/home/leansigm/public_html/components/com_easyblog/services

SigmaWay Blog

SigmaWay Blog tries to aggregate original and third party content for the site users. It caters to articles on Process Improvement, Lean Six Sigma, Analytics, Market Intelligence, Training ,IT Services and industries which SigmaWay caters to

All new type of memory

Scientists from Fudan University, Shanghai, recently published their research revealing an all new type of memory. We have heard about RAM and ROM, and both of these memories have their own limitations like RAM is volatile but Super-fast and ROM can store huge amount of data but it is Very slow. This all new type of memory is claimed to be able to store data as long as we want. This technology works on two dimensional semi-floating gate transistors. Unfortunately, research is still going on and we will require to use our traditional RAM ROM for a little long till this research turns out to be a public product. And also there’s no doubt that this technology can bring revolution in terms of data storage, security, data transfer and many more.

Continue reading
Rate this blog entry:
2638 Hits
0 Comments

Importance of implementing IoT security

Now, IoT technology is important for any organization as IoT technology has the probability to help companies in reaching the next stage in their journey of digital transformation, but positioning this new tech without sincerely considering how to ensure data security is risky. Read more at: 

https://www.business2community.com/cybersecurity/iot-security-growing-awareness-about-what-needs-to-be-done-to-prevent-the-next-attack-02058267

Rate this blog entry:
2450 Hits
0 Comments

Data and Government Regulation

Data security is becoming a matter of increasing concern. Guidelines to cover the security is data are needed. Data breaches are being detected but, still classified data are at the risk of being leaked with the current age of data access. Data-driven algorithms have made it easy to control drones from remote areas. Data governance is the need of the hour, in order to regulate the access to different data, and control the extent to which data can be shared. Regulations for data visibility is important as it allows accountability and legitimizes and government laws introduced. Read more at: https://www.theguardian.com/science/political-science/2017/dec/15/data-will-change-the-world-and-we-must-get-its-governance-right

 

Rate this blog entry:
2831 Hits
0 Comments

Concept of Open Data

Open data is the data which is easily accessible and is in such a format which can be used by anyone.This data may or may not be free. This data can be made available through the API or pay per use models. This concept was initiated in the 1950’s when World Data Centre system was formed to enhance accessibility. Companies can, with the help of open data, develop applications and improve their products. Government can ensure transparency and efficient use of public money. Open data helps in decision making. The only concern being data security and privacy. Open data should be transferred within the legal boundaries after filtering, which data can be transferred and which cannot be. Read more at: http://analyticsindiamag.com/what-is-open-data-and-where-can-you-find-it/

 

 

Rate this blog entry:
3235 Hits
0 Comments

All About Cloud Security

Security is the biggest fear when it comes to storing data in any cloud based software. Security threats are always there in any online transactions. But, these threats always hold us back from new opportunities. It is found that implementing cloud-based software not only save time and money for businesses, but it also helps staff in order to develop new products and services and work towards business growth as cloud software is encrypted and password protected to ensure data security. It also provides a backup for important files and data that could become lost or corrupted should any damage to devices occur and cloud file storage can also be implemented in order to share and store documents within a business.

Read more at: http://www.business2community.com/cloud-computing/safe-sound-cloud-01547415#xwseISmoIe431UFw.97

 

Rate this blog entry:
3731 Hits
0 Comments

Android based cyber security mobile device: A Blackberry way

Android based cyber security mobile device: A Blackberry way

Last couple of years smartphone company Blackberry is facing serious financial degradation due to the presence of android device at cheaper price and with more features. After a huge loss in the smartphone market, Blackberry is trying to diversify their business into cyber security sections under the guidance of John Chen, Executive chairman and CEO of Blackberry. They acquired new companies for providing data security. These companies are providing data sharing security, Geo tagging and automated security alerts, tracking, auditing files inside or outside firewall.

