Data Today công khai
[search 0]
Thêm

Download the App!

show episodes
 
Welcome to Data Today with Dan Klein, a podcast from Zühlke. We're living in a world of opportunities. But to fully realise them, we have to reshape the way we innovate. We need to stop siloing data, ring-fencing knowledge, and thinking in traditional value chains. That's what this podcast is about. Every two weeks, we take a look at data outside the box. Join us to learn how inspiring individuals from diverse fields and industries are transforming the way they work with data to realise thei ...
  continue reading
 
Helping you become a more effective information designer. You want to create effective data visualizations. That’s hard work. There are so many decisions to make, like chart type, annotations, and color! Will this podcast help? Host and fellow data viz designer Alli Torban is in the trenches with you. She shares the latest tools and methods that she’s discovered while on the job and interviewing top designers. If you’re an analyst, journalist, or designer who wants to hone your skills with s ...
  continue reading
 
Loading …
show series
 
As data people, we tend to be more logical and analytical, which makes navigating creativity’s ambiguity a little tricky. So I called on Andy J. Pizza to help us out. To me, he is creativity personified — illustrator, author, podcaster, and more! He’s worked with big clients like The New York Times and Nickelodeon, and has a new book coming out whe…
  continue reading
 
When moving and transforming data, how do you make sure it retains its accuracy? That's the question that drives today’s guest, Heather Savory. Heather has 30 years of experience in both the public and private sectors. She currently holds Non-Executive Director roles in the UK Parliament and Ministry of Justice and was previously the Director Gener…
  continue reading
 
Properly archiving cultural history is essential to the spotlighting of marginalised voices from the past. But how do you go about preserving this data for generations to come? LeRonn P Brooks is Associate Curator for Modern and Contemporary Collections at Getty Research Institute, which recently acquired the entire back catelogue of the legendary …
  continue reading
 
Nothing creates more data than international trade. But how do you navigate the complexities that come with transporting goods around the world? Today’s guest is Kevin Daffey, Vice President Governmental Engineering & Marine Automation at Rolls-Royce Business Unit Power Systems. We discuss Kevin’s impressive career, the vast flows of information th…
  continue reading
 
In this episode, I share the framework that helps me decide when to stick with “best practices” or try a new approach in my visualizations. We explore four key variables: the reader's time and patience, the need to capture attention, past struggles conveying a concept, and the designer’s available time and resources. Let’s go! Show notes: https://d…
  continue reading
 
Digital inclusivity is vital in creating a fairer world. But how do you find a way to connect billions of people? Today’s guest is Isabelle Mauro, former Head of Information, Communications & Technology Industries at the World Economic Forum. Isabelle has spent her career in telecommunications building relationships between sectors to help marginal…
  continue reading
 
Are you curious about how data is used in the music industry to help musicians get paid? Look no further than this episode of our podcast. Today’s guest Bryan Calhoun is a veteran in the industry and has made it his mission to advocate for artists and help them receive fair compensation. As the former VP of SoundExchange, Bryan has used data to dis…
  continue reading
 
In this episode, we dive into the world of scientific visuals with Jen Christiansen, Senior Graphics Editor at Scientific American and author of the new book Building Science Graphics. Jen shares when to consider including visuals in your work, the power of “welcoming gestures”, and the effectiveness of comics in explaining complex concepts. We als…
  continue reading
 
Ethical questions around technology and data are nothing new. But should organisations be more transparent with the public? Does the public even want to be educated about data? These are the thought-provoking questions raised by today’s guest Anne Thielen, R&D Manager, Health Technology Solutions at Sonova AG. We learn about Anne's background as a …
  continue reading
 
Data is the lifeblood of the public sector. But how do you make sure you're responsibly using data for the public good? That's been a career-long battle for today's guest Tom Smith, whose full job title is: Director, spatial data unit, chief data officer, Department of Levelling Up, Housing and Communities. We discuss Tom's career, his journey, and…
  continue reading
 
