Tue.May 22, 2018

article thumbnail

Blockchain for Identity Management: Early Examples

Data Breach Today

Early experiments are demonstrating how blockchain, the distributed and immutable ledger behind virtual currencies, potentially could play an important role in identity management, says Avivah Litan, a Gartner Research analyst.

article thumbnail

ICO statistics show increase in reported incidents ahead of GDPR

IT Governance

The Information Commissioner’s Office’s (ICO) latest statistics on data security incidents have revealed a 17% increase in the number of reported data security incidents in Q4 2017-18. The ICO suspects that the rise may be caused by increased awareness of the General Data Protection Regulation (GDPR) and the launch of its ‘Personal Data Breach helpline’.

GDPR 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Offsite Records Storage’s Benefits

Record Nations

Rather than filing cabinets taking up space in corners, implementing offsite storage with a records management program opens up multiple opportunities to streamline daily workflow and save money during the process. In this video and transcription learn more about what offsite records storage is, how it saves companies money, keeps information protected, and boosts a […].

article thumbnail

Sharing HIPAA Fines With Victims: Will It Ever Happen?

Data Breach Today

HITECH Act Mandated Sharing the Wealth, But Rulemaking Has Stalled Will federal regulators finally tackle long overdue rulemaking related to a HITECH Act provision calling for the Department of Health and Human Services to share money collected from HIPAA settlements and penalties with breach victims?

IT 140
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

See you at the ARMA Canada Conference!

TAB OnRecord

Are you attending the ARMA Canada 2018 Conference in Vancouver next week? If so, please stop by and visit us at booth #25. You can: play our Going Digital Quiz for a chance to win an instant prize get our latest white paper, Lessons from the Front-lines of Digital Transformation learn how TAB’s solutions can [.] Read More. The post See you at the ARMA Canada Conference!

More Trending

article thumbnail

How the LAPD Uses Data to Predict Crime

WIRED Threat Level

The Los Angeles Police Department is using "predictive policing" to prevent crime, but this innovative approach has its problems.

IT 98
article thumbnail

Spectre and Meltdown Flaws: Two More Variants Discovered

Data Breach Today

More CPU Flaws Found in Intel, AMD, ARM and IBM Power Processors Researchers have discovered two new Spectre/Meltdown variants: variant 3a, a rogue system register read, and variant 4, a speculative store bypass. Some AMD, ARM, Intel and IBM Power chips have the flaws, which attackers could exploit to steal sensitive data. Some fixes have already been shipped.

130
130
article thumbnail

5 fundamental questions for your data journey

IBM Big Data Hub

To accelerate its journey to AI, a data-driven organization needs a trusted data foundation that empowers information stakeholders. Stakeholders need the ability to discover, understand, integrate, analyze, govern and self-serve structured and unstructured data — on premises, on cloud, and hybrid — at any scale.

article thumbnail

GDPR: Is Australia Ready?

Data Breach Today

With Europe's GDPR enforcement set to take effect on May 25, Australian organizations vary in readiness. Steve Ingram of PwC says it's not too late for companies to prepare for GDPR, but it will be too late to ask regulators for forgiveness if something goes wrong.

GDPR 100
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Electronic Records Resources Now Available

The Texas Record

TSLAC updated Bulletin 1: Electronic Records Standards and Procedures in 2017, and since then, we’ve been gathering resources to provide guidance to state agencies trying to fulfill the requirements of the bulletin. The bulletin was rewritten to be intentionally higher-level and broad, to allow for more considerations of electronic records in a general sense, instead of referencing specific technologies and nitty gritty details.

article thumbnail

Why your team needs an Agile business analyst

IT Governance

Excerpts of this blog have been extracted from The Power of the Agile Business Analyst, Second edition by Jamie Lynn Cooke, currently available to pre-order from IT Governance. Agile project management demonstrates a dramatically enhanced level of communication and pragmatic collaboration between business users and software developers. Favoured by the Association of Project Management (APM), this methodology equips software developers with practices and tools designed to increase the quality, re

article thumbnail

72-hour rule: Can you identify and report a data breach within 3 days?

IBM Big Data Hub

Rather than worry about your future performance, work to be the best today. The rest will follow. Seize the opportunity to respond to customers in the moment, rather than react too late. That way, everyone benefits.

article thumbnail

Think you can manage without an incident response plan? Think again

IT Governance

The organisations worst hit by cyber attacks often have one thing in common: they lack an effective incident response plan (IRP). Until recently, most people believed that cyber security was all about preventing incidents. But as cyber crime has grown in frequency and sophistication, it’s no longer good enough to rely on your ability to defend against incidents or assume that you won’t be hit.

GDPR 63
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Another Spectre-Like CPU Vulnerability

Schneier on Security

Google and Microsoft researchers have disclosed another Spectre-like CPU side-channel vulnerability, called " Speculative Store Bypass." Like the others, the fix will slow the CPU down. The German tech site Heise reports that more are coming. I'm not surprised. Writing about Spectre and Meltdown in January, I predicted that we'll be seeing a lot more of these sorts of vulnerabilities.

