Referencias | References


Referencias completas de vocabulario, eventos, crónicas, evidencias y otros contenidos utilizados en los proyectos relacionados con biotecnología y neurociencia de la KW Foundation.

Full references of vocabulary, events, chronicles, evidences and other contents used in KW Projects related to biotechnology and neuroscience.

Navegue por el glosario usando este índice.

Especial | A | B | C | D | E | F | G | H | I | J | K | L | M | N | Ñ | O | P | Q | R | S | T | U | V | W | X | Y | Z | TODAS

Página: (Anterior)   1  2  3  4  5  6  7  8  9  10  ...  103  (Siguiente)
  TODAS

A

Logo KW

Addressing security with the board [853]

de System Administrator - jueves, 11 de septiembre de 2014, 13:46
 

Addressing security with the board: Tips for both sides of the table

Clearly security is a boardroom topic, but the trick is to get both sides on the same page

By Steve Ragan

In the boardroom, when it comes to addressing the topic of security, there's tension on both sides of the table.

It doesn't happen all the time, but when it does, the cause of the friction is usually security executives and board members – each with vastly different areas of expertise and interest – pushing to get what they want out of the discussion while keeping business goals intact.

Stephen Boyer, the co-founder and CTO of BitSight Technologies, a company that uses public data to rate the security performance of an organization, shared some thoughts with CSO recently, geared towards moving the discussions forward past the deadlock.

Since there are two sides to the issue, Boyer shared two sets of tips; one set for the board and the other set for the executives speaking to them.

As a board member

Frame expectations clearly

Communication goes both ways. It's essential to make sure the security team understands what information is required, how discussions should be framed, and the level of abstraction you require to make decisions. Otherwise, you risk sitting through conversations that fail to address the issues the business cares about most.

"In no way should every board member have to act as a security expert. But, in today’s world, cyber risks are a major part of managing risk in a business. Therefore board members need to make it known what they see as critical and how to begin those conversations," Boyer explained.

Are you talking about security or risk?

Performance is important, but instead of focusing on specific technologies, policies and procedures, evaluate what the business is doing to proactively mitigate cyber risks and what those risk levels are.

For example, are there risks in the supply chain that your organization could be ignoring? With each strategic decision made, are the organization's risks increasing or decreasing?

"Understanding the security performance of a company is important, but managing the risks associated with security is crucial. As in other business areas, boards need to be aware of the sources of risk and communicate clearly what is acceptable for the business. From there, it’s not up to the board to dictate what technologies and policies should be in place, but to guide their teams when it’s necessary to take action to reduce or transfer security risks," Boyer said.

Decide on the key indicators you want to monitor and be consistent

You don't need to be in the trenches to understand security posture if you choose the right data points to assess. Work with your team to choose meaningful, data-driven metrics that demonstrate both performance and effectiveness.  It matters less how frequently you are attacked if your team is effectively re-mediating threats before they become an issue.

"One of the issues we can’t stress enough is that to arrive at insight and action ability, it’s important that all parties agree on a set of metrics that are objective and consistent.  The goal is to paint a clear picture of security performance over time, and to gain context about where your company sits relative to peers and competitors within your industry," Boyer added.

Focus on a fixed set of key indicators, and benchmark performance over time to gain valuable insight into the issues affecting your posture and effectiveness. Moreover, correlate performance changes with key events to gain an understanding about the impact of technology investments, headcount and policy decisions.

In short, shift the conversation from a numbers game to a performance review, as you would in other areas of the business.

As a security executive

Always provide context.

Historical trend data and peer comparisons are key points for helping leaders "get it" when the spotlight is turned on security performance.

Being able to show how your organization compares to others in your industry, provides context that is often lacking from discussions about cyber security. Your board members bring expertise from their personal experience - tying performance metrics back to companies they've managed or advised can help. 

Demonstrating that your company is more or less secure than others in your sector can help leaders justify strategic changes and investments that can improve your team's effectiveness.

"Context is key when it comes to security performance. If board members hear that overall security is going well, it gives them little information to bring cyber security into strategic decisions. A key way to add context to these discussions is through industry and peer benchmarking. If a security professional can tell the board, 'Here is where we are in relation to our industry and this is what I need for us to improve.' That is a strong and actionable statement," Boyer said.

Tell a story & teach a lesson.

