article thumbnail

Estonia sues Gemalto for 152M euros over flaws in citizen ID cards issued by the company

Security Affairs

“The vulnerabilities to hacker attacks found in government- issued ID cards supplied by the Franco-Dutch company marked an embarrassing setback for Estonia, which has billed itself as the world’s most digitalised “e-government”.” ” reported the Reuters. At the time, Estonia had issued 1.3 “continues the Reuters.

article thumbnail

Vladimir Putin ‘s computers still run Windows XP, Media reports

Security Affairs

Open Media pointed out that that Windows XP is the last operating system developed by Microsoft that was approved by the Kremlin for use on official Russian government computers. Microsoft Windows 10 is only allowed only for government systems that don’t manage secret information. ” reads the post published by The Guardian.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data science vs. machine learning: What’s the difference?

IBM Big Data Hub

” “Data science” was first used as an independent discipline in 2001. Data science use cases Data science is widely used in industry and government, where it helps drive profits, innovate products and services, improve infrastructure and public systems and more.

article thumbnail

Regulation of AI-Based Applications: The Inevitable New Frontier

AIIM

The scope of the harmful impacts AI algorithms was documented by the AI Now Institute 2019 Report : “ Litigating Algorithms, New Challenges to Government Use of Algorithmic Decision Systems. ” Bill, the California government will be left to its own devices and resources, which are already thinly spread. Conclusion.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

Hello and welcome to the final IT Governance podcast of 2018. The year started with the revelation of Spectre and Meltdown – major security flaws affecting processors manufactured by Intel, ARM and AMD. This week, in our last podcast of the year, we revisit some of the biggest information security stories from the past 12 months.

article thumbnail

How DMARC Can Protect Against Ransomware

eSecurity Planet

Attackers have targeted critical and vulnerable sectors such as manufacturing, financial, transportation, healthcare, government administration, energy, and more, including a couple of $50 million attacks on the likes of Acer and Quanta. IPv6 : v=spf1 ip6 :2001:4860:4860::8888 ip6 :2001:4860:4860::8844 -all. East Coast.

article thumbnail

Achieve competitive advantage in precision medicine with IBM and Amazon Omics

IBM Big Data Hub

We are at an inflection point, where we have witnessed 100,000-fold reduction in cost since the human genome was first sequenced in 2001. Clients enjoy built-in, attribute-based controls to define fine-grained data access policies to enact effective governance, along with comprehensive logging and data provenance to track data accessibility.