article thumbnail

The Week in Cyber Security and Data Privacy: 30 October – 5 November 2023

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. When MOVEit was hacked by the Russian Cl0p ransomware gang in May, email addresses and links to government employee surveys were compromised.

article thumbnail

How to prioritize data strategy investments as a CDO

IBM Big Data Hub

My first task as a Chief Data Officer (CDO) is to implement a data strategy. Over the past 15 years, I’ve learned that an effective data strategy enables the enterprise’s business strategy and is critical to elevate the role of a CDO from the backroom to the boardroom. A data-literate culture.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China: new rules on use of algorithms for digital business, data analytics and decision-making

DLA Piper Privacy Matters

The new “Administrative Regulations on Algorithm Recommendation of Internet Business Services” comes into force on 1 March 2022, and will introduce important rules on the use of algorithms when operating digital platforms/websites/apps – including targeted marketing – in China. Authors: Carolyn Bigg , Venus Cheung , Fangfang Song.

article thumbnail

Long-Awaited Online Safety Bill is Introduced by the UK Government to Combat “Harmful” Online Content

Data Matters

Two years after the UK Government first put forward its intention to introduce a new regime to address illegal and harmful content online, the UK Government published the Online Safety Bill (“ Bill ”) on 12 May 2021. Services provided both within and outside of the UK are in-scope where the service has some nexus to the UK (i.e.,

article thumbnail

Building for operational resilience in the age of AI and hybrid cloud

IBM Big Data Hub

For highly regulated industries, these challenges take on an entirely new level of expectation as they navigate evolving regulatory landscape and manage requirements for privacy, resiliency, cybersecurity, data sovereignty and more. This includes cyber incidents, technology failures, natural disasters and more. Similarly, in the U.S.

Cloud 78
article thumbnail

How financial institutions can deliver value from investment in digital operational resilience

IBM Big Data Hub

Knowing what we know about digital investments that deliver transformational value, we suggest that firms focus on increasing their digital operational resilience by accentuating their mastery of foundational capabilities in 4 key domains: D ata O perations R isk management A utomation & AI By reimagining how smart combinations of technology can (..)

article thumbnail

Balikbayan Foxes group spoofs Philippine gov to spread RATs

Security Affairs

Experts uncovered a new threat actor, tracked as Balikbayan Foxes, that is impersonating the Philippine government to spread malware. . Both Remcos and NanoCore are used for information gathering, data exfiltration, surveillance, and control of the victims’ computers. . ” reads the analysis published by the experts. .