Should CIOs care about their Klout score? Dorrie Clark thinks so.
The hackers are at it again: This time, as many as 1.5 million MasterCard and Visa numbers were breached on Friday.
Those Millennial-generation traits continue to bewilder baby boomers and Generation X leaders. Almost 90% of Millennial workers feel it’s important to be constantly learning at their jobs, and 70% feel they need “me time” at work, versus 39% of baby boomers.
Why aren’t more women in leadership positions? Mega-billionaire and Virgin mastermind Richard Branson thinks companies should be forced to have more females on their board of directors.
You want big data? You can’t handle the big data. IBM and ASTRON (an astronomy organization based in the Netherlands) plan to collaborate to explore the origins of the universe with a Square Kilometer Array. The telescope can scan an area roughly the span of the continental U.S. at once.
With the death of Steve Jobs, the tech world eagerly awaits the next great visionary to emerge. Despite what Jeff Bezos or Mark Zuckerberg would like you to believe, it seems that great leaders are in short supply.
Are Millennial-generation traits leading to more young women suffering major burnout at work?]]>
Now, Google has agreed to support the Do-Not-Track button and will add it to Chrome within nine months. You may remember that the Federal Trade Commission called for the adoption of a Do-Not-Track button on Web browsers two years ago. In theory, it would allow consumers more autonomy in sharing their own personal privacy with third parties. Nevertheless, when Firefox and Internet Explorer added Do-Not-Track buttons, users were still tracked by advertisers and companies that hadn’t agreed to honor the arrangement. What is it they say about good intentions?
Meanwhile, California is attempting to shut down data privacy leaks via mobile applications. The state has reached an agreement with Google, Hewlett-Packard, Amazon.com, Apple, Microsoft and Research In Motion — one that it hopes will protect smartphone users from further privacy breaches like the Path and Google debacles uncovered earlier this month.
When it comes to the Internet and government intervention, we have to be mindful of the careful dance around precedent. We applaud when the U.S. government tries to protect us from data poachers with a privacy bill of rights, but just a month ago we were up in arms about the Stop Online Piracy Act. So, which is it going to be? Do we want the government regulating the Internet or don’t we? As you well know, I tend to have a cold, black heart that’s filled to the brim with pessimism about Internet privacy; the Do-Not-Track button and the White House’s privacy bill of rights feel to me like security theatre.
What do you think? Will the Do-Not-Track button make a difference in upholding consumer data privacy? Is it the role of government to regulate the Internet? The comments are waiting to hear from you.]]>
• Remember Google’s vow to do no evil? If you use Safari, you have been the victim of privacy violations. Google has bypassed Safari’s default privacy setting with regards to its third-party cookies. Whoops?
• Speaking of macolytes: Just remember, kids, friends don’t let friends leak Apple insider secrets.
• Are you ready for the Nook 8GB tablet? Time to dig out that BYOD policy and update it again.
• Every CIO is familiar with Moore’s Law, but a new transistor made from a single atom might beat that principle very soon.
• Google is still king of the Web, according to last month’s Web traffic ranking, which also reveals that U.S. Internet users hit a whopping 36 hours online last month. We’re more surprised that there are people still using MySpace.
• If your CMO has been making noise about starting a Facebook storefront, you might want to point out the deserted Facebook storefronts that already litter the social media network’s Main Street.
• Are we just going to have to accept online privacy violations as a way of life?]]>
Your team is your first line of defense with your company’s data privacy and security, yet your employees are sharing company secrets — intentionally or not — via IM clients. Check out this primer to ensure that sensitive information stays out of chat logs.
We all know that meetings are a critical part of managing a team, but they can be enormous time-wasters too. Here’s a great drill-down of a best practice for the weekly status meeting.
What does the term distributed denial-of-service attack, or DDoS, really mean? We predict that “Anonymous” won’t appreciate Forbes calling its work “digital graffiti.”
Blogger Ian Thomas argues that we might be jumping into big data before we’ve gotten our storage strategies in line.
Hackers have broken into the Google Wallet app on Android devices. Google is addressing the personal data privacy and security breach, but when you start hacking into the world of finance, everyone gets a little testy.