Welcome to Data Today with Dan Klein, a podcast from Zühlke. We're living in a world of opportunities. But to fully realise them, we have to reshape the way we innovate. We need to stop siloing data, ring-fencing knowledge, and thinking in traditional value chains. That's what this podcast is about. Every two weeks, we take a look at data outside t…
  continue reading
 
In this episode, we explore how to practice openness through a fun activity that combines serendipity and structure. London City Hall's Data Visualization and Information Design Lead, Mike Brondbjerg, shares how he creates beautiful pieces of art dictated by the roll of a dice, and how these serendipitous experiments led him to create an incredible…
  continue reading
 
What’s it mean to X-ray a dataviz? This is my new method to make sure I learn from my dataviz inspiration and organize it in a way that helps me use it later. In this episode, I’ll share what it is and how you can X-ray dataviz too. Let’s go! Show notes: https://dataviztoday.com/shownotes/83 Join my newsletter: https://dataviztoday.com/newslettersi…
  continue reading
 
We know that we’re supposed to gather inspiration, but then what? Gabrielle Mérite, a senior data visualization designer at Pentagram, shares what to do with your inspiration to put it to work for you! Join my newsletter! https://dataviztoday.com/newslettersignup Show notes: https://dataviztoday.com/shownotes/82…
  continue reading
 
A ransomware attack knocking out a medical center's imaging and lab equipment is an incident felt by an entire network of healthcare providers. Entities everywhere should plan for outages even when they don't directly experience an attack, say Aftin Ross of the FDA and Penny Chase of MITRE.Bởi DataBreachToday.com
  continue reading
 
Businesses should capitalize on AI, ML and robotic process automation to address every event rather than just ignoring the ones deemed unimportant by a SIEM. Palo Alto Networks founder and CTO Nir Zuk says AI can be used to probe security incidents in real time rather than waiting for a breach.Bởi DataBreachToday.com
  continue reading
 
The latest edition of the ISMG Security Report discusses how investigators saw the collapse of cryptocurrency exchange FTX as "one of the biggest financial frauds in American history," how CISOs can guard against their own liability, and major security and privacy shifts and the outlook for 2023.Bởi DataBreachToday.com
  continue reading
 
Companies have transitioned since COVID-19 began from lifting and shifting their existing apps to the cloud to entirely rebuilding their applications in cloud-native form. Palo Alto President BJ Jenkins says companies need "shift left" security to get protection as they're coding and building apps.Bởi DataBreachToday.com
  continue reading
 
When healthcare organizations come together through mergers or acquisitions, it is critical for the entities to carefully assess the cyber risk each poses, as well as its level of cyber maturity, says Jigar Kadakia, CISO and chief privacy officer at Boston-based Mass General Brigham.Bởi DataBreachToday.com
  continue reading
 
The $250 million acquisition of Cider Security will allow Palo Alto Networks to secure a piece of code from development to its implementation in a runtime environment. CEO Nikesh Arora says the company must understand the tool sets and open-source widgets coming into the customer's supply chain.Bởi DataBreachToday.com
  continue reading
 
Defenders have made strides in disrupting ransomware, but assessing the effectiveness of countermeasures is tough due to a scarcity of information, says cybersecurity veteran Jen Ellis. "We know what the tip of the iceberg looks like, but we don't know what percentage of that iceberg we can see."Bởi DataBreachToday.com
  continue reading
 
The Health Sector Coordinating Council is embarking on a five-year strategic plan to help the healthcare and public health sector address future cybersecurity threats, risks and associated difficulties, says Greg Garcia, executive director for cybersecurity at HSCC.Bởi DataBreachToday.com
  continue reading
 
This week's edition of the ISMG Security Report discusses the mistakes enterprises commonly make when building ransomware defenses, the cybersecurity capabilities being built by the U.S. Department of Energy, and the first female CEO at Securonix - one of only a handful in the vendor community.Bởi DataBreachToday.com
  continue reading
 
