article thumbnail

The Week in Cyber Security and Data Privacy: 30 October – 5 November 2023

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. When MOVEit was hacked by the Russian Cl0p ransomware gang in May, email addresses and links to government employee surveys were compromised.

article thumbnail

How to prioritize data strategy investments as a CDO

IBM Big Data Hub

My first task as a Chief Data Officer (CDO) is to implement a data strategy. Over the past 15 years, I’ve learned that an effective data strategy enables the enterprise’s business strategy and is critical to elevate the role of a CDO from the backroom to the boardroom. A data-literate culture.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

China: new rules on use of algorithms for digital business, data analytics and decision-making

DLA Piper Privacy Matters

The new “Administrative Regulations on Algorithm Recommendation of Internet Business Services” comes into force on 1 March 2022, and will introduce important rules on the use of algorithms when operating digital platforms/websites/apps – including targeted marketing – in China. Authors: Carolyn Bigg , Venus Cheung , Fangfang Song.

article thumbnail

Building for operational resilience in the age of AI and hybrid cloud

IBM Big Data Hub

For highly regulated industries, these challenges take on an entirely new level of expectation as they navigate evolving regulatory landscape and manage requirements for privacy, resiliency, cybersecurity, data sovereignty and more. This includes cyber incidents, technology failures, natural disasters and more. Similarly, in the U.S.

Cloud 74
article thumbnail

Balikbayan Foxes group spoofs Philippine gov to spread RATs

Security Affairs

Experts uncovered a new threat actor, tracked as Balikbayan Foxes, that is impersonating the Philippine government to spread malware. . Both Remcos and NanoCore are used for information gathering, data exfiltration, surveillance, and control of the victims’ computers. . ” reads the analysis published by the experts. .

article thumbnail

How financial institutions can deliver value from investment in digital operational resilience

IBM Big Data Hub

Knowing what we know about digital investments that deliver transformational value, we suggest that firms focus on increasing their digital operational resilience by accentuating their mastery of foundational capabilities in 4 key domains: D ata O perations R isk management A utomation & AI By reimagining how smart combinations of technology can (..)

article thumbnail

Improve your data relationships with third parties

Collibra

Seizing an opportunity to improve data relationships with third parties. Regulators are focusing on the data relationships financial services organizations have with third parties, including how well personal information is being managed. Exploring third party data relationship risk.