Fri.Jun 08, 2018

article thumbnail

International Archives Day

Archives Blogs

On Saturday, June 9, the National Archives joins with archives around the world to celebrate International Archives Day , a commemoration of the day the International Council on Archives (ICA) was created in 1948. This day is dedicated to promoting the great work of archives and archivists in preserving and providing public access to our communities’ historical records and promoting access to government records for transparency and accountability.

article thumbnail

10 predictions on AI’s impact over the next five years

Information Management Resources

Gartner Group has just released its '100 Data and Analytics Predictions Through 2022.' Here are the research firm's projections on where artificial intelligence is heading.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facebook Bug Sets 14M Users' Settings to 'Public'

Dark Reading

The default sharing setting was accidentally changed for millions of accounts during a four-day period last month.

106
106
article thumbnail

GDPR: UK Privacy Regulator Open to Self-Certification

Data Breach Today

Focus on Continuous Compliance and Breach Response, Experts Say One day, organizations may be able to self-certify their GDPR compliance, says an official at the U.K.'s data privacy regulator. Regardless, experts recommend that organizations ensure they are focusing on continuous GDPR compliance and regularly testing their data breach response plans.

GDPR 166
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

WannaCry Hero Marcus Hutchins' New Legal Woes Spell Trouble for White Hat Hackers

WIRED Threat Level

By expanding the case against Marcus Hutchins, the Department of Justice has signaled a troubling interpretation of cybersecurity law.

More Trending

article thumbnail

Threat Landscape: Dark Reading Caption Contest Winners

Dark Reading

Insider threats -- desktop attacks, security awareness, caffeine -- all worthy contenders in our cartoon caption competition. And the winners are.

article thumbnail

Analysis: Swiping Cryptocurrencies Through a Back Door

Data Breach Today

Leading the latest edition of the ISMG Security Report: Our exclusive report on an Australian criminal investigation into a company that apparently swiped cryptocurrency using a software backdoor. Also, cutting through the hype on artificial intelligence and machine learning.

article thumbnail

Weekly podcast: MyHeritage, PageUp, Rochester Grammar School and, yes, the GDPR

IT Governance

This week, we discuss the compromise of 92 million MyHeritage users’ credentials, “unauthorised activity” at PageUp, a missing memory stick at Rochester Grammar School, and the first couple of weeks of the GDPR. Hello and welcome to the IT Governance podcast for Friday, 8 June 2018. Here are this week’s stories. The genealogy and DNA testing site MyHeritage announced on Monday that more than 92 million users’ credentials were compromised last October.

GDPR 64
article thumbnail

How to Use the NIST Cybersecurity Framework

Data Breach Today

Specific Actions for Organizations to See Success in their Cybersecurity Programs By focusing on the cybersecurity actions, NIST CSF can be flexibly deployed regardless of the setting or industry.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Eleventh Circuit Vacates FTC Data Security Order

Hunton Privacy

On June 6, 2018, the U.S. Court of Appeals for the Eleventh Circuit vacated a 2016 Federal Trade Commission (“FTC”) order compelling LabMD to implement a “comprehensive information security program that is reasonably designed to protect the security, confidentiality, and integrity of personal information collected from or about consumers.” The Eleventh Circuit agreed with LabMD that the FTC order was unenforceable because it did not direct the company to stop any “unfair act or practice” within

article thumbnail

Era of the eBay-Like Underground Markets Is Ending

Data Breach Today

Report: Cybercriminals Moving to Secure Chat Platforms, Conventional Forums The era of the underground marketplace may be ending as concerns over law enforcement infiltration rise, says threat intelligence company Digital Shadows. Cybercriminals' deals are shifting toward encrypted chat and other decentralized services, the company says.

Marketing 100
article thumbnail

New Data Privacy Regulations

Schneier on Security

When Marc Zuckerberg testified before both the House and the Senate last month, it became immediately obvious that few US lawmakers had any appetite to regulate the pervasive surveillance taking place on the internet. Right now, the only way we can force these companies to take our privacy more seriously is through the market. But the market is broken.

article thumbnail

The Impact of LabMD vs. FTC Appellate Court Ruling

Data Breach Today

How Will the Decision Affect the Agency's Data Security Enforcement Activities? What impact will an appellate court's ruling Wednesday that vacated the Federal Trade Commission's data security enforcement action against LabMD have on the agency's long-term enforcement activities? Regulatory experts are weighing in.

