Tue.May 29, 2018

article thumbnail

5 keys to innovating without sacrificing privacy, security or compliance

Information Management Resources

How do you create an environment to support rapid innovation while protecting the company from its own excesses? Consider these five steps to moving fast without breaking things.

article thumbnail

What is Electronic Data Interchange (EDI)?

OpenText Information Management

As a concept, EDI (Electronic Data Interchange) isn’t a new one. In fact, it can be traced all the way back to the Berlin Airlift in 1948. Put simply, EDI systems automate and simplify the process of exchanging key business documents – such as invoices, purchase orders and shipping notices – principally with partners, suppliers … The post What is Electronic Data Interchange (EDI)?

IT 45
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cleansing Your Content: What a Novel Idea

Gimmal

Below is our second in a series of blog posts written by Carla Mulley, Vice President of Marketing at Concept Searching. Concept Searching and Gimmal are working together to offer more intelligent records management capabilities to organizations of all sizes.

article thumbnail

GDPR Enforcement Deadline: If You Blew It, What's Next?

Data Breach Today

What happens if organizations that must comply with GDPR have yet to achieve compliance, despite having had two years to do so before enforcement began? Don't panic, says cybersecurity expert Brian Honan, but do be pursuing a data privacy transparency and accountability action plan.

GDPR 145
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

List of data breaches and cyber attacks in May 2018 – 17,273,571 records leaked

IT Governance

Remember when I said last month that “with the GDPR less than a month away I imagine future lists will be even longer thanks to the introduction of mandatory data breach notifications”? Well, May’s list of incidents is very long, and the GDPR only came into effect at the end of the month. If I were a cynic I might think that some breached organisations were seeking to keep their exposure to regulatory fines to a minimum by rushing to report historic incidents before the GDPR – and its enhanced p

More Trending

article thumbnail

Why your cloud strategy shouldn’t be a one-stop shop

IBM Big Data Hub

Purchasing options outside of the office are diverse and varied depending on what people want to buy, where and when they buy it, and what they need it for. While shoppers might have personal preferences, they don't limit ourselves to one retailer for all purchasing decisions. So why do that in a work environment?

Retail 81
article thumbnail

Unusual Breach Report by Humana Shines Light on Fraud Prevention

Data Breach Today

Use of Analytics Apparently Helped to Prevent Fraud, Warn Victims An unusual breach notification issued by health insurer Humana shows how some organizations are identifying anomalous behaviors of voice technology users to detect potential fraud.

Insurance 124
article thumbnail

Over 5K Gas Station Tank Gauges Sit Exposed on the Public Net

Dark Reading

One gas station failed its PCI compliance test due to security holes in its automated gas tank gauge configuration, researcher says.

article thumbnail

Spurred by GDPR, Australian Businesses Catch Up on Privacy

Data Breach Today

Casual View of Privacy in Australia Is Changing, Says Symantec's Brian Fletcher The European Union's new data protection enforcement is prompting a rethink about data handling in Australia, which has had a casual approach to privacy, says Brian Fletcher, Symantec's director of government affairs in Asia Pacific.

Privacy 100
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Mapping the threat: an insight into data breaches across Europe

Thales Cloud Protection & Licensing

According to Thales eSecurity’s latest Data Threat Report, European Edition , almost three in four businesses have now fallen victim to some of the world’s most significant data breaches, resulting in a loss of sensitive data and diminished customer trust. It’s no surprise feelings of vulnerability are high, with just 8 per cent of businesses not feeling at risk.

article thumbnail

GDPR Enforcement Deadline: If You Blew It, What Next?

Data Breach Today

What happens if organizations that must comply with GDPR have yet to achieve compliance, despite having had two years to do so before enforcement begins? Don't panic, says cybersecurity expert Brian Honan, but do be pursuing a data privacy transparency and accountability action plan.

GDPR 100
article thumbnail

Bosses may be forced to pay ÂŁ500,000 fines for nuisance calls

The Guardian Data Protection

Directors could face financial penalty on top of fine directly imposed on company Business directors could be personally fined up to £500,000 if they fail to prevent nuisance calls, under a government consultation on the issue. While there has been a big recent increase in the fines issued to companies – last year one was fined £400,000 for making almost 100m automated calls in 18 months – there is concern this has not been a sufficient deterrent.

article thumbnail

IBM bans staff using removable storage devices

IT Governance

Staff at IBM have been banned from using removable storage devices, including USB sticks. Shamla Naidoo, IBM’s global chief information security officer, has said that the company “is expanding the practice of prohibiting data transfer to all removable portable storage devices (e.g. USB, SD card, flash drive).”. The rule has been put in place due to the “financial and reputational” damage they fear could occur if an employee was to lose or misuse the data.