The latest edition of the ISMG Security Report discusses why too few organizations admit to being victims of ransomware attacks, how delayed enterprise subscription start dates forced CrowdStrike to cut sales forecasts, and leveraging threat intelligence to protect critical infrastructure.Bởi DataBreachToday.com
  continue reading
 
The shortage of cybersecurity professionals in the United States includes a scarcity of expertise in medical device security, says Bill Aerts, senior fellow and managing director of the University of Minnesota's recently launched Center for Medical Device Cybersecurity.Bởi DataBreachToday.com
  continue reading
 
The latest edition of the ISMG Security Report discusses how the profits of ransomware group Zeppelin have been smashed by security researchers, FTX again highlighting the risks of trading cryptocurrencies, and vendor Extrahop's newly appointed, high-profile president.Bởi DataBreachToday.com
  continue reading
 
Successful account takeovers are one of the most common ways that organizations end up with attackers in their systems. But strong authentication can thwart even the most clever phishing campaigns, says Brett Winterford, regional chief security officer for APJ at Okta.Bởi DataBreachToday.com
  continue reading
 
Why are habits/rituals important to your creative practice and what are some examples? Duncan Geere, Will Chase, and I share what's been most impactful to our dataviz practice! Shownotes / watch video: https://blog.elevatedataviz.com/the-elevate-dataviz-show-6 RJ Andrew's creative rituals infographic: https://infowetrust.com/project/routines…
  continue reading
 
On the heels of the recent FTX financial meltdown came the theft of millions of dollars that left thousands of investors, exchanges and others in the lurch. Hugh Brooks of CertiK shares the status of data that FTX stores, the role of regulations and best cybersecurity practices for crypto exchanges.Bởi DataBreachToday.com
  continue reading
 
On the heels of the recent FTX financial meltdown came the theft of millions of dollars that left thousands of investors, exchanges and others in the lurch. Hugh Brooks, director of security operations at CertiK, shares how the funds may have been stolen and what happens next.Bởi DataBreachToday.com
  continue reading
 
A decade ago, ransomware was one of the internet's petty street crimes, but it has now evolved into a major threat. Tech reporter Renee Dudley, the co-author of a new book titled "The Ransomware Hunting Team," says the FBI lost ground early on in the fight against ransomware.Bởi DataBreachToday.com
  continue reading
 
Despite the strategic priorities laid out by the Biden administration and initial indicators provided by the Department of Defense, it's unclear how the next national defense strategy will prioritize threats and define the primary role of the U.S. military. Chris Dougherty discusses cyberwarfare.Bởi DataBreachToday.com
  continue reading
 
Complexity is the enemy of security, and information technology grows ever more complex. Have we created a problem space in computing so complicated that we will be unable to safely operate in it for its intended purposes? Fred Cohen says that's unlikely. He discusses managing risk in the future.Bởi DataBreachToday.com
  continue reading
 
This edition of the ISMG Security Report discusses how Australian health insurer Medibank is facing stark consequences for not paying a ransom to a group of cyber extortionists, how to limit unnecessary cybersecurity exposure during M&A, and how to manage challenges in hybrid environments.Bởi DataBreachToday.com
  continue reading
 
Aging medical imaging devices are among those most vulnerable to security incidents, often due to misconfigurations and a lack of security controls, says Elisa Costante, vice president of research at security firm Forescout. She discusses how vendors can reduce security risks in connected products.Bởi DataBreachToday.com
  continue reading
 
In this episode of "Cybersecurity Unplugged," Dr. Chris Miller, an associate professor of international history at the Fletcher School at Tufts University, discusses the cybersecurity aspects of the Russia-Ukraine war and how perceptions of the two countries may have been inaccurate.Bởi DataBreachToday.com
  continue reading
 
The latest edition of the ISMG Security Report discusses how Australian health insurer Medibank is deliberating on whether to pay a ransom to extortionists, analyzes the growing number of layoffs in the security vendor space, and shares a tribute to threat intelligence researcher Vitali Kremez.Bởi DataBreachToday.com
  continue reading
 
