Tue.Jul 03, 2018

article thumbnail

Facial Recognition: Big Trouble With Big Data Biometrics

Data Breach Today

History Has Proven That Data Often Gets Lost, Stolen, Misused Numerous technology firms now offer facial biometrics recognition search tools for big data sets. But information security expert Alan Woodward warns that these big data sets must be "considered and regulated very heavily" or else we'll be "living in 1984 without knowing it.

Big data 127
article thumbnail

Cookie Consent Is the New Panic

HL Chronicle of Data Protection

Judging by the number of calls and the intensity of the discussions about how to comply with the cookie consent requirement in a post-GDPR world, this issue has become a top worry for organisations and data protection officers. Partly due to the visibility of the mechanisms used to collect this consent, and partly due to the potential implications of operating a website without cookies, the dilemma around what solution to deploy has become a serious business decision.

GDPR 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

If you thought GDPR was bad – Just wait for ePrivacy Regulation

Information Management Resources

Regulators developed ePR because the volume and complexity of digital data are increasing exponentially and the environment for generating, storing and consuming it can be quite different from more traditional formats.

GDPR 57
article thumbnail

The Need to Look Beyond Endpoint Security

Data Breach Today

Kaspersky's Bhayani on Evolving to Predictive Analytics and Response With endpoint security, the fundamental concept was always to detect and prevent. Mature security strategies today are increasingly looking at response and remediation as well to complete the cycle, says Shrenik Bhayani of Kaspersky Lab.

Security 198
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

[Podcast] What can certification do for my career? A Look at the CIP Program

AIIM

Digital disruption calls for digital leaders with the skills and experience to optimize information assets and transform business. The AIIM Certified Information Professional (CIP) designation has come to represent a badge of competency and knowledge for those entrusted with the task of building an information strategy. But, what do our CIPs say about the certification?

Libraries 133

More Trending

article thumbnail

Ransomware vs. Cryptojacking

Dark Reading

Cybercriminals are increasingly turning to cryptojacking over ransomware for a bigger payday. Here's what enterprises need to know in order to protect their digital assets and bank accounts.

article thumbnail

Digital Transformation: Start With Security, or Else

Data Breach Today

Fortinet's Patrick Grillo Talks Cloud Security Essentials for Digital Innovation Businesses undertaking digital transformation - typically involving a push to the cloud, amongst other initiatives - must put security first if they want their project to achieve optimum success, says Fortinet's Patrick Grillo.

article thumbnail

30% of UK companies have sacked an employee for data breach negligence

IT Governance

Shred-it’s 2018 State of the Industry Report has revealed that 30% of UK companies that suffered a data breach terminated an employee’s contract for related negligence. . 1,000 small business owners, 1,000 C-suite executives of large organisations and 1,100 consumers/employees took part in the research, which also revealed that: . 88% of C-suites and 49% of small businesses believe that employee negligence is one of the biggest information security risks to their organisation; . 55% of larg

article thumbnail

Typeform Breach: Unencrypted Backup Pilfered

Data Breach Today

Exposed Personal Data Comes From Completed Survey Responses Companies are sending notification emails about a data breach at Typeform, a software-as-a-service platform for distributing and managing surveys, questionnaires and competitions. The breach is so far known to affect Travelodge, Fortnum & Mason, Monzo bank and the Tasmanian Electoral Commission.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

SCOTUS and Congress Leave the Right to Privacy Up for Grabs

WIRED Threat Level

As the push for more digital privacy grows, the question is whether the courts or lawmakers will step up to protect our rights—or if it will fall through the cracks.

Privacy 73
article thumbnail

Working With MSSPs: Big Business and Security Upsides

Data Breach Today

AlienVault's Mike LaPeters Talks Skill Shortages, Better Incident Response The difficulty in hiring new information security personnel and need to combat the ever-rising number of threats is driving many organizations to seek increased incident response automation, and in many cases to get it by working with managed security service providers, says AlienVault's Mike LaPeters.

Security 100
article thumbnail

Security Should Never Be on Holiday

Thales Cloud Protection & Licensing

For many organizations, July and August are synonymous with holidays. And, while we all want to disconnect, no one does this completely given how connected we all are. Some successfully disconnect from work, but if they check the news on their phone, call an Uber, watch Netflix on an iPad or sign up for a yoga class via an app, they are still very much connected.

article thumbnail

Cloud Security Essential: Make Penetration Testing Constant

Data Breach Today

Outpost24's Bob Egner Talks Application Security, Agile Development, SecDevOps As organizations move more data into the cloud, too many are treating security as an afterthought, says Outpost24's Bob Egner. Instead, as part of an agile development program, he recommends making penetration testing a constant, and using solid DevSecOps to maintain optimal cloud data security.

Cloud 100
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How the Pentagon Keeps Its App Store Secure

WIRED Threat Level

To keep malware at bay, the GEOINT App Store has created a screening process that no commercial platform could ever match.

