(Note: This article is a repost from Security Intelligence)
If you haven’t played the new “Pokemon Go” game yourself, someone close to you definitely has. The game has gone viral since its release, and it has people out in droves wandering around neighborhoods looking for Pikachu.
In the workplace, cloud apps such as “Pokemon Go” are wildly popular — and have been for a while. We all want to play, but CISOs must consider some general security requirements to be both efficient and safe.
Here are five requirements from “Pokemon Go” that can be applied to adopting cloud apps in your organization.
(This article is a repost from A Smarter Planet Blog)
Over the past two decades, the Internet, cloud computing and related technologies have revolutionized many aspects of business and society. These advances have made individuals and organizations more productive, and they have enriched many people’s lives.
Yet the basic mechanics of how people and organizations forge agreements with one another and execute them have not been updated for the 21st century. In fact, with each passing generation we’ve added more middlemen, more processes, more bureaucratic checks and balances, and more layers of complexity to our formal interactions–especially financial transactions. We’re pushing old procedures through new pipes.
This apparatus–the red tape of modern society–extracts a “tax” of many billions of dollars per year on the global economy and businesses.
What can be done? One potential solution is an intriguing technology called blockchain, which is little understood outside a small fraternity of computer scientists.
網絡罪行日趨嚴重，社會各界尤須多加瞭解暗黑網絡 (Dark Web)：循正常途徑接觸不到的地下網絡。其實，要進入暗黑網絡殊不困難，而這正為企業平添許多風險。
透過免費下載的洋蔥路由器 (Tor) 軟件，人人皆可連上暗黑網絡，過程不著痕跡，身份因而得以隱藏。此匿名通訊系統，對於新聞調查、情報收集及國家安全等事務至為重要；然而，犯罪份子亦多用其來掩飾身份，進行非法勾當。