Venture Development
Systems Engineering
Process Mobility
Insights

Infonomics Treats Data as a Business Asset

Infonomics Treats Data as a Business Asset

When the chief data officer at the Federal Reserve Board, referred to data as an asset at the recent Information Quality Symposium, she sparked a debate that, at first glance, appeared to be purely semantic. "Have you ever tried to use the 'asset' word with an accountant?" asked one attendee. When Casey responded in the affirmative semantics soon cut away to fact. "Assets are on the balance sheet," the attendee said, "It's pretty tough to find companies doing that."

According to Gartner, even companies such as Google and Facebook, whose business models are built on collecting and selling data, don't have a line item for their information assets. Yet over 80% of business executives surveyed by Gartner believe that data is implicit within their balance sheets, nested within other intangible assets. There is a growing concern among regulators that it is not...

Read the full article

Security in the World of Internet of Things

Security in the World of Internet of Things

As we move closer to universal connectivity between mobile devices, appliances, and machines both at home and in the workplace, the threat of damage that may be inflicted due to vulnerabilities in electronics and software becomes more and more troubling. Entire buildings may be rendered seemingly haunted with doors remotely unlocked, thermostats secretly reset; lights flickering; and spam directed to televisions, water coolers and exercise machines.

"This is nothing. This is small social stuff. The big stuff is coming," Andy Thurai, chief architect and group CTO of application security and identity products with Intel Corp., said during the recent Massachusetts Technology Leadership Council's Internet of Things (IoT) conference.

In a world where people and things are always connected to the Internet with the potential to be hacked remotely, the threat of hacking takes on a whole new meaning. Hospital equipment could be maliciously misused to endanger people's lives; a city's traffic controls could cause mayhem in a denial-of-service attack. Hackers controlling the energy grid could hold power hostage from entire neighborhoods for days. A prominent security consultancy, Red Tiger Security, has identified at least "38,000 vulnerabilities in U.S. energy sector alone" said Mr. Thurai...

Read the full article

Connect with us today!

Based on the details of your inquiry, an online consultant may be available to discuss solutions now. All other requests will receive a response within one business day.

Request a consultation!

Subscribe to real-time insights

Get the latest industry trends and insights delivered to your inbox

We will never share your email with anyone, ever.