Wed.May 23, 2018

article thumbnail

Last-minute frenzy of GDPR emails unleashes 'torrent' of spam – and memes

The Guardian Data Protection

Inboxes around the world are clogging up as deadline for companies to comply with new regulations nears A last-minute flurry of emails from companies trying to retain customers ahead of the deadline for Europe’s new General Data Protection Regulation (GDPR) has prompted a slew of complaints - and memes - on social media. Friday is the last day for companies to comply with GDPR regulations and as a result, inboxes around the world are clogging up with emails warnings that “the privacy policy has

GDPR 100
article thumbnail

‘Significant’ FBI Error Reignites Data Encryption Debate

WIRED Threat Level

FBI stats about inaccessible cellphones were inflated, undermining already controversial bureau claims about the threat of encryption.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

John Grimm, Senior Director of IoT Security Strategy, speaks to the CyberWire Podcast

Thales Cloud Protection & Licensing

John Grimm, Thales eSecurity’s Senior Director of IoT Security Strategy, recently spoke with CyberWire’s Dave Bittner about key findings and trends from Thales eSecurity’s 2018 Global Encryption Trends Study. The CyberWire is a free, community-driven cybersecurity news service based in Baltimore. A sampling of John’s comments: The lynchpin of any good encryption system is how well you protect the key.

IoT 59
article thumbnail

Malware Attacks: A Tale of Two Healthcare Incidents

Data Breach Today

Time for Detection, Mitigation Can Vary Widely Depending on Circumstances Two recently disclosed malware attacks in the healthcare sector illustrate that detection and mitigation of such attacks can be rapid, or it can take many months.

IT 145
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

RPA - Is it the Answer to Our Dreams of Easier Business Automation?

AIIM

I’ve been involved in some way or another in the world of business process automation (BPM) for over twenty years. I was the author of AIIM’s first BPM training course back in 2006. I’m a big fan of the idea of reengineering business processes, but there is no getting away from the fact that BPM projects are complex and scary – they require buy-in from the top (which is always difficult) and are seldom inexpensive undertakings.

More Trending

article thumbnail

UK calls for special EU deal on data-sharing laws after Brexit

The Guardian Data Protection

British negotiators warn of security dangers as they call for preferential treatment UK negotiators in Brussels have warned of significant economic and security dangers for Europe should the EU not grant a special deal on data-sharing laws after Brexit. In an appeal for immediate talks on the issue, a government presentation given to Michel Barnier’s EU team on Tuesday included a mixture of implicit threats and expressions of concern for the future.

article thumbnail

Amazon Rekognition Stokes Surveillance State Fears

Data Breach Today

Amazon Defends Selling Facial Recognition Software to Police and Other Users The American Civil Liberties Union has launched a broadside against Amazon, warning that Amazon Rekognition - mixing big data, machine learning and facial recognition - could be abused by authoritarian regimes. Amazon has countered by saying that all users must "comply with the law.

Big data 113
article thumbnail

Stealthy, Destructive Malware Infects Half a Million Routers

WIRED Threat Level

Cisco researchers discover a new router malware outbreak that might also be the next cyberwar attack in Ukraine.

Security 109
article thumbnail

Florida's Approach to Training Cybersecurity Specialists

Data Breach Today

Universities throughout Florida are adding more cybersecurity courses in an effort to better train the next generation of practitioners, says Ernie Ferraresso of the Florida Center for Cybersecurity, which recently provided a second round of funding for the effort.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Facebook Is Beefing Up Its Two-Factor Authentication

WIRED Threat Level

The update, now available to most users, comes several months after Facebook was criticized for spamming users' two-factor authentication phone numbers.

article thumbnail

Police Bust Suspected Fraudsters in Romania and Spain

Data Breach Today

Crime Ring Allegedly Sold Counterfeit Products and Services via Amazon, Airbnb Following 33 arrests, police in Europe say they have dismantled a Romanian-led crime gang that used phishing attacks, online scams and fake invoices to steal more than $9 million from victims in Spain, including individuals as well as organizations ranging from hospitals to government agencies.

Phishing 100
article thumbnail

FCC Asks for Input After ACA International v. FCC

Data Matters

The TCPA bar has been reeling ever since the D.C. Circuit overturned a couple of key FCC rules in ACA International v. FCC , including the FCC’s overbroad interpretation of the definition of an autodialer. However, the ruling still left several key provisions in place that facilitate the potential for significant liability and sow uncertainty for everyday business and compliance operations.

article thumbnail

Mark Zuckerberg to face tax questions in Macron meeting

The Guardian Data Protection

French president said to be seeking frank exchange with tech bosses including Facebook CEO Fresh from apologising to European lawmakers in Brussels , Mark Zuckerberg is holding talks with Emmanuel Macron in which he is expected to face renewed pressure over his company’s tax policies. Macron, who has long sought to boost technology investment as Paris tries to catch up with London, has invited about 60 key figures from the tech world to an event at the Élysée Palace, including Zuckerberg, Uber’s

