Tue.Dec 19, 2017

article thumbnail

Predictions 2018: 5 trends driving the IoT and IIoT

Information Management Resources

Adoption of the Internet of things and the Industrial Internet of Things show no signs of slowing down. If anything, adoption and implementations will only increase.

IoT 141
article thumbnail

HHS Attempts to Clear Up HIPAA Confusion on PHI Release

Data Breach Today

Online Resources Clarify When Patient Info Can Be Shared With Families, Caregivers Federal regulators have set up online resources to help healthcare providers as well as consumers navigate circumstances under which HIPAA permits a covered entity to disclose mental health or substance abuse information to a patient's family members and caregivers.

113
113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Dispelling 3 most common myths about AI and big data

Information Management Resources

The intelligence in AI comes from the humans who train it! All initiatives need smart human assistance to function successfully.

Big data 156
article thumbnail

Kaspersky Lab Sues US Government Over Ban

Data Breach Today

Federal Software Ban Violates Due Process, Anti-Virus Firm Alleges Kaspersky Lab has sued the U.S. Department of Homeland Security for issuing an order that bans the Moscow-based anti-virus firm's software from being used on federal systems, saying DHS violated the company's right to respond to the allegations against it.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

In 'Star Wars: The Last Jedi', the Resistance Keeps Making the Same Tactical Mistake

WIRED Threat Level

The urge to fight one decisive battle has undone countless real-world rebellions—and those in the Star Wars universe as well.

Security 109

More Trending

article thumbnail

Facebook use of third-party apps 'violates data protection principles'

The Guardian Data Protection

German watchdog accuses site of merging data from WhatsApp and Instagram into users’ Facebook accounts without consent Germany’s competition authority has accused Facebook of abusing its dominant market position to improperly amass third-party data on its users. A statement released on Tuesday criticised the world’s largest social media site for collecting data via Facebook-owned services, such as WhatsApp or Instagram, and then absorbing it into users’ Facebook accounts.

article thumbnail

Hold North Korea Accountable for WannaCry—and the NSA, Too

WIRED Threat Level

As the US government points the finger at North Korea for the WannaCry ransomware epidemic, it also needs to acknowledge the role of its leaked hacking tools.

article thumbnail

France orders WhatsApp to stop sharing user data with Facebook without consent

The Guardian Data Protection

Messaging app has one month to comply or it will face sanctions for sharing user phone numbers and usage data for ‘business intelligence’ purposes WhatsApp has been ordered to stop sharing user data with parent company Facebook or face sanctions. The French data protection agency, Commission Nationale de l’Informatique et des Libertés (CNIL), said on Monday that WhatsApp did not have a legal basis to share user data under French law for “business intelligence” purposes.

GDPR 86
article thumbnail

OpenText Business Network – top ten supply chain predictions for 2018

OpenText Information Management

As 2017 sails into the sunset it’s that time of year when analysts around the world release their predictions for the following year. I thought it would be interesting to pull together a set of supply chain related predictions from the OpenText™ Business Network product marketing team. Trying to predict what will happen in 2018 is … The post OpenText Business Network – top ten supply chain predictions for 2018 appeared first on OpenText Blogs.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Established and emerging technologies to watch out for in 2018

Thales Cloud Protection & Licensing

As 2017 draws to a close, the trends and innovations that will shape the technology industry over the coming weeks, months and years were brought into sharper focus over the course of the last twelve months. Cloud computing has gone mainstream for many enterprises, and the Internet of Things (IoT) is changing how both industrial and consumer-oriented companies do business.

article thumbnail

Microsoft Office Docs New Vessel for Loki Malware

Dark Reading

Loki malware, built to steal credentials, is distributed via Microsoft Excel and other Office applications rigged with malicious 'scriptlets' to evade detection.

76
article thumbnail

Ten things impacting the world: impact on society

OpenText Information Management

In January of 2017, the sales of George Orwell’s novel 1984 spiked, climbing to the top of Amazon’s bestseller list (a 9,500 percent increase in sales). Its newfound popularity was based on comparisons made between the dystopian novel and the current widening schism between media and government relations. The book is, in essence, a powerful … The post Ten things impacting the world: impact on society appeared first on OpenText Blogs.

Sales 70
article thumbnail

Massive Cloud Leak Exposes Alteryx, Experian, US Census Bureau Data

Dark Reading

A misconfigured Amazon Web Services S3 storage bucket exposed sensitive data on consumers' financial histories, contact information, and mortgage ownership.

