Wed.Apr 18, 2018

article thumbnail

How to write a GDPR-compliant personal data breach notification procedure

IT Governance

An integral part of your EU General Data Protection Regulation (GDPR) compliance project is producing appropriate documentation, which includes a personal data breach notification procedure. If you’re just beginning your GDPR project, it’s unlikely that you’ll be fully compliant by 25 May 2018, when the Regulation is enforced. However, in our recent blog, GDPR priorities in the lead up to May , we suggested that your organisation should prioritise creating incident response and breach reporting

article thumbnail

Overcoming hidden data risks when managing third parties

Information Management Resources

Here are steps that will extend a risk management program to include outside vendors and reduce the likelihood of a breach due to factors outside an organization’s control.

Risk 43
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DHS Secretary: US Won't Tolerate Cyber Meddling

Data Breach Today

Department of Homeland Security Soon Will Unveil New Cybersecurity Strategy Department of Homeland Security Secretary Kirstjen M. Nielsen warns that the U.S. will more aggressively move to punish those who conduct cyberattacks. Plus, the department plans to soon unveil a new cybersecurity strategy. Complacency, she says, "is being replaced by consequences.

article thumbnail

Data Visibility, Control Top Cloud Concerns at RSA

Dark Reading

As the traditional perimeter dissolves and sensitive data moves to the cloud, security experts at RSA talk about how they're going to protect it.

Cloud 43
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Facebook to start asking permission for facial recognition in GDPR push

The Guardian Data Protection

Users will be asked to review information about targeted advertising but some say opting out is deliberately difficult Facebook has started to seek explicit consent from users for targeted advertising, storage of sensitive information, and – for the first time in the EU – application of facial recognition technology as the European general data protection regulation (GDPR) is due to come into force in just over a month.

GDPR 91

More Trending

article thumbnail

Surviving Disruption -- Strategies for the Era of AI and Machine Learning

AIIM

Truly disruptive moments occur only once in a generation. They occur when the cumulative inertia of technology innovation combines to disrupt business models. And the heart of disruption is ultimately when radical technology changes are standardized and then incorporated into new business models. Let’s take a look at a couple. The first ones on this graphic are the telephone and electricity.

article thumbnail

Preparing for Mid-Term Elections

Data Breach Today

FBI's Elvis Chan on Efforts to Bolster Cybersecurity of Social Media Stung by signs of Russian influencing of the 2016 presidential election, the FBI is working with social media companies to bolster cybersecurity in advance of the 2018 mid-term election. Elvis Chan of the FBI describes these efforts.

article thumbnail

How to successfully harness AI to combat fraud and abuse

Elie

While machine learning is integral to innumerable anti-abuse systems including spam and phishing detection, the road to reap its benefits is paved with numerous abuse-specific challenges. Drawing from concrete examples this session will discuss how these challenges are addressed at Google and providea roadmap to anyone interested in applying machine learning to fraud and abuse problems.

article thumbnail

FDA Proposes Action to Enhance Medical Device Cybersecurity

Data Breach Today

Agency Seeks Congressional Authority to Require Makers to Take Certain Steps The FDA has issued plans for advancing the safety of medical devices, including a proposal to impose new cybersecurity requirements on manufacturers. Some experts say the FDA's plans are a good move, given the current device risk environment, but they warn that some proposals could prove difficult to achieve.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How to successfully harness AI to combat fraud and abuse

Elie

While machine learning is integral to innumerable anti-abuse systems including spam and phishing detection, the road to reap its benefits is paved with numerous abuse-specific challenges. Drawing from concrete examples this session will discuss how these challenges are addressed at Google and providea roadmap to anyone interested in applying machine learning to fraud and abuse problems.

article thumbnail

The Power of AI and ML to Fight Fraud

Data Breach Today

Ricardo Villadiego of Cyxtera on How Emerging Tech Can Change the Anti-Fraud Landscape For the past year, the buzz about artificial intelligence and machine learning has been overwhelming. But Ricardo Villadiego of Cyxtera sees promise in how these technologies can help organizations fight back against fraudsters.

article thumbnail

NIST Updates Cybersecurity Framework

Data Matters

* This article first appeared on Law360 on April 17, 2018. On April 17, the National Institute for Standards and Technology (NIST) released an updated version of its standard-setting Cybersecurity Framework. Commerce Secretary Wilbur Ross announced the new release with a statement saying the “Cybersecurity Framework should be every company’s first line of defense” and “adopting version 1.1 is a must do for all CEO’s.

article thumbnail

The 'New Science' of Cybersecurity

Data Breach Today

NTT Security's Khiro Mishra and Don Gray Discuss a New Approach What is the "new science" of cybersecurity? Khiro Mishra and Don Gray of NTT Security describe the approach.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

MPs agree there is a “long way to go” to bring cyber security up to standard in the NHS

