Fri.May 11, 2018

article thumbnail

What data management platforms won’t do for you just now

Information Management Resources

Implementing a DMP requires a significant investment of resources. Before making a final decision, it is important to consider many factors.

IT 34
article thumbnail

Supply chain analytics that drive action

OpenText Information Management

Every supply chain creates a mountain of data – making it one of the most fertile areas for the application of analytics. Yet, the majority of companies have been slow to embrace the potential of supply chain analytics. At OpenText™, we decided to find out why. The result is OpenText Trading Grid™ Analytics – launched … The post Supply chain analytics that drive action appeared first on OpenText Blogs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The New Security Playbook: Get the Whole Team Involved

Dark Reading

Smart cybersecurity teams are harnessing the power of human intelligence so employees take the right actions.

article thumbnail

3 top trends driving the emergence of operational analytics

Information Management Resources

After years of talking about the need for faster data processing, analysis and decision making, the promise of this technology has finally become accessible to organizations of all sizes.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Real-Time Payment Networks Face Off Against Fraudsters

Data Breach Today

With the rise of P2P payment networks and the U.S. working toward a real-time national payments network, the push is on to battle fraudsters. Also, attackers are hacking legitimate websites to more stealthily distribute "Gandcrab" crypto-locking ransomware.

More Trending

article thumbnail

'All of Us' Research Project: The Privacy Risks

Data Breach Today

Although the National Institutes of Health is implementing strong privacy measures as it begins its effort to enroll 1 million volunteers to contribute data to its "All of Us" precision medicine research project, there are still risks involved, says privacy attorney Kirk Nahra.

Privacy 100
article thumbnail

Why the GDPR email deluge, and can I ignore it?

The Guardian Data Protection

A stringent new law will change how companies handle your data. Here’s what you need to do ‘Urgent action required ”, “Do you still want to hear from us?”, “We’ve updated our privacy policy”, “Should we stop sending you updates? If not, act now!” Many of us will have received emails like this during the past few weeks, some of them from companies we haven’t used for years or have maybe never even heard of.

GDPR 83
article thumbnail

A View of Cybersecurity's Future

Data Breach Today

Gigamon's Kim DeCarlis on What Needs to be Done Today to Better Secure Tomorrow As recent breaches attest, today's approaches to cybersecurity are insufficient. Kim DeCarlis of Gigamon offers her views on what organizations must do differently to ensure stronger cybersecurity postures.

article thumbnail

Microsoft Enabling Javascript in Excel Has Security Pros Anxious

WIRED Threat Level

Enabling JavaScript should make Excel more powerful, but increasing access points makes it even more of a web security nightmare than it already is.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Crypto Fight: US Lawmakers Seek Freedom From Backdoors

Data Breach Today

'Secure Data Act' Tries to End Long-Running Encryption Standoff A bipartisan group of U.S. lawmakers has reintroduced legislation in the House that would stop the government from forcing software vendors to intentionally weaken their products for surveillance purposes. Two prior attempts to enact the legislation in Congress have failed.

article thumbnail

Cyber resilience for the healthcare sector

IT Governance

The healthcare sector faces more information security risks than almost any other sector. NHS organisations experience daily, automated cyber attacks, and must also contend with targeted attacks. With the introduction of the EU General Data Protection Regulation (GDPR) and the Directive on security of network and information systems ( NIS Directive ), the healthcare sector will see an increased legal and regulatory focus on cyber resilience.

GDPR 64
article thumbnail

Gandcrab Ransomware Exploits Website Vulnerabilities

Dark Reading

Researchers find campaigns distributing Gandcrab by hosting malware on legitimate websites with poor security measures.

article thumbnail

GDPR: Managing the right to withdraw consent

IT Governance

Managing the right to withdraw consent is a key requirement of the EU General Data Protection Regulation (GDPR) , and, if it hasn’t done so already, your organisation should be preparing by creating a withdrawal of consent procedure before 25 May 2018. What does the GDPR say about consent? Under the GDPR, there are stricter rules for obtaining consent: Consent must be freely given, specific, informed and unambiguous.

GDPR 61
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Accelerating the use of OpenText InfoArchive

OpenText Information Management

The latest release of OpenText™ InfoArchive is now available and provides the market with some significant new functionality. But first, let me level-set and talk about InfoArchive’s position within the OpenText archiving family. InfoArchive is unique to our archiving product line because it has the ability to ingest any type of electronic information.

article thumbnail

Hide and Seek Brings Persistence to IoT Botnets

Dark Reading

The rapidly evolving Hide and Seek botnet is now persistent on a wide range of infected IoT devices.

