Mon.Feb 05, 2018

article thumbnail

Blockchain for Identity: 6 Hot Projects

Data Breach Today

Distributed Ledgers For Identity and Access Management Have Great Promise Blockchain technology already underpins the boom in cryptocurrencies, but is also being rigorously tested and developed for other applications, including identity and access management. Such projects could make personal data easier to secure and less vulnerable to data breaches.

article thumbnail

New UK data protection rules are a cynical attack on immigrants | Claude Moraes

The Guardian Data Protection

Non-nationals subject to an immigration procedure are to lose the right to access data held about them, in a discriminatory move that worries the European parliament In September, I warned in a Guardian opinion article that the Brexit process could have the effect of allowing the UK government to bring in more draconian and discriminatory immigration laws, harking back to the 70s and 80s.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Accused Russian Botnet Mastermind Extradited to US

Data Breach Today

Peter Levashov Allegedly Distributed Spam, Ransomware via Kelihos Botnet Russian citizen Peter Levashov, arrested last year while vacationing in Spain, appeared Friday in U.S. federal court to face charges that he owned and operated the Kelihos botnet and distributed spam, banking Trojans and ransomware for profit. Levashov has pleaded not guilty.

article thumbnail

Mastering Security in the Zettabyte Era

Dark Reading

Many businesses are ill-equipped to deal with potential risks posed by billions of connected devices, exponential data growth, and an unprecedented number of cyber threats. Here's how to prepare.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Managing 'Shadow IT' Risks in Healthcare Settings

Data Breach Today

VA OIG Report Spotlights Some of the Challenges A new report from a Veterans Affairs watchdog agency on a guest Wi-Fi network that was set up at a VA medical center without coordination with VA IT officials to ensure security spotlights the risks and challenges that many healthcare entities face with so called "shadow IT.

Risk 124

More Trending

article thumbnail

Fitness Dystopia in the Age of Self-Surveillance

Data Breach Today

Big Brother, Meet Wearable Fitness Devices Orwell got it wrong: People are less likely to surrender their privacy to a totalitarian state than to the lure of sharing holiday snaps, cat videos or the route and time they took for their latest cycling, jogging or kiteboarding outing, as captured by a wearable fitness device.

Privacy 111
article thumbnail

The top trends for manufacturing in 2018

OpenText Information Management

We’re now quite well into 2018 but I thought it was still worth putting together a blog on the trends I see affecting manufacturing over the coming year. I’ve chosen two legislative changes and three technology-driven trends. Taken together, I think they add up to great opportunities for manufacturers but an increasingly challenging business environment … The post The top trends for manufacturing in 2018 appeared first on OpenText Blogs.

article thumbnail

British Hacking Suspect Avoids Extradiction

Data Breach Today

Lauri Love Wins Appeal, But Faces Prosecution in England Lauri Love, a British man accused of 2012 and 2013 hack attacks against U.S. government computers - including systems operated by the Federal Reserve, U.S. Army and NASA - has won his legal bid to quash a U.S. extradition request. But he still faces a potential trial in England.

article thumbnail

GDPR – Six key stages of the data protection impact assessment (DPIA)

IT Governance

The DPIA is one of the specific processes mandated by the General Data Protection Regulation (GDPR). Organisations must carry out a DPIA where a planned or existing processing operation –“is likely to result in a high risk to the rights and freedoms of individuals”. DPIAs are particularly relevant to taking a privacy-by-design approach when introducing a new data processing system or technology.

GDPR 75
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Are critical business insights hiding inside your unstructured data?

IBM Big Data Hub

The search function is a very powerful tool, assuming you have concrete keywords or concepts to find in your data. And that does not even take into account the size of the information you might be searching.

article thumbnail

First look at the new DSP Toolkit shows additional requirements for healthcare organisations.

IT Governance

The Information Governance (IG) Toolkit is being replaced with the Data Security and Protection (DSP) Toolkit from April 2018, giving healthcare organisations until 31 March 2019 to comply with the new, more comprehensive guidelines. NHS Digital has released the draft assertions that will form the DSP Toolkit and is hosting a series of webinars aimed at demonstrating the new system.

article thumbnail

HIMSS18: Where are you on the path to digital maturity for patient information exchange?

OpenText Information Management

If you’re like most health systems, fax continues to dominate how you exchange patient information. Inefficient forms of patient information exchange, including paper-based fax, have persisted in healthcare for a number of reasons and present many challenges for healthcare organizations. Limits connectivity with no real-time exchange at the point of care.

Paper 69
article thumbnail

What documentation do I need to achieve cyber resilience?