IT 78
article thumbnail

Cryptocurrency Laundering's Explosive Growth

Data Breach Today

Cryptocurrency money laundering is increasing dramatically, being already three times greater than in 2017. And we're only half way through the year, observes Dave Jevans, Founder and CEO of CipherTrace, and chairman of the Anti-Phishing Working Group.

Phishing 100
article thumbnail

Where To Invest Your Cybersecurity Budget

eSecurity Planet

VIDEO: Tom Parker of Accenture Security discusses how organizations should budget for cybersecurity - and make the most of what they already have.

article thumbnail

California's New Privacy Law Gives GDPR-Compliant Orgs Little to Fear

Dark Reading

Others should boost their security controls to get in sync with AB 375. or get ready to be sued hundreds of dollars for each personal record exposed in a breach.

GDPR 59
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Bring your own identity (BYOI)

OpenText Information Management

In March, Grand View Research suggested that the Identity and Access Management (IAM) market will be worth over $24 billion by 2020. This healthy growth will be achieved in part, the research firm says, through the increasing popularity of bring-your-own-identity (BYOI). BYOI offers speed and convenience for users, but do the risks still outweigh the … The post Bring your own identity (BYOI) appeared first on OpenText Blogs.

article thumbnail

California Passes New Privacy Law

Schneier on Security

The California legislature unanimously passed the strongest data privacy law in the nation. This is great news, but I have a lot of reservations. The Internet tech companies pressed to get this law passed out of self-defense. A ballot initiative was already going to be voted on in November, one with even stronger data privacy protections. The author of that initiative agreed to pull it if the legislature passed something similar, and that's why it did.

Privacy 53
article thumbnail

Equifax Enters Into Consent Order with State Banking Regulators Regarding 2017 Data Breach

Hunton Privacy

As reported in BNA Privacy Law Watch , on June 27, 2018, Equifax entered into a consent order (the “Order”) with 8 state banking regulators (the “Multi-State Regulatory Agencies”), including those in New York and California, arising from the company’s 2017 data breach that exposed the personal information of 143 million consumers. Equifax’s key obligations under the terms of the Order include: (1) developing a written risk assessment; (2) establishing a formal and documented Internal Audit Progr

article thumbnail

Cryptocurrency Theft Drives 3x Increase in Money Laundering

Dark Reading

The first half of 2018 saw more cryptocurrency theft than all of 2017 combined, driving a rise in digital money laundering as criminals elude authorities.

51
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

A new era in collaboration in digital preservation research

Preservica

You may have seen the announcement this week about a joint project funded by Jisc and combing the research efforts of Arkivum , Archivematica , Preservica and the Open Preservation Foundation to share information on digital preservation best practice. As part of this new team I am happy to share my thoughts on how it came about and where it could lead to.

article thumbnail

How To Build A Cybersecurity Career | What Really Matters

Cyber Info Veritas

According to data by Norwich University, despite cyber-threats increasing rapidly year after year, the skill gap is monumental. In fact, Cisco reports a shortage of over 1,000,000 cyber professionals. The lack of qualified cybersecurity professionals is one of the main reasons why we are yet unable to get a handle on cybercrimes. By having more cybersecurity professionals, we can enhance security.

article thumbnail

Kaspersky Deems Crypto-jacking the New Ransomware as Crypto-miners up Their Game

The Security Ledger

Because of its potential to earn hackers millions in a steady stream of cash, Kaspersky Labs has deemed crypto-jacking the new ransomware in a report that arrived just as researchers spotted two new types of malware targeting the growing popularity of cryptocurrencies. In its report released last Wednesday, Kaspersky declared that crypto-mining. Read the whole entry. » Related Stories Akamai Report finds DDoS Attacks more Sophisticated, Adaptive Evasive new botnet can take over enterprise

article thumbnail

With a focus on seamless sharing across domains, OpenText Documentum for Life Sciences 16.4 takes a giant leap forward

OpenText Information Management

When major acquisitions happen, market analysts, competitors, customers, and employees alike are watching closely to determine what’s next. In fact, employees like me were not terribly nervous when OpenText™ – a long-standing leader in enterprise content management – acquired Dell EMC’s Enterprise Content Division in January 2017. In fact, we assured our customers that OpenText … The post With a focus on seamless sharing across domains, OpenText Documentum for Life Sciences 16.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Samsung Investigates Claims of Spontaneous Texting of Images to Contacts

Threatpost

After users complained online that their Galaxy devices are randomly sending photos to contacts, Samsung said it isn't a hardware or software issue.

IT 44
article thumbnail

Three days at Enterprise World will take you from insight to action

OpenText Information Management

The pressure’s on every one of us, every day, to help our organizations stay ahead of the business disruption that’s happening all around us. While companies aim to be more customer-centric, improve efficiencies and gain new business insights, there are numerous challenges that stymie these efforts. To be competitive today, it’s about becoming an intelligent … The post Three days at Enterprise World will take you from insight to action appeared first on OpenText Blogs.

article thumbnail

Bigger, Faster, Stronger: 2 Reports Detail the Evolving State of DDoS

Dark Reading

DDoS attacks continue to plague the Internet, getting bigger and more dangerous. And now, the kids are involved.

51