To read, follow: http://www.forbes.com/sites/stevemorgan/2016/04/28/blackberrys-turnaround-ceo-dials-up-cybersecurity-and-it-answers/#515f874e6921

 

Rate this blog entry:
3921 Hits
0 Comments

IoT & its trend

The Internet of Things (IoT) generates semi-structured or unstructured data in real time. Organizations take advantage of cloud because big data can be best managed in the cloud. By utilizing fog computing, organizations can decrease time to action; reduce costs, infrastructure and bandwidth; and can get greater access to data. The advantages of the decentralized method of fog computing and IoT analytics cover both the organization and the end user. One of the benefits of centralization is to focus and understand the data location and the accessibility. The decentralized method is associated with flexibility and agility. This tends to describe the data management trends and applications. Read more at the article written by Jelani Harper (blogger) : http://data-informed.com/the-internet-of-things-and-the-necessity-of-fog-computing/

 

 

Rate this blog entry:
3235 Hits
0 Comments

Effective ways of protecting VoIP from cybercrime

In a research, it was found that throughout the IT realm, cyber criminals are executing faster attacks and cyber crimes have increased due to increased risks in VoIP system. A growing number of attacks against business VoIP systems to greater availability of hacking tools are available to would-be criminals through illegal means. A company's VoIP security is as strong as an organizational approach to data security and by implementing appropriate protections around telephony, customers and organization are protected from data breaches. In this article, we will explore the most common and effective ways of protecting VoIP from cyber crime. Read more at:  http://it.toolbox.com/blogs/voip-news/voip-security-5-very-real-solutions-to-super-scary-threats-70706

 

Rate this blog entry:
4219 Hits
0 Comments

Cloud And Security Myths

There is a fear attached to the security of cloud. However these are myths. Some are:
1. Cloud is riskier than traditional IT: Data breaches can happen on premise. The efficient way is to work with a competent, experienced provider that invests in strong network securities.
2. You can’t control where your data resides in the cloud: regulated industries like health care require valuable information. This is discredited because organizations can choose specific region based data centers, private clouds.
3. The cloud is not suitable for complaint workload: organizations can leverage for private or hybrid cloud development model better suited to the needs.
To know more, follow:
http://www.information-age.com/technology/cloud-and-virtualisation/123459832/3-myths-about-cloud-and-security

Rate this blog entry:
5000 Hits
0 Comments

Improve treasury management services using Cloud

The finance function has undergone a metamorphosis in recent times owing to financial crisis and several other events. The treasurer is now being relied upon to cut costs and add value to organizations. Treasurers, today, face the challenge of doing more with less and this is being facilitated by cloud. Cloud facilitates movement of money and information between countries. Having a centralized treasury team can be done away with as using cloud platform facilitates management of operations from every corner of the world. Communicating with partners outside the organization is also made easier with a cloud-based treasury management system. Treasurers are being prevented from using Cloud due to safety and security of data issues which can be overcome with cloud providers providing better security than in-house systems. Read more at: https://channels.theinnovationenterprise.com/articles/the-treasurer-and-the-cloud

Rate this blog entry:
4416 Hits
0 Comments

Permission marketing

Permission marketing is now trending. Consumers don’t like to get interrupted often and so they take actions to block online ads, promotion emails. This new era of permission marketing can be broken down into “anticipated”, “personal” and “relevant”. A recently concluded study shows customers are willing to share information with trusted brands. Data privacy acts now protects consumers from personal data collection through websites and other online sources. Cookie law is such an example. Customer data can be explicit, implicit or structured by analytical tools. Thus data security is of utmost importance and it is the responsibility of organizations. Consumers are always looking for their needs to be met by companies and this gives the companies the chance to make the best use of data collected providing value to the organization. Read more at: http://www.cmswire.com/digital-marketing/tracking-customer-data-you-better-provide-value/

Rate this blog entry:
4457 Hits
0 Comments

Healthcare Engulfed By Analytics

Healthcare Analytics Market has been predicted to have tremendous potential over time with low cost and improved population health. Survey report gives an increase in analytics adoption rate though many still don't use predictive modelling techniques. Data integration is required to derive analytical value which comes as a big challenge. Data Breeches and Data Security is a lesser factor than the former one since enterprises take their own data. But this factor works when external data is taken into account. People with a unique combination of statistics training, technology skills, and data knowledge are also required in large number. Also, infrastructure improvement for analytics must be done according as many healthcare decision makers. Thus analytics is getting much priority in healthcare in recent times. Read more about this article at:  http://www.cio.com/article/2904270/healthcare/healthcare-analytics-4-things-impacting-the-adoption-rate.html

