Tue.Nov 12, 2019

article thumbnail

Microsoft Will Apply California's Privacy Law Nationwide

Data Breach Today

Company's Move Could Influence Other Technology Companies Microsoft will apply the core rights of the California Consumer Privacy Act across all its customers in the U.S., which could nudge other technology companies in the same direction as online privacy becomes an increasing concern. The move is significant in that the technology industry has lobbied against parts of the law.

Privacy 219
article thumbnail

SHARED INTEL: What can be done — today — to keep quantum computing from killing encryption

The Last Watchdog

There’s little doubt that the shift to quantum computing will open new horizons of digital commerce. But it’s also plain as day that the mainstreaming of quantum processing power will profoundly exacerbate cybersecurity exposures. Related: The ‘post quantum crytpo’ race is on This isn’t coming as any surprise to IT department heads. In fact, there’s widespread recognition in corporate circles that the planning to address fresh cyber risks associated with quantum computing should hav

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Privacy Analysis: Google Accesses Patient Data on Millions

Data Breach Today

Massive Research Project With Ascension Health System Raises Concerns A newly disclosed collaboration between Google and the massive Ascension healthcare system that the partners say is designed to improve patient care is raising serious privacy concerns. That's because the project involves Ascension sharing with Google data on millions of its patients - without their permission.

Privacy 179
article thumbnail

Regulation of AI-Based Applications: The Inevitable New Frontier

AIIM

According to the 2019 IDC study of spending on Artificial Intelligence (AI), it's estimated to reach $35.8 billion in 2019 and is expected to double by 2022 to $ 79.2 billion representing an annual growth rate of 38% for the period 2018-2022. The economic benefits and utility of AI technologies are clear and compelling. No doubt, applications of AI may address some of the most vexing social challenges such as health, the environment, economic empowerment, education, and infrastructure.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

New Ransomware-as-a-Service Offered at Deep Discount: Report

Data Breach Today

McAfee: Creators of 'Buran' Ask for Smaller Percentage of Ransoms Collected A new ransomware-as-a-service model dubbed "Buran" that targets vulnerabilities in certain devices running Windows is offered at a deep discount to help the malware spread faster, according to McAfee researchers.

More Trending

article thumbnail

Verizon: Companies Failing to Maintain PCI DSS Compliance

Data Breach Today

Many companies around the world that accept card payments are failing to continually maintain compliance with the PCI Data Security Standard, according to the new Verizon 2019 Payment Security Report. Verizon's Rodolphe Simonetti, who contributed to the report, explains the findings.

article thumbnail

First multi-million GDPR fine in Germany: €14.5 million for not having a proper data retention schedule in place

Data Protection Report

On October 30, 2019 the Berlin Commissioner for Data Protection and Freedom of Information ( Berliner Beauftragte für Datenschutz und Informationsfreiheit – Berlin DPA ) issued a €14.5 million fine on a German real estate company, die Deutsche Wohnen SE ( Deutsche Wohnen ), the highest German GDPR fine to date. The infraction related to the over retention of personal data.

GDPR 106
article thumbnail

CCPA Compliance: Identity Verification Challenges

Data Breach Today

One key step for preparing to comply with the California Consumer Privacy Act, which goes into effect in January, is determining how best to verify the identity of users, say two leaders of the Sovrin Foundation, who discuss the key issues.

article thumbnail

Mexican state-owned oil company Pemex hit by ransomware

Security Affairs

On S unday , the Mexican state-owned oil company Petróleos Mexicanos (Pemex) was infected with the DoppelPaymer ransomware. On Sunday, a piece of the DoppelPaymer ransomware infected systems of the Mexican state-owned oil company Petróleos Mexicanos (Pemex) taking down part of its network. The ransom amount for Pemex is 565 BTC currently… Also, DoppelPaymer's TOR site's text was updated sometimes & now have this: "Also, we have gathered all your private sensitive data.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Identity Fraud: Account Origination

Data Breach Today

Bala Kumar of iovation, a TransUnion company, sees a marked spike in identity fraud in general, and at account origination in particular. How does this increase manifest across industry sectors, and how should organizations re-think their defenses?

134
134
article thumbnail

Identifying and Arresting Ransomware Criminals

Schneier on Security

The Wall Street Journal has a story about how two people were identified as the perpetrators of a ransomware scheme. They were found because -- as generally happens -- they made mistakes covering their tracks. They were investigated because they had the bad luck of locking up Washington, DC's video surveillance cameras a week before the 2017 inauguration.

article thumbnail

Labour Party Hit by Massive Online Attack Attempt

Data Breach Today

No Systems Compromised, But Campaigning Disrupted, UK Party Officials Report The U.K. Labour Party says its systems were hit by a large-scale online attack that disrupted access to some campaigning systems, but led to no breach. The attack report comes amidst the Conservative government's refusal to release a report into alleged Russian interference in the Brexit referendum.

article thumbnail

EU: New Guidelines on the concepts of controller, processor and joint controllership