How do you approach creativity for personal projects vs business intelligence? That's our big creativity question today for Neil Richards. Neil Richards is the author of the new book Questions in Dataviz, Lead Business Intelligence Analyst at JLL, and four-time Tableau Visionary. Show notes: https://dataviztoday.com/shownotes/81…
  continue reading
 
It's no secret: As pharmaceutical companies develop new health treatments, adversaries seek to steal or sabotage their intellectual property. This dynamic adds extra urgency to authentication. Tom Scontras of Yubico talks about how the pharma sector approaches authentication.Bởi DataBreachToday.com
  continue reading
 
Security & ease of use: It is one thing for non-healthcare entities to debate these merits of new authentication in solutions. But in healthcare, where the decisions directly impact patient safety, the stakes are critical. Tom Scontras of Yubico talks about how healthcare approaches authentication.Bởi DataBreachToday.com
  continue reading
 
Many entities fight an uphill battle against increasingly clever phishing and related scams that lead to serious data compromises, say former CIA analyst Eric Cole and former Department of Justice Assistant Attorney General David Kris, who are both advisers at security firm Theon Technology.Bởi DataBreachToday.com
  continue reading
 
Too many medical device makers don't pay close attention to the fine details and features of their product designs to ensure they are safe and secure, says Naomi Schwartz, a former product reviewer at the Food and Drug Administration and current cybersecurity adviser at security firm MedCrypt.Bởi DataBreachToday.com
  continue reading
 
The latest edition of the ISMG Security Report discusses how Russian-speaking ransomware gangs have their eyes on a new target, offers the latest on Australia's data security reckoning and the government’s response, and outlines emerging trends in customer identity and access management.Bởi DataBreachToday.com
  continue reading
 
Cyberattacks on healthcare entities result in poor patient outcomes, including delayed procedures and even a rise in mortality, according to a recent survey conducted by research firm the Ponemon Institute. Ryan Witt of Proofpoint, which sponsored the study, discusses the findings.Bởi DataBreachToday.com
  continue reading
 
A study by data privacy firm Lokker found thousands of healthcare providers deploying Facebook Pixel and other similar tracking tools. Those trackers reveal "medical and other data that consumers don't know is being tracked and haven't authorized," says Ian Cohen, Lokker's chief executive officer.Bởi DataBreachToday.com
  continue reading
 
Plan for a ransomware attack the same way you plan for a hurricane, says Paige Peterson Sconzo, director of healthcare services at security firm Redacted Inc. A cyber incident capable of disrupting network connectivity requires careful thinking about how to revert to the pre-internet era.Bởi DataBreachToday.com
  continue reading
 
Security flaws in a vital signs monitoring device from a China-based manufacturer could allow hackers to launch an attack that spreads to all other devices connected to the same network. This is among the most serious security issues involving medical devices, says Jason Sinchak of Level Nine.Bởi DataBreachToday.com
  continue reading
 
CEO Yotam Segev says Cyera eschews the focus of data loss prevention tools on blocking users from pulling down data and instead embraces an approach that reduces friction. Cyera has sought to safeguard data by making preventative changes in areas like configuration, permissions and security posture.Bởi DataBreachToday.com
  continue reading
 
The latest ISMG Security Report examines whether banks should be held liable for the rapidly increasing Zelle fraud problem, explores the latest M&A activity among IAM vendors, and discusses the implications of the new legal framework for personal data transfers between the U.S. and Europe.Bởi DataBreachToday.com
  continue reading
 
We’re exploring creativity in information design from the perspective of amazingly creative people in the field! Let’s hear how Manuel Canales, the graphics assignment editor at the Washington Post and previously the senior graphics editor at National Geographic, gets the most out of his creativity. How he approaches the pressure of a new project h…
  continue reading
 
Loading …

Hướng dẫn sử dụng nhanh