Mon.Jan 08, 2018

article thumbnail

Warning: Microsoft Fix Freezes Some PCs With AMD Chips

Data Breach Today

Meltdown and Spectre Security Update Bricks Some PCs With Athlon CPUs Security teams are scrambling to put in place fixes for the Meltdown and Spectre flaws. But Windows users report that Microsoft's security fix for the flaws has been freezing some PCs built with CPUs from chipmaker AMD. Here are workarounds.

Security 154
article thumbnail

Speaking of: Blockchain (with Alan Pelz-Sharpe)

Weissman's World

If a picture is worth 1000 words, then what’s a 15-minute video worth? Tons, especially when the subject is blockchain, and the guest expert is Alan Pelz-Sharpe! Join our discussion of the disruptive force blockchain will prove to be in records and information governance. The post Speaking of: Blockchain (with Alan Pelz-Sharpe) appeared first on Holly Group.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Phishing Exposed Medicaid Details for 30,000 Floridians

Data Breach Today

No Misuse of Exposed Data Has Been Reported - Yet Personal details for 30,000 Medicaid recipients in Florida may have been exposed after a government employee fell victim to a phishing attack, state officials warn. The information could potentially be used to file false Medicaid claims.

Phishing 145
article thumbnail

Gina Smith-Guidi AIIM18 Speaker Interview

AIIM

Name Gina Smith-Guidi. Email gina.guidi@edmonton.ca. Job Title Principal Information Manager. Company City of Edmonton. Please provide one or two points that you will mention during your session. - Implement solutions that work behind the scenes and do not change the way people work - Approach challenges with a flexible, unconventional mindset. Where do you see the information management industry in 5 years?

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

CMS: Placing Orders Via Text Not Allowed

Data Breach Today

Security Experts Weigh In on Appropriate Uses of Secure Texting Federal regulators have clarified that the use of texting to place orders, such as for medications or tests, on any platform - secure or not - is not allowed when treating Medicare and Medicaid patients. Security experts weigh in on key issues to consider when using texting for other purposes.

CMS 124

More Trending

article thumbnail

Pop-Up Mobile Ads Surge as Sites Scramble to Stop Them

WIRED Threat Level

Until ad networks vet what comes through more closely, those redirect ads aren't going anywhere.

article thumbnail

Wi-Fi Alliance Launches WPA2 Enhancements and Debuts WPA3

Dark Reading

WPA2 protocol enhancements bring stronger security protection and best practices, while new WPA3 protocol offers new security capabilities.

article thumbnail

Publishing isn’t just for Publishers

OpenText Information Management

Who is the largest publisher in the United States? McGraw-Hill? Time-Warner? Simon & Schuster? It’s not any of the names that you associated with traditional publishing. The largest publisher in the US is the Department of Defense, closely followed by Boeing. It’s an oft-stated truism that these days, with the rise of digital media and … The post Publishing isn’t just for Publishers appeared first on OpenText Blogs.

article thumbnail

Understanding PCI compliance auditing

IT Governance

Businesses of all sizes must undergo Payment Card Industry Data Security Standard (PCI DSS) compliance audits to ensure that their customers’ data is protected during credit or debit card transactions and while stored. Under the Standard, level 1 businesses – those that process more than six million credit card transactions a year – are subject to an annual on-site audit and quarterly network scans performed by an approved vendor.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

VTech to Pay $650,000 in FTC Settlement

Dark Reading

VTech's Kid Connect app and its Planet VTech platform collected personal information on 760,000 children without parental permission, the FTC alleges.

IT 64
article thumbnail

Opening of 2017 Reporting Period

National Archives Records Express

Today, we opened the 2017 records management reporting period. Agencies will have until March 16, 2018 to submit the following three reports: Records Management Self-Assessment (RMSA): The annual RMSA asks questions that assess compliance with records management statutes and regulations as well as NARA policies and guidance. The survey link was sent today via email to Agency Records Officers and those designated to respond to the RMSA.

article thumbnail

Developing a Records Management Program: The People Part

The Schedule

Hello Readers: My name is Elizabeth and I’m the Archivist for Records Management at the Bentley Historical Library for the University of Michigan. In my role, I am responsible for the development of a records management program that will fit – and ultimately benefit – the University. While the program builds upon the work of past Bentley archivists responsible for the development of university collections, what we really seek to bring is a collaborative approach to University-wide re

article thumbnail

Emailed Cyberattack Targets 2018 Pyeongchang Olympics

Dark Reading

More than 300 organizations associated with the 2018 Olympics have been hit with a targeted email campaign.

