Remove 10
Remove 2017 Remove Computer and Electronics Remove Data Remove Data breaches
article thumbnail

Weekly podcast: NHS upgrade, $242m Equifax loss and prison hacker jailed

IT Governance

This week, we discuss a new deal between the NHS and Microsoft, the financial cost of Equifax’s massive data breach, and a jail sentence for a hacker who altered prison records. Equifax’s huge data breach, which compromised the personal data of 147.9 Fourth of may be with you. Or something like that.

article thumbnail

Strengthening cybersecurity in life sciences with IBM and AWS

IBM Big Data Hub

Cloud computing offers the potential to redefine and personalize customer relationships, transform and optimize operations, improve governance and transparency, and expand business agility and capability. In 2017, 94% of hospitals used electronic clinical data from their EHR.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

Most of that focus has centered on data collection, storage, sharing, and, in particular, third-party transactions in which customer information is harnessed for advertising purposes. Could a party, for instance, decline to produce, review, or even collect certain types of data due to privacy concerns? But what about other contexts?

Privacy 97
article thumbnail

Me on the Equifax Breach

Schneier on Security

Hearing on "Securing Consumers' Credit Data in the Age of Digital Commerce". 1 November 2017. Mister Chairman and Members of the Committee, thank you for the opportunity to testify today concerning the security of credit data. This was not a minor vulnerability; the computer press at the time called it "critical."

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Some technology trends such as real-time data analytics are ongoing, while others are more recent, such as blockchain. This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. Nevertheless, the term ECM is still recognized and widely used, co-existing with CS.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Brian Krebs is an independent investigative reporter known for his coverage of technology, malware , data breaches , and cybercrime developments. ICYMI, Equifax forced to pull offline a huge database of consumer data guarded only by credentials "admin/admin" [link] — briankrebs (@briankrebs) September 13, 2017.