Ransomware Attack on Vendor Affects 600,000

Data Breach Today

New Insurance Product Adds Coverage for Cryptomining Malware Losses

Dark Reading

Product also covers all forms of illicit use of business services, including toll fraud and unauthorized use of cloud services

Port of San Diego hit by a cyber attack a few days after the attack on the Port of Barcelona

Security Affairs

“Additionally, we have reported this disruption to the California Office of Emergency Services (Cal OES) and the County of San Diego Office of Emergency Services.

Weekly podcast: banks, Thomas Cook, London cyber court and Facebook

IT Governance

The authorities’ initiative is, presumably, driven by the recent implementation of the EU’s Directive on security of network and information systems (NIS Directive), which sets out obligations for operators of essential services – in other words, the critical national infrastructure.

US banks Q3 results shine light on financial services innovation

Document Imaging Report

For example, ChatBot technology is becoming particularly popular in banking for customer service, by cutting down handling times and accelerating payments processing, enabling better customer interaction by eliminating errors and increasing efficiency.

10 things you must do to become cyber secure

IT Governance

System monitoring enables organisations to detect criminals’ attempts to attack systems and business services. Preparing your organisation for cyber attacks and data breaches is complicated, and you should look for advice wherever you can get it.

Risk 106

ABBYY’s New FlexiCapture Platform Is Faster, More Powerful, and Runs Native in the Cloud

Document Imaging Report

27, 2018 – ABBYY, a global provider of content intelligence solutions and services, today announced the launch of ABBYY FlexiCapture 12 Release 2. FlexiCapture transforms documents into business value by capturing and validating information in any format at its point of need.

INDIA: Data Localization – is it disruptive?

DLA Piper Privacy Matters

This order makes it mandatory for all system providers (as well as their service providers/intermediaries/ third party vendors and other entities) to ensure that all data relating to payment systems operated by the provider are stored in a system only in India. If a system provider’s entire payment processing cycle, including that of its service providers, intermediaries, etc.

Yahoo! Agrees to Settle Data Breach Class Actions with $50 Million Fund and Credit Monitoring

Hunton Privacy

s previously operating business became Oath Holdings Inc. has agreed to enhance its business practices to improve the security of its users’ personal information stored on its databases. will also pay for a minimum of two years of credit monitoring services to protect settlement class members from future harm, as well as establish a $50 million settlement fund to provide an alternative cash payment for those who verify they already have credit monitoring or identity protection.

Sales 46

FCA Publishes Wholesale Banks and Asset Management Cyber Multi-Firm Review Findings

Data Matters

Key points highlighted by the FCA’s Report on methods for organisation-wide cyber risk management are: Understanding and managing the cyber risks your firm faces – whilst the FCA acknowledges a growing public and regulatory focus on cybersecurity across the financial services industry, the FCA concludes that most senior management functions continue to have limited familiarity with the specific risks that their own firms face.

Risk 65

Google Unveils App Streaming: Is This The Platform That Unifies Apps And The Web?

John Battelle's Searchblog

For years I’ve been predicting that mobile apps were a fad – there’s no way we’d settle for such a crappy, de-linked, “ chiclet-ized ” approach to information and services management. I mean, a service, a platform service, that any business could build upon?

ALL Data as a Service (DaaS/BDaaS) - EAs in a New Role, as DaaS Enablers

Interactive Information Management

That's where we're headed, inexorably - you'd like to know what's going on with your systems, what your customers or constituents need, or perhaps the latest metrics concerning device utilization trends during business events. The consumer assigns and realizes value from the service.

KMIP: The Cure for the Common Key Management Headache

Thales eSecurity

KMIP provides a standard means of communications between encryption systems and key management services. In addition, the DSM is starting to support a number of new business services as well.

Utilities Digital Journey Insights (Part 4): Utilities’ pursuit of new business models accelerates

CGI

Utilities Digital Journey Insights (Part 4): Utilities’ pursuit of new business models accelerates. Some utilities even provide vehicle-to-grid services and home energy management systems to help consumers manage their electricity usage.

Digital leaders: Driving pace and scale in a dynamic market, part 5 (technology)

CGI

One of the biggest challenges to becoming a digital business is transitioning from legacy processes and systems to new ways of adopting and managing modern technologies. In our blog series on digital leaders, we’ve been exploring the various areas impacted by digitalization, including the market environment, organizational structures, innovation and business models, and what digital leaders are doing in response. 67% of organizations are applying analytics to optimize the business.

Dutch DPA Publishes Post-GDPR Complaints Report

Hunton Privacy

According to the Report, most complaints were filed against business service providers ( i.e. , 41 % of the complaints), companies in the IT sector (12%), the government (10%), financial institutions (9%) and companies in the health care sector (9%).

