Thu.Dec 14, 2017

article thumbnail

Is “embodied cognition” the future of AI?

IBM Big Data Hub

As happens so often, IBM is quietly laying the groundwork for the future. A recent step toward that future is TJBot, an unassuming, do-it-yourself cardboard robot that opens a window into what AI researchers are calling “embodied cognition.

IT 86
article thumbnail

The rise of cyber crime

IT Governance

There’s no denying that cyber crime is getting worse every year, but how much has it actually risen over the past few years? Date. Number of records breached. 2010. 3.8 million. 2011. 174 million. 2012. 44 million. 2013. 822 million. 2014. 700 million. 2015. 736 million. 2016. 3.1 billion. With an increase of more than 3 billion records breached over six years, cyber crime is rapidly increasing and it doesn’t seem like organisations’ security functions are keeping up.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Understanding the role of Information Rights Management

Information Management Resources

IRM focuses on restricting access and improving security for documents, spreadsheets, PDFs and other important files intended to preserve or share information.

Access 69
article thumbnail

Don’t let cyber attackers infect your computer this Christmas

IT Governance

No one wants to be ill at Christmas, but every year thousands of us are left sniffling through our turkey and Brussels sprouts after being exposed to freezing temperatures and rooms full of forced festivity. But just like the kinds of virus that give you a cold, computer viruses proliferate over Christmas, with cyber criminals taking advantage of understaffed organisations to launch attacks.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Triton Malware Targets Industrial Safety Systems In the Middle East

WIRED Threat Level

A rare and dangerous new form of malware targets the industrial safety control systems that protect human life.

More Trending

article thumbnail

Article 29 Working Party Releases GDPR Guidance on Consent and Transparency

Data Matters

On 28 November 2017, the Article 29 Working Party (the “ WP29 ”) published detailed draft guidelines on consent under the EU General Data Protection Regulation (the “ GDPR ”), which is to come into effect on 25 May 2018. The draft guidance has been submitted for public consultation for a six week period before being adopted. The WP29 guidance on consent (“ Consent Guidelines ”) provides an analysis of the notion of consent under the GDPR as well as practical guidance for organisations on the req

GDPR 60
article thumbnail

Award-winning loyalty and rewards program personalizes online experiences

OpenText Information Management

When loyalty is your business, how do you support and engage your members and offer the best digital experience? Jet Privilege turned to personalizing the web experience, tailored to the needs of its members, encouraging loyalty in return. Since its formation in 2014, the rewards management company and frequent flyer program of Jet Airways has … The post Award-winning loyalty and rewards program personalizes online experiences appeared first on OpenText Blogs.

article thumbnail

Security Planner

Schneier on Security

Security Planner is a custom security advice tool from Citizen Lab. Answer a few questions, and it gives you a few simple things you can do to improve your security. It's not meant to be comprehensive, but instead to give people things they can actually do to immediately improve their security. I don't see it replacing any of the good security guides out there, but instead augmenting them.

article thumbnail

BlueBorne Attack Highlights Flaws in Linux, IoT Security

Dark Reading

Bluetooth vulnerabilities let attackers control devices running Linux or any OS derived from it, putting much of the Internet of Things at risk, including popular consumer products.

IoT 59
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Permissions Flaw Found Azure AD Connect

Threatpost

A permissions flaw in Microsoft’s Azure AD Connect software could allow a rogue admin to escalate account privileges and gain unauthorized universal access within a company’s internal network. .

Access 56
article thumbnail

Is a Good Offense the Best Defense Against Hackers?

Dark Reading

A proposed new law could make it legal for companies to hack back against attacker. But will it work?

IT 74
article thumbnail

Lisa Sotto Honored As an “Outstanding Woman in the Legal Profession”

Hunton Privacy

On December 11, 2017, Lisa Sotto , chair of Hunton & Williams LLP’s Global Privacy and Cybersecurity practice , was one of 54 women in the legal profession honored at the New York County Lawyers Association’s (“NYCLA’s) 103rd annual dinner. “NYCLA has long been at the forefront of equality…At this year’s annual dinner, we are thrilled to honor the contributions of women lawyers and focus a spotlight on their accomplishments,” said NYCLA President Michael McNamara.

