article thumbnail

Fed Tech Roundup October 8

CTOvision

Mike Olson Strata + Hadoop World 2015 Opening Keynote. CIA Social Media Team: We Use Twitter to 'Explain Our Mission' - Nextgov. Revision could move NIST authentication guidance out of the weeds. Federal officials say MOX project no longer affordable - Greenville News. Can feds share America's 'invisible infrastructure'?

article thumbnail

WayIn Success At Real-Time Digital Marketing Technology Generating More Buzz And More Funding

CTOvision

DENVER – September 24, 2015 – Real-time digital marketing software company Wayin has secured $15.4 The additional funding validates the value and growing importance of real-time marketing and the integration of authentic user-generated content into the marketing mix as a part of driving bottom-line business goals. Wayin Raises $15.4

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The anatomy of a Facebook account heist

Vox

While many people might think of Russian state-sponsored hacking groups when it comes to infiltrating social media platforms, there’s actually a global network of hackers participating in an underground economy where things like Facebook and Instagram accounts are commodities.

Groups 142
article thumbnail

How to Stop Hackers in Their Tracks and Protect your Business

Galido

Use Two-Part Authentication. If so, your information could be at risk.There are sites that now use a two-part authentication process. Social media is both a blessing and a curse. Originally posted 2015-12-09 21:55:40. Simply purchase software that will help you come up with passwords and then save them for you.

How To 98
article thumbnail

Security attacks and countermeasures

Cloud Musings

The majority of these attacks are due to hacking, fraud and social engineering. Social engineering is a methodology that enables a perpetrator to persuade or induce an individual to provide sensitive information or access to the unauthorized perpetrator. For example, in the first half of 2014, 84.6% Most Active Malware Today.

Security 159
article thumbnail

AWS vets lead new startup that aims to connect workers with nonprofits through ‘volunteerism’

GeekWire

The two previously worked together at video processing startup Elemental Technologies, which was acquired by Amazon in 2015 and became AWS Elemental. Seattle Works recently shared an update that it was shifting its focus in light of evolving social awareness. Blackman is the startup’s CEO and LaPier is chief technical officer.

Nonprofit 119
article thumbnail

Insider Threat: A perspective on how to address the increasing risk

CTOvision

According to the Verizon 2015 Data Breach Investigations Report, insider and privilege misuse has had the most notable increase in activity and is occurring in every sector of the economy. The insider represents true risk to every firm and organization. Additionally, insiders now have new ways of coordinating with others.

How To 150