Sign Up Now!

Sign up and get personalized intelligence briefing delivered daily.


Sign Up

Articles related to "information"


US Financial Firms to Further Increase Cybersecurity Spending

  • Informa PLC's registered office is 5 Howick Place, London SW1P 1WG.
  • In a survey of 100 senior security officers, 84 percent said their firms are planning to spend more this year on cybersecurity, up from 78 percent a year ago, data-security provider Thales eSecurity said in a report to be released Tuesday.
  • Some of the largest U.S. banks already have boosted cybersecurity spending to almost $1 billion a year following high-profile attacks at companies such as Equifax Inc. and Anthem Inc. Financial firms also have increased information-sharing and set up industrywide backup systems for client data to prevent financial-system disruptions during a major hack.
  • The vast majority of financial firms are still spending too much on defending personal computers despite awareness that’s the least effective strategy, the Thales survey found.

save | comments | report | share on


6 things you probably didn't know about the Supreme Court class photo

  • In 2003, the justices decided to take a new photo because they had served together nine years without any changes to the court.
  • After a Supreme Court photographer takes the official picture, news photographers are let into the east conference room to take photos as well.
  • For decades, news photographers were given just 3 minutes to take their pictures.
  • During November's photo, the Supreme Court's public information officer used a stopwatch to count off the 120 seconds that photographers were allowed to take their pictures.
  • According to a 2015 essay by Franz Jantzen, one of the court's photographers, it was all a misunderstanding based on a letter that McReynolds sent to then-Chief Justice William Howard Taft.
  • McReynolds said he didn't want to "go through the bore of picture taking until there is a change in the court." He doesn't mention Brandeis at all.

save | comments | report | share on


Amazon asked cities that submitted an HQ2 proposal to provide endless data, including the price of an avocado at Whole Foods and the cost of a Starbucks tall coffee

  • As cities and states battled to win Amazon's second headquarters, they provided the e-commerce giant with an overwhelming amount of data.
  • On Friday, it became clear just how much information Amazon wanted.
  • On Monday, New York City posted its 253-page HQ2 proposal online.
  • The city quickly took down the extensive proposal, but The New York Times downloaded the document before its removal and published it in full on Friday.
  • Amazon's questions, as seen in the proposal, are truly far-reaching.
  • And, New York City willingly provided the information.
  • New York City dutifully answered the questions — an avocado costs $1.25 whether purchased in Midtown West or in Long Island City, though you can get a slightly better deal on movie tickets at AMC in Manhattan than UA Kaufman in Queens ($16.29 versus $16.40).
  • The depth of the data requested by Amazon is especially interesting because the company likely collected similarly extensive information on all of its 20 HQ2 finalists.

save | comments | report | share on


A German left-wing group tricked thousands of neo-Nazis into doxxing themselves with a 'honeypot' website

  • A German art collective is trying to identify thousands of neo-Nazis who took part in violent protests this summer, using information they were able to trick people into providing about themselves.
  • The Washington Post reports that a left-wing art collective, called the Center for Political Beauty (or "ZPS" in German), has been able to identify a majority of the estimated 7,000 people who participated in far-right protests this summer in Chemnitz, Germany.
  • The group created a website with a partial list of protest participants — about 1,500 names it found through a cursory online investigation — to lure other right-wing extremists.
  • Thousands of people descended on Chemnitz, Germany over the summer to participate in far-right protests.
  • But the protests attracted thousands of far-right extremists and neo-Nazis, who targeted immigrants with violent attacks and openly threw up Heil Hitler salutes (which are illegal in Germany).

save | comments | report | share on


Using blockchain to combat sexual assault

  • This story explores how projects like Callisto and LegalFling are using blockchain technology to store vital information on assaults and record consent.
  • Several new projects promise to use blockchain to circumvent government censorship, store information on reported assaults, create databases, and record consent.
  • Instead of tools to help people battle a legal case in the event that they’re accused of sexual assault or harassment – which is what LegalFling seems to be – more education and discussion on what consent means, and how everyone has the right to it, is needed.
  • As in the case of Callisto and #MeToo activists utilizing the Ethereum blockchain, this technology can be of help, both in prevention and to survivors, as it anonymizes cases and records data that can never be altered.

