Remove Examples Remove Mining Remove Retail Remove Tips
article thumbnail

#ModernDataMasters: Mike Evans, Chief Technology Officer

Reltio

A passion of mine is imparting the knowledge and experience that the data leaders of today possess to the next generation of data professionals. What are your top 3 tips or resources to share for aspiring modern data masters? What aspects of modern data management do you focus on in your role and how do you help deliver it?

MDM 75
article thumbnail

The Life Cycle of a Breached Database

Krebs on Security

There, denizens with computer rigs that are built primarily for mining virtual currencies can set to work using those systems to crack passwords. But a decent crypto-mining rig can quickly crack a majority of password hashes generated with MD5 (one of the weaker and more commonly-used password hashing algorithms).

Passwords 358
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

For example, in March of 2016, two researchers, Mike Ahmadi and Billy Rios independently reported an astounding fourteen hundred vulnerabilities to CareFusion's Pyxis SupplyStation, an automated, networked, supply cabinet used to store and dispense supplies. When I was working for a retail company I thought it was fantastic.

IT 52
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

For example, in March of 2016, two researchers, Mike Ahmadi and Billy Rios independently reported an astounding fourteen hundred vulnerabilities to CareFusion's Pyxis SupplyStation, an automated, networked, supply cabinet used to store and dispense supplies. When I was working for a retail company I thought it was fantastic.

IT 52
article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

There are literally dozens of other examples. Worse stalkerware is just the tip of the iceberg. For example, the way, mobile phone pings the local cell tower are used by the Transportation Department to report traffic conditions on major roads and highways. So here's the thing, SpyPhone is not an isolated incident.

article thumbnail

#ModernDataMasters: Steve Whiting, Chief Operations Officer

Reltio

Our combined experience of working with other large companies and systems integrators included seeing many examples of failed projects that were not delivering value. What are your top 3 tips or resources to share for aspiring modern data masters? The concepts and implementations are what I would define as modern data management.

MDM 40