Remove Analysis Remove Computer and Electronics Remove Insurance Remove Presentation
article thumbnail

The Week in Cyber Security and Data Privacy: 22 – 28 April 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Honor, Huawei, iFlytek, OPPO, Samsung Electronics, Tencent, Vivo and Xiaomi Technology. Data breached: <1 billion people’s data. iSharing is used by more than 35 million users.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Humans have used technology to transform their societies from prehistoric times up to the present. This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. Finally, Part 3 looks to the future, presents next steps, and discusses key takeaways. Introduction.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

To get the most from blockchain in government, a sharing mindset is needed

CGI

When I was at university earning my Masters in Computer Science, I devoted a lot of my coursework to distributed computing. As presented in Section 3, when it comes to operationalizing blockchain technology, solution selection means much more than just which of the ever-growing list of blockchain technologies to choose.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

When we do the weekly supermarket shop online, we should be able to move our shopping list electronically. The stakes are high, not least because the introduction of greater friction in data transfers could present a real barrier to future trade. It is hard to overstate the importance of cross-border data flows to the UK economy.

GDPR 120