If you’re worried about personal data privacy and security, be careful with your free mobile apps. It turns out that the free Path iPhone app was grabbing its users’ contact data and uploading their data to its own servers. What? You mean a free service is taking advantage of its users somehow? Color us shocked.]]>
Proponents of tough anti-piracy laws will be back with more specific language about what defines a site that hosts online content and which punishments will be enforced for sites that host content “illegally.” Once that is settled, content providers can begin focusing on true pirates, not everyone who might have a rogue video posted on their server.
Assuming that eventually happens, the big issue seems to be users’ desire for online content and what they are willing to give up for it, whether it is a credit card or personal information or risk being able to download it at all.
While these fights are going on, lawmakers for the European Union are attacking another hazard of online life: privacy. EU officials are proposing privacy protections for data and individuals that are even more strict than existing EU laws. Opponents of these proposals say such stringent measures will hurt business and innovation.
I think it is interesting that the U.S.-based businesses (primarily entertainment firms) behind SOPA and PIPA are a lot more concerned about prohibiting unauthorized access to content than they are about protecting the privacy of their customers, whose data are mined by the terabyte every day in order to find more ways to get them to view all of that content.
What users should be fighting for is for more control over their online lives, and that means tougher privacy laws.
What do you think?]]>
There was some concern that a recent OAuth update in Twitter’s API would now allow third-party Twitter applications to access your private messages without authorization. Twitter attempted to soothe our worried brows over the possible loss of DM privacy, but we’re still twitchy over the whole thing.
Google vs. Apple: Which techno megagiant is cooler? It’s like asking whether Gandalf could beat Obi-Wan in a fight — does it really matter?
Everyone’s heard of an upside-down mortgage, but what about an upside-down workforce — millennials have difficulty finding jobs because the baby boomers won’t retire.
If you’re like most people, you subscribe to Groupon’s emails but have never actually bought a Groupon. We wonder how many of that 18% of buyers are actually using their Groupons before they expire?
One of our favorite personal IT bloggers, Jason Fitzpatrick, explores readers’ favorite tips and tricks for encrypting data. No surprises there –TrueCrypt and Dropbox are popular conjoined services.
About 1% of Citibank customers’ names, credit card numbers, mailing and email addresses were exposed to hackers last month, but Citibank chose not to reveal the breach to the public until last week, drawing harsh responses from industry experts. On the heels of Epsilon, Sony and Gmail, one has to wonder who is next. Hopefully not TrueCrypt and Dropbox!]]>
My first thought was that at least companies are getting less squeamish about putting out breach notifications. By now, businesses understand that a security breach doesn’t necessarily mean that they will be put out of business, which we learned with the TJX data breach.
But what is different in the wake of the Epsilon attack is that cybercriminals don’t necessarily have to get all of your personally identifiable information anymore to be able to get an edge on the consumer. Here, they just got names and email addresses. But that may be enough: A mere notification may be enough to spur someone to reply to a phishing email and inadvertently give away much more information than the original breach garnered.
Just as companies all have to have security and privacy policies, so do individual consumers when dealing with cybercrime. The same rules apply, however — awareness, diligence and taking the responsibility to know with whom you are doing business.]]>
HP’s announcement this week to acquire ArcSight is its second security acquisition in the last month and the latest in a wave of bigger technology and computer companies gobbling up smaller players in the data security software and services market. HP followed buying Fortify, which specializes in secure development and security testing, with ArcSight, which focuses on compliance and risk management.
Last month, Intel agreed to acquire McAfee while Symantec — already the leader in data security software and services — has bought up PGP, GuardianEdge and VeriSign’s authentication services business in the past month. IBM just came out with new software from its acquisition of Guardium last year.
On the one hand, this market consolidation by these IT leaders will enable more of a one-stop shop for security products, and likely better integration that will enable a holistic solution.
However, many midmarket firms and small businesses that use Fortify, ArcSight or Guardium products may not already be current HP or IBM customers, certainly not for security products, and will miss the ability to build the niche security solution that fits into their environments.
It’s surprising that it has taken so many years for large IT and computer vendors to see the value of security. But now that it has, it could mean more challenges and less opportunity for midmarket security buyers.]]>