save | comments | report | share on


Latest Facebook bug may have exposed millions of users’ private photos

  • Facebook disclosed another software bug on Friday that may have exposed some users’ private photos to app developers without their permission.
  • The bug, which was live for 12 days in September, may have impacted as many as 6.8 million users.
  • Facebook says the bug impacted hundreds of apps that let users create accounts and sign in using their Facebook login information.
  • The software bug gave hundreds of developers access to a broader range of Facebook photos than are usually allowed.
  • It did not impact photos shared in Messenger, and we’ve asked Facebook if it impacted photos shared to private groups or albums.
  • Not including Cambridge Analytica, which exposed the company’s weak privacy policies from years past, Facebook has had a number of other privacy mishaps, many of them in the past six months.
  • Facebook, meanwhile, will begin to alert users who were impacted.

save | comments | report | share on


The Italian Mafia is expanding abroad – and European police are unprepared

  • In December 2018, hundreds of Dutch, German, Belgian and Italian police officers arrested dozens of members of the powerful Calabrian mafia, the 'Ndrangheta, on suspicion of drug trafficking and money laundering activities across Europe.
  • The following year, Europol (the European Union Agency for Law Enforcement Cooperation) finally published an "Italian Organised Crime Threat Assessment".
  • But it is worth noting that it was a step mostly driven by Italian law enforcement agencies (whose success has helped to force Italian mafiosi and their money abroad to neighbouring countries) after the initiatives of the European Parliament.
  • European politicians engage and seek to defeat terrorism but as far as Italian mafias and organised crime go - and their ability to infiltrate legal economies and launder their proceeds of crime, made more often than not, from drug trafficking - there is no consistent political will to defeat them.

save | comments | report | share on


Powering customer journeys in the age of AI

  • It is very hard for businesses to unlock and integrate data across all the application silos in their enterprise (e.g. ERP, CRM, mainframes, databases) to create a 360-degree view of the customer.
  • APIs also provide the ability for AI systems to act across the entire customer journey by enabling a communication channel — the nervous system — with the broader application landscape.
  • Developers can then choose information sources to train the AI models and connect the AI systems into the enterprise’s broader application network to take action.
  • Businesses haven’t truly realized the full potential of AI systems at a strategic level, where they are building adaptive platforms that truly create differentiated value for their customers.
  • Strategic value can be realized when these AI systems are plugged into the enterprise’s wider application network to drive personalized, 1:1 customer journeys.

save | comments | report | share on


Everything you need to know about Google’s controversial China plans in advance of today’s congressional hearing

  • Critics fear that the project, code-named Dragonfly, will enable the Chinese government to block its citizens from accessing information it doesn’t like and surveil its political opponents.
  • It was also reported that Google would rely on a Chinese partner company for the infrastructure of the project, potentially leaving users’ search history vulnerable to be seized by the Chinese government, which regularly arrests and detains political dissidents.
  • It’s a politically tricky debate — one in which Pichai views himself as fulfilling Google’s mission to expand the company’s global reach, while critics — including House leaders set to question him this week — see him as compromising the company’s commitment to protecting the free flow of information online.
  • Right now, political dissidents aren’t being arrested because of their Google searches in China, but given cases like Tao’s, it’s not hard to envision a situation where they could.

save | comments | report | share on


France’s Ministry of Foreign Affairs says emergency contact information database has been breached

  • The Ministry of Europe and Foreign Affairs in France has released a statement announcing that personal information has been stolen in a data breach.
  • Around 540,000 records have been stolen — those records contained names, phone numbers and email addresses.
  • That database in particular contained first names, last names, phone numbers and email addresses.
  • Ariane’s user base hasn’t been exposed — it means that passwords and travel information have not been accessed.
  • The relationship between emergency contacts and Ariane users have not been accessed either.
  • If somebody put your contact information as their emergency contact, the Ministry has sent you an email to tell you that you’ve been affected by the breach.
  • There’s also a chance that you’ve been affected but you don’t know because somebody put your name, your phone number and an email address you don’t use anymore.

save | comments | report | share on