Security 100
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

I Just Won the European Security Blogger Award Grand Prix Prize for the Best Overall Security Blog!

Troy Hunt

I'm not sure how I found myself in a European award program, maybe it's like Australians in Eurovision ? But somehow, I wiggled my way into The European Security Blogger Awards and before even having a chance to come down off the high that was last week's Award for Information Security Excellence at the AusCERT conference in Australia , this happened: @troyhunt hey mate, you just won the EU security blogger of the year.

article thumbnail

Special offer: save 10% on ISO 27001 distance learning

IT Governance

To mark the launch of our ISO27001 Certified ISMS Foundation (Distance Learning) training course , we are offering customers 10% off when they purchase the course before 15 June 2018. This distance learning course is a modular recording of our popular one-day ISO27001 Certified ISMS Foundation classroom course , and provides a complete introduction to the key elements required to achieve compliance with the Standard.

article thumbnail

6 Enterprise World sessions Business Network customers won’t want to miss

OpenText Information Management

If you are an OpenText™ Business Network customer (or if you are considering becoming one), we would like to invite you to OpenText Enterprise World 2018. We know that it can be tough to take time out of your busy schedule to attend an event, so we are working hard to ensure Enterprise World is … The post 6 Enterprise World sessions Business Network customers won’t want to miss appeared first on OpenText Blogs.

B2B 48
article thumbnail

FireEye Finds New Clues in TRITON/TRISIS Attack

Dark Reading

Attackers behind the epic industrial-plant hack reverse-engineered the safety-monitoring system's proprietary protocol, researchers found.

54
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Breaking up is hard to do – especially for my GDPR spammers | John Crace

The Guardian Data Protection

This week I failed to liberate my inbox, and England expects. to go out in the second round Like many people, I received hundreds of messages last month from companies who had been forced to comply with the General Data Protection Regulation (GDPR) and were begging me to allow them to carry on sending me emails I didn’t want. Unusually for me – I tend to delete spam without opening it – I did make a point of answering every one as it seemed like a once-in-a-lifetime opportunity to reclaim my inb

GDPR 46
article thumbnail

Facebook Software Bug Made Some Private Posts Public: 14 Million Affected

Threatpost

A Facebook glitch in May set millions of posts that users composed to “public" for ten days.

article thumbnail

Cyber attack, complexity and collaboration

OpenText Information Management

The automotive supply chain has always been among the most complex in any industry. The complexity is increasing as operations become more global and vehicles become more connected. Manufacturers want to lead through innovation and they need to work closely with suppliers and partners to achieve this. Increased collaboration across the connected automotive supply chain … The post Cyber attack, complexity and collaboration appeared first on OpenText Blogs.

article thumbnail

Why cloud migration is still hard for federal agencies

CGI

Why cloud migration is still hard for federal agencies. harini.kottees…. Fri, 06/08/2018 - 02:14. The cloud is everywhere. Every organization is either in it, moving to it or considering how to get to it. With the ongoing push for digital transformation, many federal agencies, educational institutions and non-profit organizations see the cloud as their gateway to achieving complex, innovative and mission-critical projects.

Cloud 40
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Is artificial intelligence patentable? Should it be?

Information Management Resources

AI systems are definitely not algorithms in the formal sense, though people may call them that. They are processes, not abstract methods and not mathematical entities.

article thumbnail

Lenovo Finally Patches Ancient BlueBorne Bugs in Tab and Yoga Tablets

Threatpost

Lenovo patches several popular tablet models to protect against BlueBorne vulnerabilities first identified in September 2017.

article thumbnail

5 best practices to scale data science across the enterprise

Information Management Resources

A lack of data and technical capabilities is not the key reason new analytics initiatives underperform; it’s because most organizations approach them as an artisanal craft.

article thumbnail

Creative Spam Thinks Outside the Macro with.IQY Attachments

Threatpost

The ability of these simple files to open Excel and download any data from the internet makes them extremely dangerous.

42
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Enterprise IT Juggling 20-Plus SecOps Tools

Dark Reading

Lack of integration also a big issue among decision makers.

IT 51
article thumbnail

Google Tackles AI Principles: Is It Enough?

Threatpost

AI offers an immense capacity for good -- and for unintended consequences.

IT 44
article thumbnail

Look out world, your artificial intelligence ETF is on the way

Information Management Resources

The same software that underpins AIEQ’s stock selection system and runs on International Business Machines Corp.’s Watson platform will drive AIIQ.