Use this time to train your board members and fellow executives to be alert. Tell them what specific threats are targeting your company, what the attacks look like and what they can do to help avoid a breach.

If a peer has been breached and you fear you might also be a target, explain what conditions existed to allow the attack to happen and what you're doing to make the company more secure. By focusing on specific threats that your company is facing, instead of wants regarding issues you've already handled or the technical specifications of an attack, you can help prevent attacks from spreading.

"While conversations should stay high level when it comes to security, boards should be informed of major threats facing their company. In our recent analysis of the Education sector, we found that the Flashback virus was widespread on college networks," Boyer said.

"For a university security practitioner, this is crucial information to convey to the school’s board and more importantly, to answer the fundamental question: 'What does this threat mean for our business?'"

Answer the questions being asked.

Your metrics should paint a picture that people outside the security team can understand. Reduce the amount of technical jargon and stat charts on your slides and focus on measuring what matters to your audience. The end result should communicate whether you are more or less secure, and why.

"A lot of times we hear from companies that talking with security teams can be intimidating because not everyone in the room is a technological expert, or at the same level of awareness as the pros.  The way to face this challenge is to avoid walking into the room with an eye-chart packed presentation, but to instead focus on only showing the metrics that answer the questions your board is asking.  This ties back to knowing your audience and making sure you speak in a common language," Boyer said.

Link: http://www.csoonline.com

Logo KW

Adicciones [534]

de System Administrator - sábado, 12 de julio de 2014, 17:54
 

Conocer las adicciones

Fuente: http://hipercognicion.blogspot.com/2009/05/vicios.html

Llamemos adicciones a aquellas prácticas que producen un placer inmediato, que suelen conllevar consecuencias negativas mediatas y que suele resultar extremadamente difícil abandonar. Algunas adicciones son bien conocidas, otras no tanto. Casi todo el mundo identifica con facilidad las adicciones de fumar, consumir drogas o alcohol. Menos son los que reconocen como adicciones la comida descontrolada, el sexo desenfrenado, las compras compulsivas o la limpieza maniática. Cualquiera de estas actividades por sí misma no se considera patológica, sin embargo, todas se pueden tornar descontroladas si la estabilidad emocional del sujeto atraviesa dificultades. La prueba para evaluar si una de estas actividades se ha descontrolado consiste en intentar su abandono de forma temporal. Si el individuo resiste la prueba, lo más probable es que no se trate de una conducta descontrolada, sino de un hábito más o menos saludable. Pero si es incapaz de aguardar varios días sin practicar la actividad, seguramente se haya vuelto patológica. Una vez identificada la adicción, probablemente queramos desprendernos de ella cuanto antes, pero seamos incapaces. Cualquier intento de eliminar estas actividades de nuestras vidas fracasará si las contemplamos de forma aislada sin considerar el resto de circunstancias de nuestra vida. Dicho de otro modo, no nos libraremos de estas actividades a menos que modifiquemos el resto de nuestra vida. Las adicciones proporcionan un placer inmediato que es requerido fundamentalmente cuando nuestras vidas no nos resultan placenteras. Por tanto, la intervención deberá incidir en hacer que nuestras vidas sean más placenteras antes de retirar una conducta que nos proporciona ese placer inmediato. Es habitual que una persona deje de fumar, de beber o de comer compulsivamente cuando emprende una nueva etapa en su vida, como iniciarse en algún deporte, emprender estudios, una nueva relación, etc. Desde Hipercognición abogamos por la vida plena como remedio natural y espontáneo contra las conductas adictivas.

Logo KW

ADN [60]

de System Administrator - miércoles, 27 de agosto de 2014, 21:13
 

 

El ácido desoxirribonucleico, frecuentemente abreviado como ADN, es un ácido nucleico que contiene instrucciones genéticas usadas en el desarrollo y funcionamiento de todos los organismos vivos conocidos y algunos virus. Es responsable de la transmisión hereditaria. El papel principal de la molécula de ADN es el almacenamiento a largo plazo de información.

