.

Via Roger Smith
more...
Roger Smith's curator insight, March 29, 9:26 PM

GDPR is just around the corner.   Embracing the program will definately improve your bottom line!


this explains it well

Rescooped by Elisa Vivancos from Solutions locales
Scoop.it!

Configurer votre tracking analytics avec Google Tag Manager pour être RGPD Friendly

Configurer votre tracking analytics avec Google Tag Manager pour être RGPD Friendly | Ciberseguridad + Inteligencia | Scoop.it

Google Tag Manager, Google Analytics et RGPD...


Via Vincent Datin
more...
No comment yet.
Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

IoT Analytics - ThingSpeak Internet of Things | #Coding #Maker #MakerSpaces #Analyzing #Visualizing

IoT Analytics - ThingSpeak Internet of Things | #Coding #Maker #MakerSpaces #Analyzing #Visualizing | Ciberseguridad + Inteligencia | Scoop.it

ThingSpeak is the open IoT platform with MATLAB analytics.

Learn more / En savoir plus / Mehr erfahren:

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=ARDUINO


Via Gust MEES
more...
Gust MEES's curator insight, March 27, 7:13 PM

ThingSpeak is the open IoT platform with MATLAB analytics.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=ARDUINO

 

Kami Campbell's curator insight, March 29, 1:20 AM
Share your insight
Scooped by Elisa Vivancos
Scoop.it!

China ALTERED its public vuln database to conceal spy agency tinkering – research • The Register

China ALTERED its public vuln database to conceal spy agency tinkering – research • The Register | Ciberseguridad + Inteligencia | Scoop.it
Report claims vuln-botherers share building with Ministry of State Security
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Graph databases find new applications in cybersecurity boom

Graph databases find new applications in cybersecurity boom | Ciberseguridad + Inteligencia | Scoop.it
One technology experiencing a kind of renaissance is the graph database, which has existed for years but is finding new relevance in current cybersecurity contexts.
more...
No comment yet.
Rescooped by Elisa Vivancos from Sec Business
Scoop.it!

Protección de datos - El coste del incumplimiento

Protección de datos - El coste del incumplimiento | Ciberseguridad + Inteligencia | Scoop.it

Via Emilio
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

8 Maps of the Internet of Things

8 Maps of the Internet of Things | Ciberseguridad + Inteligencia | Scoop.it
Here are seven IoT maps that we have written about on Iot Central. 
Interactive Map of IoT Organizations
IoT and IIOT Cybersecurity Market Map
The Ind…
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Detecting Cyber Crime With Artificial Intelligence - Enterprise Security & Risk Management 2016

Detecting Cyber Crime With Artificial Intelligence - Enterprise Security & Risk Management 2016 | Ciberseguridad + Inteligencia | Scoop.it
Author: Cyberseer.Net Security professionals face a difficult task in keeping enterprise networks safe. Cyber-attacks continue to grow as criminals find new ways to infiltrate and …
more...
No comment yet.
Rescooped by Elisa Vivancos from CyberSecurity
Scoop.it!

Application Threat Modeling vs Operational Threat Modeling

Application Threat Modeling vs Operational Threat Modeling | Ciberseguridad + Inteligencia | Scoop.it
Read latest post Application Threat Modeling vs Operational Threat Modeling to gain a better understanding of why both threat model types are needed.
Via JC Soto
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

La peligrosa química de la web

La peligrosa química de la web | Ciberseguridad + Inteligencia | Scoop.it
Mi columna de esta semana en El Español se titula Mezclas peligrosas, y hace referencia a la compleja química d
more...
No comment yet.
Rescooped by Elisa Vivancos from infosecurity & Big Data
Scoop.it!

Por qué el contador inteligente de la luz es una bomba de (ciber)relojería en tu casa. Noticias de Tecnología

Por qué el contador inteligente de la luz es una bomba de (ciber)relojería en tu casa. Noticias de Tecnología | Ciberseguridad + Inteligencia | Scoop.it
“ Factura de la luz: Por qué el contador inteligente de la luz es una bomba de (ciber)relojería en tu casa. Noticias de Tecnología. Un experto en seguridad israelí alerta de que la mayoría de contadores digitales son susceptibles de sufrir ciberataques para causar sobrecargas eléctricas o manipular el consumo”
Via A3Sec
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Este ransomware desbloquea archivos gratis si lees sobre ciberseguridad

Este ransomware desbloquea archivos gratis si lees sobre ciberseguridad | Ciberseguridad + Inteligencia | Scoop.it
Quién lo diría, el ransomware también puede ser útil. Este software malicioso que cifra los archivos y pide un rescate por ellos (monetario, habitualmente), está evolucionando a pasos agigantados. Hace unas semanas conocíamos un curioso nuevo tipo de ransomware que además de solicitar que se pagara un precio por la clave para descifrar los archivosRead More
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

OAuth 2.0 Hack Exposes 1 Billion Mobile Apps to Account Hijacking

OAuth 2.0 Hack Exposes 1 Billion Mobile Apps to Account Hijacking | Ciberseguridad + Inteligencia | Scoop.it
Mobile app developers need to be aware of improper OAuth 2.0 implementations that have put one billion mobile apps at risk to takeover.
more...
No comment yet.