It isn’t often CIOs can make like the pros and draft “players” for their IT team but in early 2015 that’s exactly the scenario Tony Bender found himself in after he agreed to help Edgewell Personal Care peel off its Energizer brand as a separate company. Bender recalls meeting with Mike Aufdembrink, who Energizer hired as its CIO in December 2014, so they could fill out each of their IT teams.
"Early in the year we sat down and had what was akin to a draft," Bender recalls. "It was, 'OK, I want this person and if you get this person, I want this person. We had to divide the team up and make an offer to each person."Edgewell Personal Care
Tony Bender, CIO of Edgewell Personal Care.
Facebook is on track to surpass 2 billion monthly active users (MAU) before the end of this summer. The company ended the first quarter of 2017 with 1.94 billion MAUs and 1.28 billion people using the social network every day.
While the monthly user base grew 17 percent year-over-year, daily usage jumped at a slightly higher rate of 18 percent during the same period. Overall growth remains steady, which is unique for a company with such a massive global user base. Facebook reported identical growth rates on a percentage basis in the previous quarter.
Having trouble finding the right security products for your business? You’re not the only one.
Today’s market is filled with hundreds of vendors and plenty of marketing hype. But figuring out which solutions are worthwhile can be a challenge, especially for businesses with little experience in cybersecurity.
So we asked actual buyers of enterprise security products for tips, and here’s what they said.Damian Finol, security technical program manager at a major internet firm
Businesses have to do their research. That means looking at customer recommendations instead of relying on what vendors say. Testing the security products in house is also highly advised.
There's a growing threat on the cybersecurity scene that could drain millions from unsuspecting businesses and leave them vulnerable to hacking threats.
It isn’t a new strain of ransomware. It’s the cybersecurity industry itself.
It's ironic, but the products vendors sell, and the marketing they use, sometimes leave buyers misinformed and less secure, according to several business directors who actually buy the tech.
“There’s definitely a lot of vaporware,” said Damian Finol, an IT security manager at a major internet company. “There are definitely products that have really exaggerated claims about what they actually do.”
For some vendors, it's more about the sale than about security, IT executives say. To close a deal, bad vendors tend to overpromise features that they claim will be added down the line but never materialize. That makes a buyer's job harder.
Today's reality is that if the enterprise uses networked computers, they will get hit at some point. Not having and practicing a recovery plan could be the doom of any organization.
John Bruce, CEO and co-founder at IBM Resilient said, "Resiliency is the ability of an organization to maintain its core purpose and integrity in the face of cyber incidents."
Cyber resiliency is a critical element of the overall organizational resiliency, which includes the many things that organizations grapple with in the real world. Bruce said that in the digital world, the enterprise should also have disaster-recovery plans.
Uber Technologies is reportedly under a criminal investigation by federal prosecutors in the U.S. over its use of secret software, which helped the company avoid officials seeking rides to investigate the ride-hailing service, according to news reports Thursday.
Their accounts appear to tally with a report last month by the Portland Bureau of Transportation, which stated that the City of Portland was notified by the U.S. attorney of the Northern District of California that Uber is the subject of a federal inquiry. The city is cooperating with the on-going probe.
Soon after the use of the so-called “greyballing” technology in many countries was reported by the New York Times in early March, Uber said it would prohibit the use of the technology to target action by local regulators.
Data scientists are using machine learning to tackle lung cancer detection. Beginning in January, nearly 10,000 data scientists around the world competed in the Data Science Bowl to develop the most effective algorithm to help medical professionals detect lung cancer earlier and with better accuracy.[ Analytics 50: Call for 2017 entries ]
In 2010, the National Lung Screening Trial showed that annual screening with low-dose computed tomography (CT) — a scanner that uses computer-processed combinations of many X-ray images from different angles to generate high-contrast 3D images — could reduce lung cancer deaths by 20 percent. While a breakthrough for early detection, the technology has also resulted in a relatively high rate of false positives compared with more traditional X-rays.
Blockchain technology is hard to ignore as practically everybody’s talking about it. That’s understandable because it’s predicted to disrupt the value flows that underpin business transactions and economies as well as create new business models. It has enormous power to solve business problems. But is a blockchain “distributed ledger” secure?
Blockchain is still in its infancy, so company leaders are naturally concerned about whether it can be manipulated. Organizations worldwide are seeking to take advantage of the new opportunities and disruptive power of blockchain — organizations that understand the magnitude of potential security issues. It has been rigorously tested in pilots and at scale by many governments, institutions and companies that have found the technology is incredibly secure.