DLA Piper Privacy Matters

On 7 November, the European Data Protection Supervisor issued a set of guidelines that could be used by organisations to determine whether they act as controller, processor or joint controller. The Guidelines also contain easy-to-use checklists as well as a flowchart. On 7 November, the European Data Protection Supervisor (“ the EDPS ”) issued a set of guidelines (“ the Guidelines ”) to assist EU institutions and bodies (“ the EUIs ”) in complying with the provisions of the Regulation (EU) 2018/

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Siemens and IBM showcase an AI-based, CO2 friendly advisor

IBM Big Data Hub

Making the case for AI, or any nascent technology for that matter, can be a struggle for companies today. While large enterprises know they need to be fast, agile and innovation-obsessed to survive disruption, their age-old policies, antiquated systems, disconnected data and entrenched corporate habits can be serious blockers to adoption.

81
article thumbnail

Comments Submitted on California Consumer Privacy Act of 2020—Initiative 19-0021

Data Matters

As submitted for the comment period on Initiatives – Active Measures for Initiative 19-0021 on November 8, 2019. Dear Mr. Mactaggart, As privacy practitioners, we share your passion and dedication to the development of information privacy and data protection law in the United States. We acknowledge your achievement in pushing for the enactment of the California Consumer Privacy Act (CCPA) and contributing to the ongoing national conversation to advance privacy rights.

Privacy 68
article thumbnail

Welcome to JNUC 2019

Jamf

It's finally here! Before you settle in for three days of fun, here are a few public service announcements for Jamf Nation User Conference (JNUC) attendees and non-attendees.

IT 75
article thumbnail

AI, Records, and Accountability

ARMA International

This article is part of a collaboration between ARMA and AIEF and is included in Information Management Magazine, ARMA-AIEF Special Edition , which will be available for download in mid-November. A printed version of the special issue will be available as well, for a nominal fee. Introduction. Artificial intelligence (AI) promises wide-ranging benefits for society, but it also poses a host of ethical challenges, such as racial and gender bias, liability for harms caused by AI systems, inequality

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Welcome to JNUC 2019

Jamf

It's finally here! Before you settle in for three days of fun, here are a few public service announcements for Jamf Nation User Conference (JNUC) attendees and non-attendees.

IT 75
article thumbnail

#COBOL60: Your COBOL questions, answered – Part Three

Micro Focus

At a recent Micro Focus-sponsored virtual event, more than 300 COBOL community members celebrated its 60th anniversary and by posing over 90 questions to our expert panel. In this, the final part of a three blog series, COBOL expert Ed Airey answers the last two of the 12 most popular: Q11: Despite being an intuitive, View Article.

IT 60
article thumbnail

New Jamf product portfolio and customers take center stage during JNUC keynote

Jamf

From Jamf Protect to 100,000 Jamf Nation members, read this blog post for a recap of everything that happened during the exciting Jamf Nation User Conference opening keynote.

75
article thumbnail

The Myths of Multifactor Authentication

Dark Reading

Organizations without MFA are wide open to attack when employees fall for phishing scams or share passwords. What's holding them back?

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

New Jamf product portfolio and customers take center stage during JNUC keynote

Jamf

From Jamf Protect to 100,000 Jamf Nation members, read this blog post for a recap of everything that happened during the exciting Jamf Nation User Conference opening keynote.

75
article thumbnail

Why Cyber-Risk Is a C-Suite Issue

Dark Reading

Organizations realize the scale of cyber-risk but lack counter-actions to build resilience.

Risk 84
article thumbnail

How SAP moved 80,000 mobile devices to Jamf Pro

Jamf

Phillipp Pinkernelle, IT Technology Consultant at SAP, discusses how SAP moved 80,000 devices from one mobile device management (MDM) solution to Jamf Pro.

MDM 74
article thumbnail

Introducing OpenText Core Experience Insights

OpenText Information Management

According to Forrester Research, 63% of marketers use some sort of journey mapping. Yet customer journeys are more complex than ever, requiring more one-to-one personalization across many touchpoints and experiences. This, in turn, requires more data and visibility across all touchpoints, events and interactions. Gaining intelligent insights about your customers’ omnichannel interactions with your product … The post Introducing OpenText Core Experience Insights appeared first on OpenText B

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How SAP moved 80,000 mobile devices to Jamf Pro

Jamf

Phillipp Pinkernelle, IT Technology Consultant at SAP, discusses how SAP moved 80,000 devices from one mobile device management (MDM) solution to Jamf Pro.

MDM 74
article thumbnail

The Latest Innovation to Unlock the Information Advantage

OpenText Information Management

The OpenText™ November 2019 launch, announced at our Enfuse digital security conference, demonstrates our commitment to securing your information. For us, security is job #1. Keeping information secure and meeting compliance requirements can’t be an afterthought when it comes to creating the Information Advantage that drives innovation and new business models.

article thumbnail

Timing your Apple hardware refreshes

Jamf

This morning at JNUC, six technology enthusiasts led a panel discussion that focused on an affordable way for organizations to implement Apple in their environments — participate in a buyback program.

65