67
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

[Video] 2017 Records Retention: Requirements and Guidelines

Record Nations

Video Transcription Why Track Retention? Proper record keeping and retention is important for monitoring business progress, preparing financial statements, identifying income sources, and tracking your expenses. There are a number of record management laws that set specific retention periods for different information including HIPAA, OSHA, and the ADA, and noncompliance with their regulations can […].

article thumbnail

US Gov Outlines Steps to Fight Botnets, Automated Threats

Dark Reading

The US Departments of Commerce and Homeland Security identify the challenges of, and potential actions against, automated cyberattacks.

article thumbnail

How organizations will use intelligent data capture in 2018

Information Management Resources

Systems extract key details from documents and then perform actions based on the contents. In most cases the technology becomes smarter with use, and firms can capitalize on that.

51
article thumbnail

Vulnerability Management: The Most Important Security Issue the CISO Doesn't Own

Dark Reading

Information security and IT need to team up to make patch management more efficient and effective. Here's how and why.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New Rules Announced for Border Inspection of Electronic Devices

Threatpost

The U.S. Customs and Border Patrol announced new restrictions on when agents can copy data from digital devices at border crossing points.

article thumbnail

Cyxtera Technologies to Acquire Immunity

Dark Reading

Deal will bring penetration testing products and services to Cyxtera's threat analytics portfolio.

article thumbnail

Reflections on 5 business-changing IT-related trends in 2017

CGI

Reflections on 5 business-changing IT-related trends in 2017. cgiadmin. Mon, 01/08/2018 - 03:35. As 2017 has come to an end, we can reflect on how technology continues to change our lives exponentially. Personally, my life has pivoted a lot this year due to technology. It provided me with a virtual assistant, let me dabble in “alternate” currencies, and of course, on a cold rainy night, let me know what the crowds thought I should binge watch.

article thumbnail

Meltdown, Spectre Likely Just Scratch the Surface of Microprocessor Vulnerabilities

Dark Reading

There's a lot at stake when it comes to patching the hardware flaws.

IT 67
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

FTC Settles First Children’s Privacy Case Involving Connected Toys

Hunton Privacy

On January 8, 2018, the FTC announced an agreement with electronic toy manufacturer, VTech Electronics Limited and its U.S. subsidiary, settling charges that VTech violated the Children’s Online Privacy Protection Act (“COPPA”) by collecting personal information from hundreds of thousands of children without providing direct notice or obtaining their parent’s consent, and failing to take reasonable steps to secure the data it collected.

Privacy 40
article thumbnail

You Know It’s Time to Go Paperless When….

Archive Document Data Storage

While it’s hard to imagine a business without paper, in the digital age, paper’s hold on the office is dwindling. Organisations that make the switch to digital files save time and money and reap a host of additional benefits. Here’s a list to help you decide if going paperless is the right move for your company: Customer Complaints Are Rising.

Paper 40
article thumbnail

2018 will be the year of AI and the intelligent enterprise

Information Management Resources

Leading organizations will leverage agile development to build apps in the cloud, automate processes and menial tasks to optimize efficiency, and explore data lakes for sophisticated insights and better decision making.

Cloud 45
article thumbnail

2017 eDiscovery Case Law Year in Review, Part 2

eDiscovery Daily

As we noted yesterday , eDiscovery Daily published 78 posts related to eDiscovery case decisions and activities over the past year, covering 62 unique cases ! Yesterday, we looked back at cases related to admissibility, proportionality and cooperation as well as a couple of cases related to eDiscovery cost and legal fee reimbursement. Today, let’s take a look back at cases related to discovery about discovery, technology assisted review, form of production disputes, objections to production re

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Apple Releases Spectre Patches for Safari, macOS and iOS

Threatpost

Apple releases patches addressing the Spectre vulnerability impacting its macOS, iPhone, iPad and iPod touch.

IT 48
article thumbnail

Ransomware threats boosting awareness, but not cyber security careers

Information Management Resources

'WannaCry and NotPetya are generally believed to have marked a turning point in cyber-awareness, but the reality on the ground paints a different picture,' says security advocate Javvad Malik.

article thumbnail

Tourist Scams

Schneier on Security

A comprehensive list. Most are old and obvious, but there are some clever variants.

51