Fuente: http://es.wikipedia.org/wiki/ADN

Logo KW

ADVANCED PERSISTENT THREATS [797]

de System Administrator - jueves, 25 de junio de 2015, 22:59
 

3 BIG DATA SECURITY ANALYTICS TECHNIQUES YOU CAN APPLY NOW TO CATCH ADVANCED PERSISTENT THREATS

By Randy Franklin Smith and Brook Watson
Commissioned by HP

In this unprecedented period of advanced persistent threats (APTs), organizations must take advantage of new technologies to protect themselves. Detecting APTs is complex because unlike intensive, overt attacks, APTs tend to follow a “low and slow” attack profile that is very difficult to distinguish from normal, legitimate activity—truly a matter of looking for the proverbial needle in a haystack. The volume of data that must be analyzed is overwhelming. One technology that holds promise for detecting these nearly invisible APTs is Big Data Security Analytics (BDSA).

In this technical paper, I will demonstrate three ways that the BDSA capabilities of HP ArcSight can help to fight APTs:

  • 1. Detecting account abuse by insiders and APTs
  • 2. Pinpointing data exfiltration by APTs
  • 3. Alerting you of new program execution

Please read the attached whitepapers.

Logo KW

Afecto en la socialización [521]

de System Administrator - sábado, 12 de julio de 2014, 17:10
 

El afecto en la socialización

Fuente: http://hipercognicion.blogspot.com/2011/07/el-afecto-en-la-socializacion.html

Las sociedades se construyen con cada nuevo miembro que nace en ellas. Ellos son los cimientos que soportarán en un futuro el destino de la sociedad, y es por ello que debemos esmerarnos en que tengan la mejor calidad humana para acometer esa tarea. El afecto es la energía que hace que se mueva toda la maquinaria social y tiene su origen en la especial relación entre madre e hijo durante los primeros meses de vida y, en menor medida, entre padre e hijo. Será durante esa etapa cuando aprenda lo que es el afecto, qué valor tiene y por qué tiene que ganárselo. Los hijos separados de sus madres durante los primeros años de vida son más vulnerables ante todo tipo de enfermedades y será fácil que desarrollen psicopatía, un trastorno que hacen que el individuo viva al margen de la sociedad y que la considere como hostil. El afecto es el lenguaje universal que hablan los hombres y mujeres dentro de la humanidad, a través de él construyen las instituciones, las funciones y las estructuras sociales. El sentido de la vida está orientado a lograr afecto en sus múltiples manifestaciones, como amor, como reconocimiento, como admiración, etc. Además el afecto retorna hacia quien lo entrega. Los nuevos miembros de la sociedad buscarán el afecto de sus padres en la sociedad. La sociedad le ofrecerá recompensas en las que verán ese afecto. Serán generalizaciones del afecto paternal.

Logo KW

Agencias de Calificación de Riesgos [195]

de System Administrator - miércoles, 8 de enero de 2014, 18:28
 

 Riesgo

Las agencias de calificación de riesgos son empresas que, por cuenta de un cliente, califican determinados productos financieros o activos de empresas, Estados o Gobiernos. Sus notas o calificaciones valoran el riesgo de impago y el deterioro de la solvencia del emisor. Para los inversores, aumentan el abanico de opciones y proporcionan medidas fáciles de usar. En general esto incrementa la eficiencia del mercado, al reducir los costes tanto para el que presta como para el que toma prestado. Este mecanismo puede afectar la disponibilidad de capital de riesgo, fundamental para emprendedores y startups. La calificación marca el tipo de interés al que se concederá la financiación.

Fuente: http://es.wikipedia.org/wiki/Agencia_de_calificación_de_riesgos

Logo KW

AGESIC [202]

de System Administrator - sábado, 12 de julio de 2014, 17:57
 

AGESIC

AGESIC es la Agencia de Gobierno Electrónico y Sociedad de la Información de Uruguay, unidad ejecutora dependiente de la Presidencia de la República. Posee autonomía técnica. Su finalidad es impulsar la Sociedad de la Información, promoviendo la inclusión y equidad en el uso de las TIC (Agenda Digital Uruguay) y liderar la estrategia de Gobierno Electrónico y su implementación en el país, como base de un Estado eficiente y centrado en el ciudadano.

Sitio web: http://agesic.gub.uy/

Logo KW

Agile Operations [1401]

de System Administrator - martes, 8 de septiembre de 2015, 21:30
 

eGuide: Agile Operations

In the application economy, constant application updates are table stakes. To gain a competitive advantage, you must deliver the very best user experience by ensuring those improvements are based on real user feedback and application and infrastructure performance - from mobile to mainframe, on-premise or in the cloud. End-to-end monitoring solutions from CA can give your enterprise the holistic monitoring and in-depth management capabilities it needs to turn this feedback into valuable functions and reduce mean-time-to-recover.