IoT 66
article thumbnail

Airline Ticket Fraud

Schneier on Security

New research: " Leaving on a jet plane: the trade in fraudulently obtained airline tickets :". Abstract: Every day, hundreds of people fly on airline tickets that have been obtained fraudulently. This crime script analysis provides an overview of the trade in these tickets, drawing on interviews with industry and law enforcement, and an analysis of an online blackmarket.

article thumbnail

Vega Stealer Malware Takes Aim at Chrome, Firefox

Threatpost

While it’s a simple payload for now, researchers said Vega has the ability to evolve into something more concerning in the future.

56
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

8 Ways Hackers Can Game Air Gap Protections

Dark Reading

Isolating critical systems from connectivity isn't a guarantee they can't be hacked.

68
article thumbnail

Weekly Update 86

Troy Hunt

This week, Scott Helme is getting bitten by Aussie critters whilst working from a desert island. He's here on the Gold Coast for the NDC Security event next week so I thought we'd record the update together so we grabbed a couple of cold ones, wandered down to the backyard and recorded there. We cover off a bunch of bits and pieces related to things we're working on together (workshops and Report URI) as well as some (mostly) commonly held views about HTTPS, EV certs and visual indicators.

article thumbnail

Proofpoint Sounds Warning on Vega Stealer Targeted Data Theft Campaign

Dark Reading

Marketing, PR, and advertising firms are among those being targeted.

article thumbnail

How the Kubernetes Security Response Team Works

eSecurity Planet

VIDEO: Brandon Philips, former CTO of CoreOS, talks about how the Kubernetes security team works and responds to vulnerability reports.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Alert Fatigue has real consequences in Cybersecurity

Ascent Innovations

Alert Fatigue has real consequences in Cybersecurity. We all know the fable, The Boy Who Cried Wolf. Cybersecurity leaders could apply the lesson learnt to their Security Operations in terms of reducing false-alarms. This becomes even more important when we as a community are short on critical cybersecurity talent and resources. We can do better with our existing resources, by being proactive in a reactive environment.

article thumbnail

FTC Issues Warning Letters for Potential COPPA Violations

Hunton Privacy

On April 27, 2018, the Federal Trade Commission issued two warning letters to foreign marketers of geolocation tracking devices for violations of the U.S. Children’s Online Privacy Protection Act (“COPPA”). The first letter was directed to a Chinese company, Gator Group, Ltd., that sold the “Kids GPS Gator Watch” (marketed as a child’s first cellphone); the second was sent to a Swedish company, Tinitell, Inc., marketing a child-based app that works with a mobile phone worn like a watch.

article thumbnail

Secureworks joins Atlanta Ransomware attack investigation

Ascent Innovations

Secureworks joins Atlanta Ransomware attack investigation. Atlanta is returning to normalcy for some operations after ransomeware attack last week. There are many computers that are still quarantined, and many city services still in recovery. Mayor Bottoms has refused to pay the ransom. The FBI, Dept. of Homeland Security and Secret Service are investigating.

article thumbnail

Sharp Appoints Mike Marusic To The Position Of President And CEO, Sharp Imaging And Information Company Of America

Info Source

Sharp Electronics Corporation (SEC) today announces that Mike Marusic has been named President and CEO, Sharp Imaging and Information Company of America (SIICA), effective June 4, 2018, replacing Doug Albregts who has resigned from Sharp to pursue a new opportunity. In this position, Marusic will report directly to Ted Kawamura, Chairman of SEC, and will be responsible for directing the strategic growth and profitability of Sharp’s Business to Business (B2B) operations.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Microsoft cuts cost of Azure Support – Advantage Consumer

Ascent Innovations

Microsoft cuts cost of Azure Support – Advantage Consumer. The three major players in the cloud infrastructure, Microsoft Azure, Amazon Web Services and Google Cloud Platform, are eager to win market share. Each company is continuing to innovate, add new features, and enhancing their offerings to win. Microsoft recently announced a significant price cut for its most popular, Azure Standard Support plan, to help entice more businesses to their platform.

Cloud 40
article thumbnail

Ready Player WON: The Time Pop Culture Accidentally Told the Compliance Story

Hanzo Learning Center

Steven Spielberg’s Ready Player One is probably going to clear a $400M box office -- and deservedly so. Having not read the book, I saw this film opening weekend in IMAX 3D and I was on the edge of my seat the whole time. It was epic! In the aftermath, I found that the social media buzz seems to center around easter eggs, special effects, pop culture references, and how the film matches up to the book (or doesn’t), but my thoughts are elsewhere.

article thumbnail

Companies wasting money on Cloud services

Ascent Innovations

Companies wasting money on Cloud services. Businesses are moving their applications and storage to the cloud rapidly. With all of that movement to the cloud, many businesses are ‘buying’ more than they need, as they are still learning about consumption requirements. When there really are no limitations on the resources you are allowed to use, you can end up with more than necessary.

Cloud 40