article thumbnail

MY TAKE: Why ‘basic research’ is so vital to bringing digital transformation to full fruition

The Last Watchdog

I had a lively discussion about all of this with NTT Research’s Kazuhiro Gomi, president and chief executive officer, and Kei Karasawa, vice president of strategy. Biomedical engineer Dr. Joe Alexander, the former medical director at pharmaceutical giant Pfizer, grabbed a distinguished scientist post, as well.

article thumbnail

New Cybersecurity Directives (NIS2 and CER) Enter into Force

Hunton Privacy

However, the concept of an “essential entity” is much broader and will also capture many organizations that have, to-date, not been subject to the NIS regime—for example, pharmaceutical companies and operators of hydrogen production, storage and transmission. Reporting of incidents.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Digital Signatures 101 – Drivers, Barriers, and User Research

AIIM

Digital signatures are based on Public Key Infrastructure (PKI) standards such that the authenticity and intent of the signer, as well as the integrity of the signed document, can be validated independently of the application that was used to sign it.

Paper 117
article thumbnail

Half of EDR Tools, Organizations Vulnerable to Clop Ransomware: Researchers

eSecurity Planet

Lace Tempest (Storm-0950, overlaps w/ FIN11, TA505) authenticates as the user with the highest privileges to exfiltrate files,” Microsoft notes. The group has targeted pharmaceutical companies and other healthcare institutions during the COVID-19 pandemic. Memorial Day holiday.

article thumbnail

The most valuable AI use cases for business

IBM Big Data Hub

Promote cross- and up-selling Recommendation engines use consumer behavior data and AI algorithms to help discover data trends to be used in the development of more effective up-selling and cross-selling strategies, resulting in more useful add-on recommendations for customers during checkout for online retailers.

article thumbnail

Business of Data – issue 6

Information Matters

They also have a long history of being at the forefront of security methods, from the development of the vault to multi-factor authentication. They also have a long history of being at the forefront of security methods, from the development of the vault to multi-factor authentication.

article thumbnail

A Cyber Insurance Backstop

Schneier on Security

In the first week of January, the pharmaceutical giant Merck quietly settled its years-long lawsuit over whether or not its property and casualty insurers would cover a $700 million claim filed after the devastating NotPetya cyberattack in 2017. But this is easier said than done.