IT Governance

A Public Account Committee (PAC) released its latest report today, reviewing the impact and response to the WannaCry cyber attack targeting healthcare. The attack in May 2017 affected 80 of the 236 NHS Trusts, and 603 NHS organisations overall across England and Wales. The widespread disruption to patients was well-documented in the press. The latest report, which follows the Department of Health and Social Care (DHSC)’s review published in February 2018, found that although NHS bodies were unpr

article thumbnail

A RESTful API Delivers Flexibility for Vormetric Application Encryption

Thales Cloud Protection & Licensing

Security Application Key Management. One of the long standing challenges with security applications that involve data encryption has been key management. Where to get good keys? Where to store keys safely? With Thales eSecurity’s Vormetric Application Encryption (VAE) we’ve solved these problems by providing a PKCS #11 library and a connection to the Vormetric Data Security Manager (DSM), which both creates and stores encryption keys in a FIPS 140-2 compliant system.

article thumbnail

'Trustjacking' Could Expose iPhones to Attack

WIRED Threat Level

Think twice before you tell your iPhone to trust that laptop when you charge it.

IT 89
article thumbnail

Get Ready, Get Set for GDPR

OneHub

With a little more than a month until it takes effect, GDPR are four letters that you’ll be hearing a lot in the coming weeks. If you’re still confused and/or concerned by it, you’re not alone. Dell and Dimension research suggests that 80 percent of businesses know little or nothing about GDPR. So what the heck is it? GDPR stands for the General Data Protection Regulation.

GDPR 53
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The OURSA Security Conference Calls Out Lack of Inclusion

WIRED Threat Level

The OURSA security conference offered a place for diverse voices in security, a counterpoint to the corporate hegemony of RSA.

article thumbnail

iOS Sync Glitch Lets Attackers Control Devices

Threatpost

Researchers found a new iOS vulnerability called “trustjacking,” which exploits a feature called iTunes Wi-Fi Sync to give attackers persistent control over victims' devices.

Privacy 49
article thumbnail

Information Management is Evolving This Year at SharePoint Conference North America!

Gimmal

Join Microsoft, Gimmal, and dozens of speakers this year in Las Vegas, Nevada for SharePoint Conference North America!

58
article thumbnail

Nate Cardozo, Attorney with EFF Talks Encryption at RSA Conference 2018

Threatpost

Threatpost talks to crypto expert Nate Cardozo, senior staff attorney with the Electronic Frontier Foundation at RSA Conference 2018 about the U.S. government’s current position on device encryption and law enforcement's use of iPhone passcode cracker called GreyKey.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Enabling Appropriate User Access in a "Zero Trust" World

Dark Reading

Bill Mann, Chief Product Officer at Centrify, suggests some strategies for securing today's perimeter-less enterprise environments - including stronger enforcement of well-defined policies for user access, integration of security into DevOps processes, and smarter use of ML for anomaly detection.

Access 42
article thumbnail

Gold Galleon Hacking Group Plunders Shipping Industry

Threatpost

Researchers have identified a hacking group behind several widescale maritime shipping industry business email compromise (BEC) attacks since June.

article thumbnail

Keeping the Business Safe Across Hybrid Cloud Environments

Dark Reading

Aggressive cloud adoption increases threat surface and makes it more difficult for infosec teams to keep track of what the business is doing. Donald Meyer, Head of Data Center and Cloud at Check Point Software, explains how infosec teams can more effectively mitigate risk without hampering business agility.

Cloud 42
article thumbnail

PCMag.com Recognizes Desktop Scanners from Kodak Alaris with Editors’ Choice Award

Info Source

ROCHESTER, N.Y., April 18 – PCMag.com has recognized the Alaris S2060w Scanner from Alaris, a Kodak Alaris business with its Editor’s Choice Award, distinguishing the wireless network scanner as best in class. In recognizing the Alaris S2060w, PCMag cited impressive connectivity features, speed and accuracy that outperformed other scanners tested in the same category.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

70% of Energy Firms Worry About Physical Damage from Cyberattacks

Dark Reading

High-profile ICS attacks Triton/Trisis, Industroyer/CrashOverride, and Stuxnet have driven energy firms to invest more in cybersecurity, survey shows.

article thumbnail

Alaris Earns 5-Star Rating in CRN’s Partner Program Guide for Second Consecutive Year

Info Source

ROCHESTER, N.Y., April 18 – Alaris, a Kodak Alaris business announced today that CRN ® , a brand of The Channel Company , has given the Alaris Partner Program a 5-Star rating in its 2018 Partner Program Guide. This annual guide is the definitive listing of partner programs from technology vendors that provide products and services through the IT channel.

article thumbnail

Beating Zero-Payload/Fileless Attacks with Unified EPP/EDR

Dark Reading

To cope with today's fileless endpoint attacks - especially those that aren't precisely similar to previously known exploits - Tomer Weingarten and Nicholas Warner of SentinelOne suggest a unified EPP/EDR approach that includes visibility into the dangers lurking within encrypted network traffic.