IT Governance

Organisations have a harder time than ever staying cyber secure. Cyber criminals are constantly looking for new ways to launch attacks, so even the most vigilant organisation can get caught out. After all, it only takes one vulnerability for an attack to be successful. To best prepare for cyber incidents, organisations need to accept that they will probably be breached at some point.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

CIPL Submits Comments to Article 29 WP’s Updated BCR Working Documents

Hunton Privacy

On January 18, 2018, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP submitted formal comments to the Article 29 Working Party (the “Working Party”) on its updated Working Documents, which include a table with the elements and principles found in Binding Corporate Rules (“BCRs”) and Processor Binding Corporate Rules (the “Working Documents”).

GDPR 49
article thumbnail

Weekly discussion podcast: Critical Information Infrastructure, Part 2

IT Governance

This week’s extract is taken from Toomas Viira’s book Lessons Learned – Critical Information Infrastructure Protection , which is a vital source of information and thought-provoking insights into potential issues within critical information infrastructure (CII). Episode 2 – Critical Infrastructure: “It is important for people to be in contact with their loved ones, but 30 years ago we managed just fine without mobile phones.

article thumbnail

HHS Announces $3.5 Million Settlement with Fresenius Medical Care

Hunton Privacy

On February 1, 2018, the Department of Health and Human Services’ Office for Civil Rights (“OCR”) announced a settlement with dialysis clinic operator, Fresenius Medical Care (“Fresenius”). Fresenius will pay OCR $3.5 million to settle claims brought under Health Insurance Portability and Accountability Act rules, alleging that lax security practices led to five breaches of electronic protected health information.

article thumbnail

Covert Data Channel in TLS Dodges Network Perimeter Protection

Threatpost

Researchers have found a new covert data exchange technique that abuses the TLS protocol that can circumvent traditional network perimeter protections.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Ready for GDPR? Here’s a Webcast that Can Help You Get Ready: eDiscovery Best Practices

eDiscovery Daily

If you think that your organization isn’t subject to the requirements of Europe’s impending General Data Protection Regulation (GDPR), you may be wrong about that. If it is, are you on target to be compliant by May 25? Here’s a chance to find out what you need to know to be compliant. On Wednesday, February 21 at noon CST (1:00pm EST, 10:00am PST), CloudNine will conduct the webcast eDiscovery and the GDPR: Ready or Not, Here it Comes!

GDPR 48
article thumbnail

The Digital Helix: Transforming Your Organization’s DNA To Thrive In The Digital Age (A Book Review)

Information is Currency

In late 2017 the AIIM On Air podcast recorded an episode where they interviewed Michael Gale on his new book, “The Digital Helix: Transforming Your Organization’s DNA to Thrive In The Digital Age,” which you can listen to here. I recently read the book and thoroughly enjoyed it. Below is my review for those interested in checking out the book… The Digital Helix: Transforming Your Organization’s DNA To Thrive In The Digital Age by Michael Gale and Chris Aarons is about d

article thumbnail

China issues Personal Information Security Specification

Data Protection Report

On 29 December 2017 the Standardization Administration of China issued an Information Security Technology – Personal Information Security Specification ?GB/T 35273-2017?(the “Specification”), which will come into effect on 1 May 2018. Although the Specification is not a mandatory regulation, it nonetheless has a key implementing role in relation to China’s Cyber Security Law (“Cyber Security Law”) in respect of protecting personal information in China.

article thumbnail

7 Ways to Maximize Your Security Dollars

Dark Reading

Budget and resource constraints can make it hard for you to meet security requirements, but there are ways you can stretch your budget.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Will AI make data analytics jobs obsolete?

Information Management Resources

If developers create an algorithm that can process vast volumes of data, present it in an easily recognizable form, and even draw basic conclusions from it, it could threaten many job positions.

article thumbnail

Two Suspects Arrested in 'Jackpotting' Attack in Connecticut

Dark Reading

The men were charged in federal court for alleged bank fraud using malware that empties cash from ATM machines.

51
article thumbnail

New Monero Crypto Mining Botnet Leverages Android Debugging Tool

Threatpost

The botnet uses port scanning code from Mirai, a first for Android-related attacks, according to researchers.

Mining 45
article thumbnail

Abusing X.509 Digital Certificates for Covert Data Exchange

Dark Reading

Newly discovered hack would allow attackers to send data between two systems during TLS negotiation, researchers say.

48
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Grammarly Patches Chrome Extension Bug That Exposed Users’ Docs

Threatpost

The grammar-checking web service fixed the problem with "impressive" speed, a Google researcher says.

Privacy 47
article thumbnail

Over 12,000 Business Websites Leveraged for Cybercrime

Dark Reading

Attackers exploit trust in popular websites to launch phishing campaigns and spread malware.

article thumbnail

U.S. digital infrastructure is crumbling

Information Management Resources

The strands of fiber, routers, servers and seemingly endless lines of code that compose our digital highways and hubs are quickly becoming the backbone of U.S. infrastructure -- and it too is deteriorating.

IT 31