Fri.Dec 22, 2017

article thumbnail

Snowden-Backed App 'Haven' Turns Your Phone Into a Home Security System

WIRED Threat Level

The NSA leaker's latest project aims to secure your computer—and you—from not just digital but physical attacks.

Security 112
article thumbnail

The Fourth Edition of The Privacy, Data Protection and Cybersecurity Law Review Is Available

Data Matters

The fourth edition of The Privacy, Data Protection and Cybersecurity Law Review takes a look at the evolving global privacy, data protection and cybersecurity landscape in a time when mega breaches are becoming more common and businesses are coming under increased scrutiny from regulators, Boards of Directors and their customers. Several lawyers from Sidley’s global Privacy and Cybersecurity practice have contributed to this publication.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2017 Data Breach Stats — By The Industry

Rippleshot

With just over a week left in 2017, the year has already set another record number of data breaches — far surpassing 2016’s figures. The latest data from the ITRC shows that, as of December 20, there have been a total of 1293 breaches, with a total number of records exposed reaching 174,253,442. To put that into context, in all of 2016 there were 1,093 breaches.

article thumbnail

Star Trek: Bridge Crew loses the VR requirement

WIRED Threat Level

The VR action game Star Trek: Bridge Crew just lost its virtual reality requirement, Ubisoft has announced, saying the new non-VR option is arriving as a free update. Bridge Crew lets players experience the Star Trek universe in a virtual ship, taking on a particular role within that ship to help tackle obstacles and otherwise face various in-universe challenges.

IT 41
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

While Blaming Companies for Breaches, Consumers Aren't Prioritizing Their Own Security

eSecurity Planet

Just 25 percent of U.S. consumers use two-factor authentication, and just 45 percent use a PIN to protect their mobile device.

More Trending

article thumbnail

Thinking Outside the Media Box – Influencer Relations

WIRED Threat Level

Working in PR, I love the thrill of the media relations chase. From finding the right reporter to drafting the perfect, creative pitch to securing interest from media and then to finally seeing that beautiful piece of client coverage post – that’s what keeps me excited about PR. Just as a runner would save a hard-earned race medallion, I carefully file away each CNBC, POPSUGAR, or HuffPost piece that I help guide across the finish line.

article thumbnail

Hallmark- Unsung Innovation based on Trends

Dark Reading

A 100 year old greeting card company follows the trends, learns to experiment and is ahead of the Netflix/Amazon/Hulu streaming video. The Hallmark Channel is on track to keep growing into the streaming era ready for the next trend.

article thumbnail

Christmas Lessons

Docuware

I watched as she just stared at the present. This young lady, invited to an after school Christmas party for her and some of her classmates, was mesmerized by the bows and glitter. She took in every moment of all things beautiful. She methodically moved the packages on all sides and smiled at every turn. She said something about not wanting to unwrap it.

Paper 26
article thumbnail

Archival Gift-Giving

Archives Blogs

Tis the season to give holiday gifts. Here in the Office of the Archivist, we are in the business of giving gifts all year round. One of the little-known things that we do is provide facsimile gifts for the President of the United States. My staff receive requests from the State Department Protocol Office for gifts for Heads of State. The Protocol Office will explain who the gift is for and what they are looking for.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Workers Must Watch Out For These Types Of Wage Theft

Threatpost

Wage theft is a new hot topic sweeping across the United States. The issue picked up even more steam when Donald Trump repealed wage theft protections in March of 2017. Working professionals, in particular, are rightly concerned with the prevalence of wage theft among businesses in America. Many worry that they may be a victim of wage theft without even realizing it.