Sat.May 12, 2018 - Fri.May 18, 2018

article thumbnail

Why your organisation needs cyber incident response management

IT Governance

With cyber attacks one of the top threats to organisations , it’s crucial to have the right measures in place to protect yourself from an attack. However, cyber threats are also becoming more sophisticated and persistent, and protection isn’t always enough. Organisations should have a plan in place to respond to an attack, enabling them to contain it and ultimately control the costs and exposure.

article thumbnail

White House Eliminates Cybersecurity Position

Schneier on Security

The White House has eliminated the cybersecurity coordinator position. This seems like a spectacularly bad idea.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Clearing the Complication - Making Machine Learning and Artificial Intelligence Accessible and Useful

AIIM

These days it feels almost impossible to have a conversation with anyone involved in the world of Information Management without bringing up machine learning and artificial intelligence. Everyone is talking about it, everyone has an opinion, everyone claims to be doing it — or at least thinking about doing it. AI is part of the popular zeitgeist, entering our lives in the form of autonomous vehicles on our roads, Alexa in our homes, and a burgeoning AI arms race between rival world powers.

article thumbnail

‘Tis the season of purge and replace for records managers

OpenText Information Management

This time last year, when I managed customer support and consulting for an ECM reseller, there was a high level of tension within our school board clients. Close to the end of the school year, records managers start digging through the various physical and digital records stores in preparation for next year. During this time … The post ‘Tis the season of purge and replace for records managers appeared first on OpenText Blogs.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Report: Facebook App Exposed 3 Million More Users' Data

Data Breach Today

Revenge of the Personality Test, Take Two Researchers at the University of Cambridge, via a myPersonality test on Facebook, reportedly used data from 3 million users to power a spin-off company that delivered targeted advertising services. Facebook says the app is one of 200 that it's suspended for suspicious data handling practices.

IT 185

More Trending

article thumbnail

How to solve four common challenges when outsourcing records to the cloud Part 1

TAB OnRecord

In some ways, moving to an outsourced cloud provider is a bit like outsourcing the storage of your physical files – whether to an active records center or to a box storage provider. In both cases, the files themselves now reside within facilities owned and managed by the outsourcing provider. In both cases you are relying on another party to help ensure the privacy and security of your records.

Cloud 99
article thumbnail

Digital Leaders Tackle Information Chaos at its Origins

AIIM

In a recent AIIM Industry Watch survey -- State of Intelligent Information Management: Getting Ahead of the Digital Transformation Curve -- I asked this question -- “ Agree or Disagree : Digitizing and standardizing business inputs is one of the key bottlenecks for Digital Transformation.” The results are clear: Information chaos needs to be tackled at its origins.

article thumbnail

Chili's Speed Question: To Notify or Not to Notify Quickly?

Data Breach Today

Restaurant Chain Reports Breach But Has Yet to Confirm Details Chili's Grill & Bar is warning customers that an unknown number of payment cards were compromised at an unknown number of corporate-owned locations earlier this year for a period of time it suspects lasted two months. Should Chili's have waited to alert customers until it had more information?

IT 170
article thumbnail

NHS warns patients they could lose text alerts as GDPR deluge continues

The Guardian Data Protection

Health service joins UK firms in rushing to comply with new data protection rules The National Health Service is texting patients to warn they could lose alerts about hospital and doctor appointments, joining the deluge of more than 1bn “GDPR” messages currently hitting personal inboxes to meet an EU deadline this week. GDPR, which stands for General Data Protection Regulation , has been described as the biggest overhaul of online privacy since the birth of the internet, and comes into force on

GDPR 96
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Real-life examples of social engineering

IT Governance

Social engineering is something that we’ve all done, whether we’ve realised it or not. When we were children it’s likely that we played one parent off against the other to get our own way, telling each that the other had said we could do something we couldn’t – like have another packet of crisps. Fast-forward a little bit and you’ll remember telling your teachers that your dog really did eat your homework.

IT 81
article thumbnail

Get Ready for 'WannaCry 2.0'

Dark Reading

Another widespread worm attack is "inevitable," but spreading a different more lucrative or destructive payload, experts say.

95
article thumbnail

Health Data Breach Tally: The Latest Additions

Data Breach Today

Largest Incident: Break-In at California State Agency That Affected 582,000 The number of health data breach victims added to the official federal tally so far in 2018 has doubled in recent weeks to more than 2 million. The largest breach of the year so far involved a break-in at a California government office.

article thumbnail

Facebook lets advertisers target users based on sensitive interests

The Guardian Data Protection

Social network categorises users based on inferred interests such as Islam or homosexuality Facebook allows advertisers to target users it thinks are interested in subjects such as homosexuality, Islam or liberalism, despite religion, sexuality and political beliefs explicitly being marked out as sensitive information under new data protection laws.

IT 94
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

NIS Regulations: Government publishes guidance for competent authorities

IT Governance

With the Directive on security of network and information systems (NIS Directive) to be transposed into national laws across the EU by 9 May 2018, the UK government has published guidance for those tasked with its enforcement. The UK government has transposed the NIS Directive into national law, and officially titled it The Network and Information Systems Regulations 2018 (NIS Regulations).

article thumbnail

Cracking 2FA: How It's Done and How to Stay Safe

Dark Reading

Two-factor authentication is a common best security practice but not ironclad. Here's how it can be bypassed, and how you can improve security.