GDPR 56

Draft E-Commerce Standards Published for Comment in China

Hunton Privacy

On March 22, 2016, the Ministry of Commerce of the People’s Republic of China published drafts of its proposed (1) Specifications for Business Services in Mobile E-commerce (“Mobile E-commerce Specifications”) and (2) Specifications for Business Services in Cross-border E-commerce (“Cross-border E-commerce Specifications”). Platform service providers also would be responsible for the management of the platform’s data security.

SER’s growth double that of ECM market competition

Document Imaging Report

One reason for the very positive development is SER’s licensing business, which increased by 25% compared to the previous year. Well over half of the customers have had a successful business relationship with the SER Group for 10 or more years now. Leader in development and service. Coinciding with the growth in licensing business, service business has also jumped by over 11%. The Gartner Magic Quadrant for Content Services Platforms 2017: Karen A.

ECM 40

Vera to Power Canon Solutions America’s New Security Solutions and Services Strategy

Document Imaging Report

– Canon Solutions America’s Enterprise Services and Solutions group will leverage Vera’s advanced data protection and rights management platform for secure data capture, detailed auditing, and data privacy. with over 78,000 customers, announced it has selected Vera to provide technology designed to help protect Canon customers’ intellectual property and critical business information.

KnowledgeLake Launches Cloud Capture Service

Document Imaging Report

The capture service has the same features and functions as our on premises software, it’s just running in an Azure data center that we manage. As you’d expect, the KnowledgeLake Cloud capture service enables a connection to Microsoft repositories SharePoint, SharePoint Online, and OneDrive for Business. The KLake cloud capture service can also release into file shares. The same instance of the service can be easily configured to release into multiple destinations. “As

Cloud 40

California Consumer Privacy Act: The Challenge Ahead — Key Terms in the CCPA

HL Chronicle of Data Protection

The CCPA applies to businesses, service providers, and other third parties. Business. The CCPA does not cover every business. The second threshold for a “business” is ambiguous. Service Provider. Businesses must also make no attempts to reidentify the data.

Sales 52

Don’t blame ‘The Things’

CGI

The Dedicated Denial of Service (DDoS) attack on a number of popular websites that made the news recently was attributed to hackers utilising the vulnerabilities of home automation products such as sensors, TVs and webcams. Don’t blame ‘The Things’. p.butler@cgi.com. Mon, 11/14/2016 - 04:00.

China issues Personal Information Security Specification

Data Protection Report

Such requirements give rise to significant compliance issues for business operations in China. The minimization principle requires that the type of personal information to be collected should be directly related to carrying out a relevant business activity or service; and the frequency and amount of personal information should be limited to the minimum standard necessary for performing the business activity or service.

Datacenter Colocation in Northern Virginia for Small, Medium Businesses - Business Requirements and Reasons for Local IT Outsourcing

Interactive Information Management

Colocation of business IT assets (servers, storage, networking) at Washington DC regional and local Datacenters in the Northern Virginia area is big business – and entirely appropriate to consider for small to mid-sized businesses of all shapes and sizes. Your Business Depends on IT You’re a small to medium-sized business in Northern Virginia, the Washington DC metro region – maybe even a larger, regional business, nonprofit or government entity.

Open APIs: A coming of age

CGI

Regulations, such as Europe’s revised Payment Services Directive (PSD2) and others, is driving the move toward open APIs in financial services, and this blog explores some of the key technical issues discussed at Sibos. This can be done by building end-to-end security into applications, adopting a federated identity model, and connecting business services with the payment function, thereby bypassing manual interventions, log-ins, passwords, etc.

Ten Years After: RIM Standards Evolve Slowly

Positively RIM

At the millennium, records management was a disciplined service. It requires records management to continually contribute to the improvement of business processes. While still a business service, today’s records leaders carry consultative and strategic responsibilities as well. Ten years ago, the tech world was still exhaling in relief and self-congratulations on dodging the Y2K bullet.

Hunton & Williams and Acxiom to Facilitate Response to UK Government’s Call for Evidence on Current Data Protection Legislation

Hunton Privacy

I believe we have everything to gain from a sensible, proportionate and rights-based data protection framework, and one that works for you as businesses, service-providers and citizens,” said Minister of State for Justice, Lord McNally. The UK Ministry of Justice has issued a Call for Evidence on the effectiveness of current data protection legislation in the UK. Responses must be submitted by October 6, 2010. “It

This is the old ChiefTech blog.: Enterprise Scenarios for Integrating Social Network

ChiefTech

Social "Marketplaces" that do not represent the entire business but have touch points back into the enterprise - they will never be entirely representative and only the people who get real value from them will gravitate to them (and make the effort to use them). The seamless integration pulls critical Facebook profile information into your Salesforce Account, Lead, and Contact records in real time, providing you with an instant 360º view of customers, prospects, and business associates."

TWI and Lloyds Register investigate 3D printing standardization in joint research projects

3ders

International welding institute TWI and global engineering, technical, and business services organization Lloyd’s Register have teamed up to launch two new research projects geared towards exploring standards and regulatory compliances for additive manufacturing technologies.