Privacy 52
article thumbnail

TRITON Attacker Disrupts ICS Operations, While Botching Attempt to Cause Physical Damage

Dark Reading

TRITON malware is discovered after an attack on a safety monitoring system accidentally triggered the shutdown of an industrial process at an undisclosed organization.

49
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Following big data, organizations turn their attention to smart data

Information Management Resources

The new focus will be on the information that business users and business-focused analysts can utilize in their everyday decision-making.

article thumbnail

How Google Encrypts Data in the Cloud

eSecurity Planet

Google details its Application Layer Transport Security approach for securing data inside the cloud.

Cloud 62
article thumbnail

Synaptics Says Claims of a Keylogger in HP Laptops are False

Threatpost

Synaptics said reports that hundreds of HP laptops contained a secret keylogger that traced back to debugger software made by the company are inaccurate.

Privacy 48
article thumbnail

Why Hackers Are in Such High Demand, and How They're Affecting Business Culture

Dark Reading

White hat hackers bring value to organizations and help them defend against today's advanced threats.

61
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

e-Records 2017: “Big Data vs. Information Security: Bringing Peace to Conflict”

The Texas Record

This is the sixth post of a multi-part recap of the 2017 e-Records Conference. Presentation materials from the conference are available on the e-Records 2017 website. Information Governance: Take Control and Succeed. The Public Information Act and Updates from 85th Legislative Session. TSLAC Wants Your Electronic Records. Establishing Information Governance for Local Governments in Microsoft SharePoint and Office 365.

article thumbnail

The Gifts that Keep on Giving: eDiscovery Holiday Wishes and Webcasts

eDiscovery Daily

Not only have we had a very successful year in presenting CLE-accredited webcasts this year, we’re already getting started on next year with a new webcast in January! If you want to see how key case law decisions in 2017 may affect how you conduct discovery in 2018 AND how you can still get CLE credit for 2017’s webcasts, read on. I thought I’d start by taking a look back at the webcasts we conducted this year.

article thumbnail

Just 28 Percent of Business Leaders Have Heard of the Equifax Breach

eSecurity Planet

We're a little worried about the other 72 percent.

55
article thumbnail

Google to open Beijing artificial intelligence center

Information Management Resources

The move is a tacit acknowledgment that companies and governments in China and the U.S. are locked in a race to determine how the art and science of AI will be applied around the world.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Happy Holidays

Archives Blogs

The Archives will be closed from noon December 22 to 9am Wednesday, January 2, 2018. Front of card. This greeting card “wishing health, joy and wealth be unto you” is from the Lorne Brown fonds. Just who the “broadcaster” was is uncertain, but the delightful colours and message ring true this time of year. Card envelope. The matching textured envelope with block printing inside the flap is a wonderful added touch to this charming circa 1930 card.

article thumbnail

New engagement models emerge for custom software outsourcing

Information Management Resources

Many organizations have decided their applications are too important to outsource, yet don’t have the resource skills or headcount in house to execute on their ambitions, and don’t have time to hire or train either.

30
article thumbnail

GDPR and “Privacy by Design"

Docuware

Until recently, the protection and security of personal information kept a relatively low profile. Most countries, regions and states have data protection legislation, but the level of protection provided varies. Exposure of personal information or data breaches were relatively rare, and state surveillance of such information was generally covert and unacknowledged.

GDPR 24
article thumbnail

India's first national ID system is helping the country's women

Information Management Resources

Despite the advances, problems remain in digital authentication for the biometric system that now covers more than 1.1 billion people, or 15 percent of the world’s population.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

11-17-2017

Info Source

DIR 11-17-2017. Tweet.

40
article thumbnail

Vanguard leapfrogs cautious banks, unveils blockchain network plan

Information Management Resources

Rather than forming a consortium of peers to investigate blockchain technology, as many banks have done, one of the world's largest asset managers is acting on its own.

article thumbnail

Take Advantage of Our Early Bird MER / CIGO 2018 Discount Pricing

IGI

REGISTER HERE for MER / CIGO 2018 Early Bird Pricing. We would like to invite you to take advantage of a special early bird joint registration offer for both the MER Conference and the CIGO Summit taking place back-to-back in Chicago in May 2018. The MER Experience, May 7-9 , has been the nation’s foremost educational conference specializing in addressing the growing and future challenges of electronic records management (ERM) – from the legal, technical and operational perspectives.