Remove Consumer Services Remove Data Remove IT Remove Manufacturing
article thumbnail

Data monetization: driving the new competitive edge in retail

CGI

Data monetization: driving the new competitive edge in retail. Retailers are fully aware that their future relies largely on their ability to use data efficiently. However, in today’s dynamic and highly competitive retail sector, retailers need to accelerate their plans and commit resolutely to the path of data monetization.

Retail 96
article thumbnail

What’s in a name? CGI’s guide to the language of the Internet of Things (IoT).

CGI

Prior to the use of the IoT label solutions involving connected things or devices were referred to as Machine to Machine (M2M), SCADA (Supervisory Control and Data Acquisition) or Telemetry. Many of you will be familiar with the term IoT – well it’s hard to miss if you scan the press, social media and business pages.

IoT 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 29 January – 4 February 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Publicly disclosed data breaches and cyber attacks: in the spotlight Eye4Fraud database allegedly leaked – 14.9 Data breached: 14,900,000 lines. million unique records, with 9.4

article thumbnail

Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity

Troy Hunt

More than a decade ago now, I wrote about how Our Password Hashing Has no Clothes and in that post, showed the massive rate at which consumer-grade hardware can calculate these hashes and consequently "crack" the password. However, what if you could manufacture a hash collision? It's insecure and deprecated.

Passwords 123