IT 86
article thumbnail

Nuance Communications Breach Affected 45,000 Patients

Data Breach Today

Former Employee Allegedly Accessed Personal Data From Several Nuance Clients Speech recognition software vendor Nuance Communications says an unauthorized third party accessed one of its medical transcription platforms, exposing records for 45,000 people. The company has blamed the breach on a former employee, who accessed personal data from several of Nuance's clients.

article thumbnail

Gillian Triggs joins call for digital rights reforms after brush with data's dark side

The Guardian Data Protection

Digital Rights Watch warns of ‘systematic and wilful degradation of our human rights online’ • Sign up to receive the top stories every morning Gillian Triggs, Australia’s controversial former human rights commissioner has had a personal experience of the dangers of data retention laws. She was caught out, she reveals in a new report on Digital Rights, when she agreed to provide access to 24 hours of her digital life as part of an experiment at the Melbourne Writers Festival in 2017.

Access 87
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Senators Grill Cambridge Analytica Whistleblower Christopher Wylie

WIRED Threat Level

Christopher Wylie testified before the Senate Judiciary Committee Wednesday that Cambridge Analytica specialized in "disinformation, spreading rumors, *kompromat*, and propaganda.".

article thumbnail

What is incident response management and why do you need it?

IT Governance

No one is immune from cyber attacks, data breaches or other catastrophic disasters. The threat looms over all organisations, so they must always be prepared. How well you respond to a security incident can often mean the difference between a minor disruption and going out of business. . Disruptions can occur in any number of ways and affect different parts of your organisation, so planning for disaster requires a great deal of flexibility.

GDPR 75
article thumbnail

White House Axes Top Cybersecurity Job

Data Breach Today

Critics Say Cybersecurity Demands Greater Prominence in Federal Government The Trump administration has eliminated the top cybersecurity coordinator role in the White House. The decision has earned a sharp rebuke from lawmakers and former government officials, who say cybersecurity demands a greater - not lesser - prominence in the federal government.

article thumbnail

Facebook suspends 200 apps as part of investigation into data misuse

The Guardian Data Protection

After Cambridge Analytica fallout, the company is investigating apps that had access to large amounts of data before 2014 Facebook said it had suspended roughly 200 apps as part of its investigation into the potential misuse of personal data on the social network, the latest fallout from the Cambridge Analytica privacy scandal. In an announcement on Monday, the company also said that it had investigated thousands of apps two months after reporting by the Observer and the Guardian revealed that m

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Gruesome Jihadi Content Still Flourishes on Facebook and Google+

WIRED Threat Level

Despite improvements to algorithmic filtering, Facebook and Google+ still host scores of ISIS and related content and accounts that sometimes stay up for months.

article thumbnail

Weekly podcast: myPersonality, train Wi-Fi and Kaspersky Lab

IT Governance

This week, we discuss the exposure of millions of Facebook users’ data, security failings in train passenger networks and Kaspersky Lab’s relocation to Switzerland. Hello and welcome to the IT Governance podcast for Friday, 18 May 2018. Here are this week’s stories. New Scientist magazine reports that data relating to millions of Facebook users who used a personality quiz app was exposed online for four years.

article thumbnail

Uninstall or Disable PGP Tools, Security Researchers Warn

Data Breach Today

Exploitable Vulnerabilities Could Reveal Plaintext of Encrypted Emails European computer security researchers say they have discovered vulnerabilities that relate to two techniques used to encrypt emails: PGP and S/MIME. Security experts recommend all PGP users immediately delete or disable their PGP tools, pending a full fix.

Security 150
article thumbnail

What are all these GDPR emails filling up your inbox?

The Guardian Data Protection

Websites are desperately trying to maintain their links to users before the 24 May deadline, when consumers rather than companies will be in charge of personal data ‘Hey there Field Left Blank. So listen, budski, my man, my main man. I know we’ve been sending you spammy emails about cheap holiday deals five days a week. For the last five years. Yeah, maybe we took a few liberties with that.

GDPR 78
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Georgia Governor Vetoes Broad-Reaching Computer Crime Bill, Highlighting Debate Around Bug Bounty Programs

Data Matters

On May 8, Georgia Governor Nathan Deal announced that he was vetoing Senate Bill 315 (“SB 315” or “the bill”), cybersecurity legislation that would have expanded the criminalization of “unauthorized computer access” to capture, in addition to traditional hacking, activity that opponents warned is necessary to robust private and public sector cyber defense.

article thumbnail

UK will spend £56 million implementing the NIS Regulations

IT Governance

The day has come: the Directive on network and information security systems (NIS Directive) has been transposed into UK law as the NIS Regulations 2018. But the transposition hasn’t only brought a name change. The government has begun ramping up its preparation and research, releasing a report on the potential scope of the NIS Regulations , and by 9 November it will announce which operators of essential services (OES) the law applies to.

article thumbnail

Mexico Investigates Suspected Cyberattacks Against 5 Banks

Data Breach Today

$20 Million in Potential Losses After Real-Time Payment Connections Compromised Mexican officials are investigating a series of technical glitches that may have been a prelude to a large cyberattack affecting at least five banks, according to news reports. While the full scope of the incidents remains unclear, up to $20 million may have been stolen.

140
140