Voodoo Technology

98 Added | 3 Magazines | 8 Followers | @Voodootec | Providing products & services to address challenges that enterprises face within Data Lifecycle Management, IT Governance, Risk & Compliance 0845 257 0071

Governance

Why Your Organization Needs a Data Governance Plan

Public sector organizations face more data challenges today than ever before. As discovered via research performed by North Highland Consulting, the …

Sane Governance in the Digital City | Smart Cities Dive

<i>"There is a canyon dividing people who understand technology and people charged with addressing the world's toughest [..] issues, and no one has</i> …

Carsharing

Avoiding Data Swamps with Big Data Governance

Michele Goetz at Forrester recently wrote that “…Big Data is creating data swamps even in the best intentioned efforts…Analysts will still spend up …

EHRs, Electronic Data Information Governance Needs to Mature

July 29, 2015 - Despite its perceived importance, information governance programs are not as widespread or thoroughly developed than they should be, …

How to shop online safely during the summer sales

The summer sales are upon us and there are plenty of good deals to be had online, but internet shopping is not without its dangers.<p>From phishing …

Bots, Phishing, Malware: How Hackers Target Steam Users

Researchers find hackers using increasingly sophisticated methods to go after lucrative in-game inventories.<p>Wherever there is a victim to be scammed, a service to be hijacked, or an item to be stolen, there will be people ready to make a profit. In the world of gaming, the stakes are higher than …

Gameplay

Discovered a new Google Drive Phishing Campaign

Experts discovered a new Google Drive phishing campaign in which the threat actors deployed phishing web pages on Google Drive.<p>Once again phishers …

Adopting Cyber Security Frameworks (Before It Is too Late)

The recent OPM cyber breach at the U.S. Government’s Office of Personnel Management (OPM) provided a wakeup call to the seriousness and …

Cyber Security Shows Round Up

<b>We have attended may data classification and security events over the last few years. This year at Manchester IP Expo we had the benefit of meeting</b> …

Do you manage risk – or certainty?

I often think that “risk management” is a misnomer. You don’t actually manage risk. For all of the claims made by the statisticians, there’s pretty …

Forget Cyber, it's all about the data!

Ever wonder why data breaches are now called cyber attacks, or an application on the Internet is now called The Cloud? It’s for the same reason that …

Pakistan bans BlackBerry services in privacy crackdown

Telecommunication authority orders encrypted messaging and internet services to be stopped ‘for security reasons’<p>Pakistan has banned BlackBerry’s enterprise server and its internet and messaging services “for security reasons” in a crackdown on privacy.<p>Mobile phone operators were told by the …

Privacy

Facebook ordered to allow fake user names in Germany

Hamburg watchdog says company's 'authentic name' policy violates German privacy laws<p>A German privacy watchdog this week ordered Facebook to allow users to join the social network with pseudonyms, Reuters reports, directly challenging the company's "authentic name" policy. In a decision handed down …

Privacy

Distrust in use of personal data could hinder business growth - Help Net Security

A study from the Digital Catapult has explored trust in the use of personal data and revealed worrying trends which could hinder the delivery of …

How will the internet of things impact data security?

The internet of things has many advantages, but when machines start collecting data, privacy and security become an issue<p>When we hand over data to a company most people realise there is a value exchange. The organisation gets to learn more about us for future communications, but in return they are …

Internet of Things

MIT researchers figure out how to break Tor anonymity without cracking encryption - ExtremeTech

By on July 29, 2015 at 2:01 pm<p>This site may earn affiliate commissions from the links on this page. Terms of use.<p>The Tor network has millions of …

Privacy

Google has just done something that’s going to annoy the US and UK governments

The service was revealed by Google product manager Leonard Law in a blog post and is currently in beta form.<p>It will let businesses running the company's Google Compute Engine create their own encryption keys.<p>Encryption is a security technology that scrambles digital information using specialist …

Privacy

Man loses 'right to be forgotten' Google court bid

<b>A man involved in a £51m VAT scam has lost a legal bid to have news stories about him removed from Google under the so-called "right to be forgotten".</b><p>Malcolm Edwards originally applied for an injunction forcing five media organisations including the BBC to remove their articles about him.<p>He …

Privacy

New Leak Confirms the Secretive Trans-Pacific Partnership Is a Horrorshow

At a luxury hotel in Maui, representatives from the 12 countries participating in the highly controversial and secretive Trans-Pacific Partnership trade deal are negotiating behind closed doors. Thanks to a secret letter from a 2013 meeting, released today by WikiLeaks, we now have a clearer idea …

World Economy

Extra sneaky Hammertoss malware acts just like you on your computer

Security company FireEye says a Russia-sponsored group uses malware that mimics normal computer use while stealing sensitive files.<p>Malware -- the destructive software that sneaks onto your computer and helps hackers breach important systems -- usually has a tell. While it's running on your …

Malware

Seven things security experts do to keep safe online

From using password managers to checking urls, best practices revealed in new study<p>Cybersecurity experts aren’t like you or I, and now we have the evidence to prove it. Researchers at Google interviewed more than 200 experts to find out what security practices they actually carry out online, and …

Information Systems

HR Steps Forward with Analytics

HR Must Modernize to Meet New Employee Demands<p>Attracting, retaining, and promoting your best people has become more challenging than ever in the …

Employee Engagement

How to send encrypted emails

Long has the war for email privacy been fought – and it looks we’ll keep fighting far into the future. People have always wanted to make sure than …

Information Systems

Massive Steam security flaw left accounts wide open

Over the weekend a major flaw in Steam’s account login process was discovered that allowed users to reset any account knowing only the target’s email address.<p>Exploiting the security hole was as easy as requesting a password reset code, then visiting the special reset page and pushing OK.<p>That reset …

Week in review: Tools for detecting Hacking Team spyware, vulnerable Smart Home Hubs, and the most sophisticated Android malware ever exposed - Help Net Security

Week in review: Tools for detecting Hacking Team spyware, vulnerable Smart Home Hubs, and the most sophisticated Android malware ever exposed<p>Here’s …