Rate this blog entry:
4328 Hits
0 Comments

Bancassurance: an emerging concept

The sale of insurance and other similar products through a bank to help it customers at situations is known as Bancassurance. Development of Bancassurance in India began to improve the channels of insurance policy so as to reach the hands of the common, to widen the area of working of banking sector, to improve the services of insurance. The Reserve Bank of India and the insurance development and regulatory authority have a set of guidelines for companies to form Bancassurance. It basically encourages people to buy insurance policies increasing the number of providers. It also has demerits such as interest conflict of bank and insurance policies, compromising on data security, etc. Read more about this article at: http://tips.thinkrupee.com/articles/bancassurance-in-india.php

Rate this blog entry:
4962 Hits
0 Comments

Big Data vs. Data Privacy

According to author Shreya Sharma, with Big Data becoming an essential part of an organization, it is getting harder to balance it with data privacy. Marketers should be clear about the data they are collecting and make sure that data storage and security infrastructure are safeguarded, otherwise it can have serious effects on the company as most consumers expect a company to protect their personal data, and their consuming behavior depends on this. It is therefore crucial to bear a high level of awareness with regards to the significance of data privacy and protection. The responsibility should be seen as norm and not just be restricted to people who are directly involved in mining big data. To know more, please follow: http://analyticsindiamag.com/in-action-how-companies-should-follow-a-data-centric-security-approach/

Rate this blog entry:
4984 Hits
0 Comments

Data security in the cloud

The rapid rate of cloud adoption has given rise to the natural necessity to have some data generated live on cloud-based platforms. One of the biggest mistakes a company can make is assuming that once you are managed by a hosting provider or other cloud-based platform company, the inbuilt security features will provide everything you need from a data safety perspective. Depending on the cloud service provider or managed service provider you use, you can expect scalability and flexibility to be built into the system so that you don't miss out on the cloud's ability to quickly respond to changes in demand. Having the technical skills in-house is just as important as finding the outsourced technical expertise that will enable a greater degree of secure infrastructure planning.

 

To know more visit the article at http://www.cloudcomputing-news.net/blog-hub/2013/nov/19/the-reality-of-data-security-in-the-cloud/

Rate this blog entry:
6640 Hits
0 Comments

Healthcare cloud security: now and into the future

An article by David Linthicum, SVP at Cloud Technology Partners, talks about how Healthcare providers and payers utilize cloud platforms to store and access personnel records. He also spoke about the use of managed security services providers that will allow healthcare organizations to push some of the responsibilities to security experts.

 

To know more about security concerns in healthcare follow http://www.cloudcomputing-news.net/blog-hub/2014/apr/11/healthcare-cloud-security-now-and-into-the-future/

Rate this blog entry:
7242 Hits
0 Comments

Heartbleed web security bug: What you need to know

OpenSSL is a popular cryptographic library used to digitally scramble sensitive data as it passes to and from computer servers so that only the service provider and the intended recipients can make sense of it. If an organisation employs OpenSSL, users see a padlock icon in their web browser - although this can also be triggered by rival products. Google Security and Codenomicon - a Finnish security company - revealed on Monday that a flaw had existed in OpenSSL for more than two years that could be used to expose the secret keys that identify service providers employing the code. They said that if attackers made copies of these keys they could steal the names and passwords of people using the services, as well as take copies of their data and set up spoof sites that would appear legitimate because they used the stolen credentials. This vulnerability allows anyone on the internet to read the memory of the system protected by the bug-affected code. In this way, they can get the keys needed to decode and read the data, according security researchers at the Finnish firm Codenomicon who discovered it. The bug is independently discovered recently by Codenomicon and Google Security researcher Neel Mehta. The official name for the vulnerability is CVE-2014-0160.

To read more, visit:

http://www.cbc.ca/news/technology/heartbleed-web-security-bug-what-you-need-to-know-1.2603988

Rate this blog entry:
11549 Hits
0 Comments
Sign up for our newsletter

Follow us