Read this eGuide to learn how you can enhance user experience by leveraging real-time insights from your entire application and infrastructure to drive improvements.

Please read the attached eGuide.

Logo KW

Airbus Swears Its Pod/Car/Drone Is a Serious Idea Definitely [1734]

de System Administrator - viernes, 24 de marzo de 2017, 21:51
 

Credit: ITALDESIGN

Airbus jura que su Pod/Car/Drone es una idea seria y definitiva

Airbus Swears Its Pod/Car/Drone Is a Serious Idea Definitely

by JACK STEWART 

AIR TRAVEL NEVER involves air travel alone. City to city transport usually goes something like car or cab to train to shuttle to the terminal where you catch a plane, only to reverse the process at the other end, often with a little running somewhere along the line for good measure. Airbus came up with a crazy idea to change all of that with Pop.Up, a conceptual two-passenger pod that clips to a set of wheels, hangs under a quadcopter, links with others to create a train, and even zips through a hyperloop tube.

This crazy concept blurs the once-firm lines between planes, trains, and automobiles to let people take to the skies when traffic backs up. In other words, it’s a flying car. A really cool flying car, cooked up with help from Italdesign and unveiled at the Geneva Motor Show, but still, a flying car. Farfetched, yes, but Airbus says it is taking the idea seriously. “Adding the third dimension to seamless multi-modal transportation networks will, without a doubt, improve the way we live, and how we get from A to B,” said Mathias Thomsen, general manager for urban air mobility at Airbus.

Around town, the carbon fiber pod couples with an electric ground module and rolls along on a rather conventional four wheels. It’s autonomous, of course, because everything is in the future. Don’t want to creep along in gridlocked traffic? Simply summon an eight-rotor air module that resembles a supersized consumer drone. Clip in, take off, and enjoy a range that, should this technology ever actually work, will max out at about 60 miles. Whatever mode to choose, the Pop.Up parks itself at a recharging station upon arrival.

It all sounds crazy, but some big names see it happening. Dubai, the most superlative of emirates, plans to put people-carrying drones in service later this year. Last year, Uber said it could launch a flying car service within a decade. Such things will help wealthy (and brave) commuters skip over traffic, but don’t solve the last mile problem unless your destination boasts a rooftop landing pad. That’s where the Pop.Up idea enjoys an edge. It eliminates a key point of friction in multi-modal transportation: changing from one mode to the next. You just chill out in your pod.

Wanna hear the really crazy part? This scheme isn’t as far-fetched as you might think.

“This is getting to be less of a technology challenge,” says Pat Anderson, who is developing similar vehicle concepts at Embry Riddle Aeronautical University. He believes autonomous software and electric propulsion will subject the aviation industry to radical changes. Say goodbye to wings on tubes, at least for short distances: batteries and rotors will win the day. That doesn’t mean there aren’t hurdles, not the least of which are federal regulations.

“We designed these regulations in the 50s and 60s, and they go largely unchanged, due to inertia,” Anderson says. The General Aviation Manufacturers Association is pushing hard to move certification of novel planes away from the current fixed federal standards, and into a less prescriptive model. That will mean new ideas can be approved more quickly, similar to the way that safety devices in cars are. The FAA has already gotten on board with the changes, for small aircraft, but designing and applying rules for an entirely new class of aircraft will take years.

As humans pack into increasingly dense global mega-cities, they’ll need new ideas for transport to avoid gridlock. But Airbus and Italdesign haven’t committed to any sort of timeframe for this one, so (unless you live in Dubai) gazing up longingly through your car’s sunroof is as close to zooming through the sacré bleu sky as you’re likely to get, for now.

Link: https://www.wired.com

Logo KW

Alan Parsons [278]

de System Administrator - lunes, 13 de enero de 2014, 20:04
 

 AP

Alan Parsons (Londres, 20 de diciembre de 1948) es ingeniero de sonido, productor, compositor, multi instrumentista e intérprete inglés.

Fuente: http://es.wikipedia.org/wiki/Alan_Parsons


Página: (Anterior)   1  2  3  4  5  6  7  8  9  10  ...  103  (Siguiente)
  TODAS