Privacy 65
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Email System Features and Records Management

National Archives Records Express

Over the past few weeks, there have been several articles written describing upcoming changes Google is in the process of rolling out to their email service. One of these features, “confidential mode,” allows senders to select how long the recipient will be able to read and access the messages, disables forwarding or copying/pasting, and sets the time for when the message is deleted.

article thumbnail

These are the questions Brussels should have asked Mark Zuckerberg | Tristan Harris

The Guardian Data Protection

The integrity of our future elections depends on structural reforms to how Facebook is allowed to operate Mark Zuckerberg’s testimony to the European parliament in Brussels appeared to hold the company accountable to the more than 500 million people represented by 28 countries in the EU, but was this just an optical illusion? In fact, only a small group of MEPs spoke with him, and they had almost no time to prepare.

63
article thumbnail

What Should Post-Quantum Cryptography Look Like?

Dark Reading

Researchers are tackling the difficult problem of transitioning toward a new mode of cryptographic protections that won't break under the pressure of quantum computing power.

50
article thumbnail

Top 10 CEM software benefits for digital marketing in 2018

OpenText Information Management

Customer Experience Management (CEM) has become a key point of differentiation in many industries today. Forrester Research has shown that customer experience leaders achieve over five times the year-on-year revenue growth of laggards. To meet customer expectation, you need to deliver a highly personalized customer experience at each stage of the customer journey.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Growing Job Pressures Increase Risk of Burnout for Cybersecurity Professionals

Dark Reading

A new Trustwave survey shows information security executives and practitioners are under increasing pressure from trying to keep up with threats and compliance mandates.

Risk 48
article thumbnail

VPNFilter Malware Infects 500k Routers Including Linksys, MikroTik, NETGEAR

Threatpost

Researchers warn of malware infecting 500,000 popular routers in a campaign mostly targeting the Ukraine, but also 54 other countries.

article thumbnail

Destructive 'VPNFilter' Attack Network Uncovered

Dark Reading

More than 500K home/SOHO routers and storage devices worldwide commandeered in potential nation-state attack weapon - with Ukraine in initial bullseye.

52
article thumbnail

James Comey: FBI Faces Deep Tech-Related Questions

Threatpost

Cloud migration and automated systems, data privacy and encryption all remain central issues for the FBI as it considers its mandate and role in the modern digital age.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

6 Steps for Applying Data Science to Security

Dark Reading

Two experts share their data science know-how in a tutorial focusing on internal DNS query analysis.

article thumbnail

Mercy International Association works digital preservation miracles with Preservica

Preservica

Mercy International Association (MIA) will use Preservica’s cloud-hosted preservation platform to future-proof its unique digital artefacts and create a new global online resource. Oxford, UK and Boston, MA. May 24, 2018. Mercy International Association (MIA), the organisation of the leaders of Mercy congregations, institutes and federations throughout the world, has chosen Preservica’s cloud-hosted active digital preservation platform to protect and provide wider global access to its unique dig

article thumbnail

Is Threat Intelligence Garbage?

Dark Reading

Most security professionals in a recent survey said that threat intelligence doesn't work. So why all the hype?

article thumbnail

How Important Are People Skills In I.T. and Cybersecurity

Cyber Info Veritas

Working in IT and in Cybersecurity allows me to get an exposure to any business I’m working with that no other field or profession is allowed to. In fact, I have access to the most important part of any business, Its information. Businesses and governments need us to protect their information. Something you need to understand is that our job is not only to protect this information but to have processes and procedures on how to protect it.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

GDPR is upon us: are you ready for what comes next?

Data Protection Report

The wait is finally over—this Friday the European Union General Data Protection Regulation (GDPR) will come into force. For many readers of this post, a huge amount of work will have been done in recent months in building up to compliance with the new regime. However, the challenges of GDPR certainly don’t end on the date this law goes into implementation.

GDPR 40
article thumbnail

Synthetic Identity Fraud: 'A Problem For Years To Come'

Rippleshot

When Forbes published an article titled: "The battle against synthetic identity fraud is just beginning," it was clear this problem was becoming a widespread issue for financial institutions. The past few years the chatter about credit card fraud has been all about the major data breaches at retail stores. The Equifax breach happened and the conversations began to evolve.

Retail 40
article thumbnail

Revised Local Schedule SD – Effective May 23, 2018

The Texas Record

A new edition of Local Schedule SD – Records of Public School Districts – is effective today, May 23, 2018. The revised schedule was published for adoption in the May 18, 2018 issue of the Texas Register. The new schedule supersedes the 2nd edition. You can find the new edition on our Local Retention Schedules page. For your convenience, a marked up version of the 2nd edition is also available so you can see what revisions were made.