Cloud 66
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Capitec Bank innovates to create real-time client interaction

OpenText Information Management

How can digital technologies help banks gain a competitive advantage in today’s highly competitive financial services sector? Capitec, an award-winning South African bank, has its eye on customer satisfaction, having established a client-centric approach using OpenText technologies to automate client onboarding and banking operations. “When we looked at the market for a company to assist … The post Capitec Bank innovates to create real-time client interaction appeared first on OpenText Blo

article thumbnail

GCHQ Found -- and Disclosed -- a Windows 10 Vulnerability

Schneier on Security

Now this is good news. The UK's National Cyber Security Centre (NCSC) -- part of GCHQ -- found a serious vulnerability in Windows Defender (their anti-virus component). Instead of keeping it secret and all of us vulnerable, it alerted Microsoft. I'd like believe the US does this, too.

article thumbnail

Fixing Data Breaches Part 2: Data Ownership & Minimisation

Troy Hunt

Yesterday, I wrote the first part of this 5-part series on fixing data breaches and I focused on education. It's the absolute best bang for your buck by a massive margin and it pays off over and over again across many years and many projects. Best of all, it's about prevention rather than cure. The next few parts of this series all focus on cures - how do we fix data breaches once bad code has already been written or bad server configurations deployed?

article thumbnail

U.S. Government Blames North Korea for WannaCry

Threatpost

The United States government is officially blaming North Korea for the WannaCry ransomware outbreak in May that infected nearly a quarter-million computers in 150 countries.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

'Starwars' Debuts on List of Worst Passwords of 2017

Dark Reading

Many of the old standbys made this year's list of the 25 stolen - and weakest - passwords found dumped online.

article thumbnail

Project Zero Chains Bugs for ‘aPAColypse Now’ Attack on Windows 10

Threatpost

Google’s Project Zero team dubs a new WPAD-related attack as an “aPAColypse Now” that allows a local attacker to compromise a targeted and fully patched Windows 10 PC.

Privacy 47
article thumbnail

Comprehensive Endpoint Protection Requires the Right Cyber Threat Intelligence

Dark Reading

CTI falls into three main categories -- tactical, operational, and strategic -- and answers questions related to the "who, what, and why" of a cyber attack.

47
article thumbnail

Digital leaders: Driving pace and scale in a dynamic market, part 5 (technology)

CGI

Digital leaders: Driving pace and scale in a dynamic market, part 5 (technology). cgiadmin. Tue, 12/19/2017 - 11:40. One of the biggest challenges to becoming a digital business is transitioning from legacy processes and systems to new ways of adopting and managing modern technologies. The transition is complex, time-intensive and costly. But, it’s essential to driving the agility required to compete in a digital world.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

New Database Botnet Leveraged for Bitcoin Mining

Dark Reading

Attackers are quietly building an attack infrastructure using very sensitive machines.

Mining 47
article thumbnail

GDPR: It’s Christmas – A time of good FEAR!

CGI

GDPR: It’s Christmas – A time of good FEAR! pallavi.m@cgi.com. Tue, 12/19/2017 - 14:18. A day doesn’t go by in the run up to the festive season without yet another warning about the rise of cyber-crime and the lack of awareness amongst the general public of the risks of doing business and running our lives on-line. If we assume that the general public includes US ALL then we have to assume that we are all at risk to some extent in both our personal and professional lives.

GDPR 40
article thumbnail

78 Percent of U.S. Healthcare Providers Were Hit by Email Cyber Attacks in 2017

eSecurity Planet

And 87 percent expect the volume of email threats to increase.

53
article thumbnail

Will the UK’s competitive water market follow the same path as electricity?

CGI

Will the UK’s competitive water market follow the same path as electricity? ravi.kumarv@cgi.com. Tue, 12/19/2017 - 15:03. The UK’s competitive water market is up and running. The market opened, on time, in April 2017 which means that 1.2 million non-household customers can now choose their retailer of water and wastewater services. Getting to this point has required a massive effort from many different parties.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Many IT staff view themselves as top internal data security risk

Information Management Resources

While human resources and finance departments are the easiest target for social engineering, tech workers pose the biggest insternal risk to networks.

Risk 37
article thumbnail

Another Cyberattack Spotted Targeting Mideast Critical Infrastructure Organizations

Dark Reading

Operation Copperfield appears focused on data theft and reconnaissance, Nyotron says.

44
article thumbnail

U.S. blames North Korea for 'cowardly' WannaCry cyberattack

Information Management Resources

The computer virus crippled parts of the U.K.’s state-run National Health Service and compromised companies such as FedEx Corp. and Nissan Motor Co.