In an era of almost daily news reports of cybersecurity breaches, cyber threats and cyber attacks, an attack on critical infrastructure and power grids grows more likely every day. What can be done about it? Is the US adequately prepared to thwart such an attack? Consider several factors in
The IBM i2 Summit for a Safer Planet illuminated how fraud and crime in the financial sector are highly profitable and very damaging to the industry. Organizations facing the challenges of staying one step ahead of perpetrators can apply an advanced solution that places layers of analytics across
Clearly, no organization is impenetrable when it comes to cyberattacks by hackers—not the US government’s Office of Personnel Management, not major retailers, not Ashley Madison, and not even global enterprise technology vendors. The sinister realities of cyberattacks in today’s world hit Jen hard
After experiencing one of “those” days following a successful Trojan horse cyberattack against her company’s systems and missing lunch, a highly frustrated and hungry Jen is reminded of the importance of the IBM i2 Summit for a Safer Planet conference. See how Jen’s experience demonstrates why
While procuring some whodunits for in-flight reading, Jen ruminates on the IBM i2 Summit in Washington DC and the professionals who apply technology and analytics to cyberthreat prevention, law enforcement and security.
The Internet and our social feeds are full of blogs, news and articles on the strides that the public sector is making with big data and analytics. This Public Sector News series skims the wires and pulls out the most interesting articles that give us fodder for thought and debate.
The Internet and our social feeds are full of blogs, news and articles on the strides that the public sector is making with big data and analytics. This Public Sector News series skims the wires and pulls out highly interesting articles that provide the fodder for thought and debate.