/home/leansigm/public_html/components/com_easyblog/services

SigmaWay Blog

SigmaWay Blog tries to aggregate original and third party content for the site users. It caters to articles on Process Improvement, Lean Six Sigma, Analytics, Market Intelligence, Training ,IT Services and industries which SigmaWay caters to

Edge Analytics : Antidote to Cyber security problems

Cybersecurity is a threat to the globe. The quicker it can be dealt with, the better it is. In order to quickly find the problem, the organizations have to deal with the available big data more efficiently. Edge analytics is the concept of extending edge computing to data analysis. The advantage is that analytics can be done closer to the devices which actually generated the data so that the predictive maintenance can be carried out and security problems can easily be dealt with. This is important in situations where waiting for sensor systems to transmit data to a remote cloud is just a wastage of time , for example the case of train safety.Edge analytics can act as a veritable antidote to the malicious act of hackers. Read more at:  http://www.csoonline.com/article/3195922/data-breach/is-edge-analytics-the-front-line-of-cybersecurity.html

 

Rate this blog entry:
2543 Hits
0 Comments

What is Real Intelligence Threat Analysis?

There is a big gap between what attackers do and what preventions defenders do to prevent it. The general idea is to build bigger and better blacklists for all the threats known or calculated using better threat intelligence.  We always hunt for easy ways, trying to seek out automation of security infrastructure. But these won't' suffice. The reason is because all the defenses are static and accessible to all. All it takes a hacker is to write a script to bypass these security measures. So a possible solution might be RITA, which stands for Real Intelligence Threat Analysis. Its SANS's free new framework that will help in hunting attackers by extending the traditional signature analysis. Read more at: http://www.darkreading.com/vulnerabilities---threats/introducing-rita-for-real-intelligence-threat-analysis/a/d-id/1323244

Rate this blog entry:
4265 Hits
0 Comments

Play it safe when using Wearables!

The trend of wearables is growing hotter each day. BYOD (Bring Your Own Devices) and IoT (Internet of Things) clubbed together, is adding more efficiency and flexibility. It's no surprise that smart wearables are already passé for fashionistas. On the counterpart, these trends are attracting the attention of hackers. Wearables are being profoundly used for both business and personal purposes. Thus making them a rich source of information. This could act to the disadvantage if the information gets into the wrong hands. Though the wearables have not revealed any big disadvantages, so far. But as always, with evolving technologies, there always exist weak points. The hackers find these weaknesses and exploit it to their benefit. So it is essential to do proper research on the wearable, before handling it a prominent portion of your information. Read more about it in an article written by Jen A. Miller (a freelance journalist) at: http://www.cio.com/article/3022059/wearable-technology/how-secure-are-wearables-anyway.html

Rate this blog entry:
4358 Hits
0 Comments

Cybersecurity Risk to Machine Learning Algorithms

Cybersecurity is a very important and is becoming one of the biggest worries for companies. According to various surveys, companies are investing a lot of money in cyber security and training their employees in it. It is estimated that till 2020 investment in the cybersecurity will be around $170 billion. In today’s world as the data is rising, so the risks on it are also increasing. The pattern classification systems that machine-learning algorithm rely on themselves exhibit vulnerabilities that can be exploited by hackers. As we know machine learning algorithms train themselves with the training data set so it may be manipulated according to the needs as hacker wants. For example, Search-engine-optimization algorithm was trained and manipulate website content to boost results in the search ranking or senders of junk emails try to fool spam-filtering algorithm. Even the results of the public election can also be affected by 20% or more as it is found that the order in which candidates appear in search results can have significant impact on perception. To read more about Cybersecurity risks, follow the article by Dr. Kira Radinsky (CTO and Co-founder of SalesPredict) at: http://blog.kiraradinsky.com/author/kiraradinsky/

Rate this blog entry:
4845 Hits
0 Comments

Why Hackers Hack CRM Data

Data is important in any business and customer relationship management (CRM) systems collect volumes of data, plan for the future, learn from the past, and is also a target for hackers. The most important reason that hackers are target CRM data is that it allows them to conduct fraudulent transactions. Phishing is another reason. Hackers target CRM data for the purpose of social engineering, also called masquerading. Jerri Ledford (Analyst with Studio B), writes in her article about why hackers want CRM data. To know more, follow: http://it.toolbox.com/blogs/insidecrm/3-reasons-hackers-want-your-crm-data-66053

 

 

 

Rate this blog entry:
4752 Hits
0 Comments
Sign up for our newsletter

Follow us