57
article thumbnail

Having trouble complying with the PCI DSS? Here are some tips

IT Governance

Keeping cardholder data secure can be incredibly difficult, but have you tried… not storing so much information? You’d be surprised at how effective that apparently flippant advice is. Organisations often store more information than they need, making security trickier than it should be. Take primary account numbers (PANs). This information is needed far less often than cardholders’ names and card numbers, but organisations habitually collect all three as a matter of course, going to extra measur

article thumbnail

Las Vegas Most Insecure Cyber City in US; St. Louis Least Vulnerable

Dark Reading

Forty-three percent chance of users connecting to high or medium-risk networks in Las Vegas - compared to less than 1% risk in least vulnerable areas, Coronet says.

Risk 55
article thumbnail

Unsure about implementing a BCMS? Here are a few things you should know

IT Governance

Business continuity is more important than ever. Security incidents are so widespread that it’s impossible to tackle them all, and sooner or later disaster will strike. When that time comes, you’ll need a system to mitigate the damage and ensure that mission-critical functions continue to operate. Although most organisations are starting to recognise the importance of such measures, some remain apprehensive about implementing a business continuity management system (BCMS).

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Intel Responds to Spectre-Like Flaw In CPUs

Threatpost

Intel on Monday acknowledged that its processors are vulnerable to another Spectre-like speculative execution side channel flaw that could allow attackers to access information.

Access 48
article thumbnail

GDPR 101: Keeping Data Safe Throughout the 'Supply Chain'

Dark Reading

There are a lot of moving pieces involved with data collection, retention, and processing in the EU's new General Data Protection Regulation. Here's how to break down responsibilities between your security team and service providers.

GDPR 48
article thumbnail

Irish Data Protection Bill in Final Committee Stage Before the Irish Legislature

Hunton Privacy

On May 16, 2018, the Irish Data Protection Bill 2018 (the “Bill”) entered the final committee stage in Dáil Éireann (the lower house and principal chamber of the Irish legislature). The Bill was passed by the Seanad (the upper house of the legislature) at the end of March 2018. In the current stage, final statements on the Bill will be made before it is signed into law by the President.

GDPR 48
article thumbnail

The State of Information Sharing: 20 Years after the First White House Mandate

Dark Reading

Finally! Actionable guidance for ISACs and enterprises on what threat intel to share, how to share it, and which key technologies will automate redaction and protect privacy.

Privacy 43
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Payments in 2018: A look back and ahead

CGI

Payments in 2018: A look back and ahead. premanath.puch…. Tue, 05/22/2018 - 03:19. Looking back at 2017, it was all about real-time payments, with the global move toward instant payments gaining momentum. In Europe, SEPA instant credits went live, and the European Payments Council announced that nearly 600 payment service providers from 8 countries are now signed up to offer SEPA instant credits.

article thumbnail

US Senator to DOD CIO: 'Take Immediate Action' on HTTPS

Dark Reading

US Senator Ron Wyden pens a letter to the Department of Defense CIO, urging stronger security on public-facing government sites.

article thumbnail

Handling an Office Data Breach

Armstrong Archives

Whether you have most of your data stored digitally or you maintain paper files, a data breach can always occur. As much as you might try to safeguard your information, it could still occur, and it’s important to know what will happen if it does. If you find that you’ve been hacked or if someone broke into your paper archives, there are several steps you should take to manage the situation.

article thumbnail

Document Centric AI Platform Now Available on Cloud

Info Source

Last year, as part of our AIIM Conference coverage, we ran a story on Moonoia , a Belgium service bureau that had developed its own capture software, including handprint and handwriting recognition [see DIR 3/24/17 ]. Those recognition capabilities, which were developed using artificial intelligence and deep neural networks, were packaged under the docBrain label and brought to market as an on-premises application.

Cloud 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Straight Talks Podcast: Data Privacy and Cybersecurity in the Age of Rolling Smart Devices

HL Chronicle of Data Protection

The U.S. Environmental Protection Agency was created in 1970 to safeguard the environment against pollutants. The tidal wave of environmental regulations that followed impacted every industry in the United States, especially the automotive market. Decades later, organizations have internalized these regulations into their culture. Today, the European Union’s General Data Protection Regulation (GDPR) is driving a regulatory wave of similar scope, but now the need is to safeguard data against cybe

article thumbnail

OCR proposes to share HIPAA data breach settlements with victims

Data Protection Report

The U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) plans to issue an advance notice of proposed rulemaking this November on potentially sharing HIPAA breach settlements with victims. The notice would solicit public opinion on creating a process for sharing a percentage of any penalty or settlement with those harmed by an offense punishable under HIPAA.

article thumbnail

Pet Tracker Flaws Expose Pets and Their Owners to Cybercrime

Dark Reading

Hackers can exploit vulnerabilities in popular pet trackers to intercept location coordinates and access owners' personal data.