10 CHALLENGES TO BIG DATA SECURITY AND PRIVACY

10 CHALLENGES TO BIG DATA SECURITY AND PRIVACY

Posted by SGCS Admin, 31-07-2017

Big Data could not be described just in terms of its size. However, to generate a basic understanding, Big Data are datasets which can’t be processed in conventional database ways to their size....

Cyber criminal who laundered £3bn in bitcoin arrested in Greece

Cyber criminal who laundered £3bn in bitcoin arrested in Greece

Posted by SGCS Admin, 28-07-2017

A Russian national suspected of being the mastermind behind a digital currency exchange has been indicted by a grand jury in California on money laundering charges.    Alexander Vinnik is ...

Flush times for hackers in booming cyber security job market

Flush times for hackers in booming cyber security job market

Posted by SGCS Admin, 28-07-2017

The surge in far-flung and destructive cyber attacks is not good for national security, but for an increasing number of hackers and researchers, it is great for job security.   The new reality ...

Hospitals Face Growing Cybersecurity Threats

Hospitals Face Growing Cybersecurity Threats

Posted by SGCS Admin, 27-07-2017

In the neonatal intensive care unit of Cook Children's Hospital in Fort Worth, Texas, a father is rocking a baby attached to a heart monitor. While doctors roam the halls trying to prevent infections,...

Companies may use customers’ personal data without consent in certain cases under proposed changes to PDPA

Companies may use customers’ personal data without consent in certain cases under proposed changes to PDPA

Posted by SGCS Admin, 27-07-2017

SINGAPORE – Businesses may be allowed to use consumers’ personal data without getting their consent in cases where it is impractical or inappropriate to do so under a series of proposed ch...

What Makes a Hacker? Two Cyber Experts Explain

What Makes a Hacker? Two Cyber Experts Explain

Posted by SGCS Admin, 27-07-2017

Companies are under constant assault from hackers but, for many people, the threat feels abstract and far away. That's why Fortune produced the video above: It explains who the hackers are, and what t...