Remove de-de
article thumbnail

Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity

Dark Reading

Companies must do a delicate dance between consumer privacy protection, upholding their product's efficacy, and de-risking cyber breaches to run the business.

Privacy 97
article thumbnail

LockBit ransomware gang hit the Commission des services electriques de Montréal (CSEM)

Security Affairs

The LockBit ransomware gang claims to have breached the Commission des services electriques de Montréal (CSEM). This week the gang claimed to have hacked the Commission des services electriques de Montréal (CSEM). The LockBit ransomware group continues to be one of the most active extortion gangs in the threat landscape.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

La gouvernance post-implantation, un facteur clé de succès dans un contexte de progiciel

CGI

Aller de l’avant avec l’utilisation d’une solution d’affaires comme un progiciel de gestion intégré (PGI) ou un progiciel de gestion des relations avec la clientèle est un projet fort différent des projets classiques de développement et d’évolution en technologie.

98
article thumbnail

Ransom House ransomware attack hit Hospital Clinic de Barcelona

Security Affairs

Hospital Clinic de Barcelona, one of the main hospitals in the Spanish city, suffered a cyber attack that crippled its computer system. On Sunday, a ransomware attack hit the Hospital Clinic de Barcelona, one of the main hospitals of the Catalan city.

article thumbnail

Are You Ready For Predictive Analytics?

Speaker: Anita Lauper Wood, Product Strategist

How to de-risk predictive analytics such as how to avoid a lawsuit that might come out of bias in data and algorithms. Join Anita Lauper Wood, Product Strategist, for a valuable session for product and technology leaders who want to learn: Case studies showing value derived from predictive analytics.

article thumbnail

Stratégie de gestion du changement, deuxième partie : établir les stratégies

CGI

La joie ou la douleur ressentie selon les quatre différents cas de changement sont relatives à la gravité de la situation. On le conçoit bien, perdre son emploi est différent de perdre sa carte de crédit. En fait, nous avons la prétention de faire évoluer les attitudes du bas de.

97
article thumbnail

Can Patient Data Be Truly 'De-Identified' for Research?

Data Breach Today

Lawsuit Against University of Chicago, Google, Raises Important Privacy Issues A lawsuit against the University of Chicago Medical Center and Google seeking class action status points to the important privacy and security issues raised when sharing patient data for research purposes - and whether data can be truly "de-identified."

Privacy 174