Building a Data as a Service Platform for AI – Q&A with a zvelo Engineer

Building a Data as a Service Platform for AI – Q&A with a zvelo Engineer With the recent release of zveloDP™, zvelo’s Data as a Service platform, we thought it was an excellent opportunity to ask some questions about the platform and get some insight into the technology behind the curtain. Q:  First things first,…

EU-US Privacy Shield: New Framework for Translatlantic Data

EU Commission and United States agree on new framework for transatlantic data flows A new US/EU arrangement puts stronger regulations on companies in the U.S. to protect the personal data of Europeans and stronger monitoring and enforcement by the U.S. A few highlights that new arrangement will include: Strong obligations on companies handling Europeans’ personal…

Thoughts on Secure Programming, Education and BYOD

Recent events serve as the best example of how the context of security has shifted from the once server-centric model to that of a decentralized threat landscape. From the Heartbleed attacks to the widespread Internet Explorer vulnerabilities and finally the sensationalized OAuth issues, it appears that even organizations with a hardened perimeter infrastructure are just as vulnerable as an end-user at home.

The Convergence of Data Analytics and Security

A renewed sense of urgency to secure information, networks and electronic devices in order to thwart advanced hacking techniques loomed over the 2013 RSA conference floor in San Francisco. The harsh realization that traditional security measures simply don’t cut it anymore was confirmed by various keynotes and casual hallway conversations between peers.

How Excessive Admin Features Can Lead to Security Headaches

At DEF CON 2012 in Las Vegas I sat through a presentation titled “Owning One to Rule them All,” hosted by penetration testers Dave Kennedy and Dave DeSimone. They discussed a recent penetration test that utilized Microsoft Systems Center Configuration Manager (MSCCM) to gain access to essentially an entire network of computers. MSCCM is intended to streamline the management of multiple devices – desktops, laptops, smartphones and tablets – within IT infrastructures. While a tool like MSCCM may seem convenient, granting too many administrative features can lead to more serious network security headaches, including breaches.