Risk 65
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Next Enterprise Platform

IBM Big Data Hub

Platforms drive commerce. Whether in technology or other industries, the creation, acceptance and adoption of platforms spur innovation, efficiency, and productivity. Consider the U.S. Interstate Highway System, which dates back to the 1950’s, when a few companies and industry groups first began to influence transportation policy. More than 50 years and $425 billion in investment later, the resulting 48,000-mile interstate highway system connects the country like never before.

59
article thumbnail

What goes in an incident response plan?

IT Governance

If you’ve been reading our blog recently, you’ll know that incident response plans (IRPs) are crucial for mitigating the damage of security incidents. But how exactly do they achieve this? The answer is in what IRPs contain: an effective plan will help organisations identify potential incidents and guide them through each step of the process, from how to anticipate an incident to the full recovery of business operations.

article thumbnail

Alexa Mishap Hints at Potential Enterprise Security Risk

Dark Reading

When Alexa mailed a copy of a couple's conversation to a contact, it raised warning flags for security professionals in organizations.

Risk 66
article thumbnail

How to start implementing artificial intelligence

Information Management Resources

A bottoms-up, grassroots approach can kick-start the use of advanced technology by gaining experience with proof-of-concept pilots.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to Empower Today's 'cISOs'

Dark Reading

Although many security leaders have a C in their title, not all are true capital-C "Chiefs." Here are three ways to live up to the job description.

article thumbnail

Kidnapping Fraud

Schneier on Security

Fake kidnapping fraud : "Most commonly we have unsolicited calls to potential victims in Australia, purporting to represent the people in authority in China and suggesting to intending victims here they have been involved in some sort of offence in China or elsewhere, for which they're being held responsible," Commander McLean said. The scammers threaten the students with deportation from Australia or some kind of criminal punishment.

45
article thumbnail

6 Ways Third Parties Can Trip Up Your Security

Dark Reading

Poor access control, inadequate patch management, and non-existent DR practices are just some of the ways a third party can cause problems

article thumbnail

Brazilian Banking Trojan Communicates Via Microsoft SQL Server

Threatpost

Researchers have discovered a banking trojan making waves in Brazil with an array of tricks up its sleeve, including using an unusual command and control (C&C) server.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

FBI Warns Users to Reboot All SOHO Routers

Dark Reading

Everyone with a home router should reboot their systems as a precaution in the wake of the recently discovered VPNFilter attack infrastructure.

55
article thumbnail

SEVered Attack Extracts the Memory of AMD-Encrypted VMs

Threatpost

Virtual machines that use AMD’s hardware-based encryption scheme are vulnerable to attacks that can extract the full contents of their main memory – in plaintext.

article thumbnail

New Threats, Old Threats: Everywhere a Threat

Dark Reading

First-quarter data shows cryptojacking on the rise -- but don't count out some "classic" threats just yet.

56
article thumbnail

3 trends in behavioral science that could boost tax compliance

CGI

3 trends in behavioral science that could boost tax compliance. Now that this year’s tax-filing season has come to an end, it occurs to me that for all the efforts to simplify this process, the ecosystem that supports a tax system must continually adapt to the changing elements in its environment. Whether it is the continual effort to simplify processes or the need to update the numerous forms that are impacted by changing regulations, the goal is to effectively collect taxes in a way that is fa

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

FTC Approves Settlement with PayPal Regarding Alleged Venmo Privacy Misrepresentations

Hunton Privacy

On May 24, 2018, the Federal Trade Commission granted final approval to a settlement (the “Final Settlement”) with PayPal, Inc., to resolve charges that PayPal’s peer-to-peer payment service, Venmo, misled consumers regarding certain restrictions on the use of its service, as well as the privacy of transactions. The proposed settlement was announced on February 27, 2018.

Privacy 40
article thumbnail

3 trends in behavioral science that could boost tax compliance

CGI

3 trends in behavioral science that could boost tax compliance. pooja.cs@cgi.com. Tue, 05/29/2018 - 08:00. Now that this year’s tax-filing season has come to an end, it occurs to me that for all the efforts to simplify this process, the ecosystem that supports a tax system must continually adapt to the changing elements in its environment. Whether it is the continual effort to simplify processes or the need to update the numerous forms that are impacted by changing regulations, the goal is to ef

article thumbnail

3 reasons for increased user and development team productivity

OpenText Information Management

Users appreciate the ability to use highly responsive workplace applications. Frequent work interruptions and customer calls require always responsive IT systems to quickly lookup customer or team data, without waiting for applications to become responsive. OpenText™ Gupta Team Developer (TD) 7.1 introduces the ability to create multi-threaded desktop applications that remain responsive when long running … The post 3 reasons for increased user and development team productivity appeared fir

IT 40