Thu.Dec 07, 2017

article thumbnail

Bitcoin ? Blockchain

Weissman's World

Seems like not an hour goes by that I don’t see a headline about the soaring value of bitcoin – followed near-immediately by another that warns of the imminent bursting of the bitcoin bubble. Since I’m not a bitcoin owner, my interest in these goings-on is more academic than practical. But I am invested (intellectually, […]. The post Bitcoin ≠ Blockchain appeared first on Holly Group.

article thumbnail

Quantum Computing Is the Next Big Security Risk

WIRED Threat Level

Opinion: Rep. Will Hurd of Texas argues that quantum computers will rock current security protocols that protect government and financial systems.

Risk 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security. There is a growing demand for experts , leading to increased salaries and job opportunities. If you’re thinking about starting a career in cyber security, here are five things you should do. Get work experience. As with most industries, you’re much more likely to get ahead in cyber security if you have experience.

article thumbnail

Reader favorites December 2017: Our most popular RIM resources

TAB OnRecord

The most popular RIM resources this month cover document imaging, metadata and RIM ROI. Why, what and how: three questions to answer before embarking on a document imaging project This guide was prepared to help representatives from lines of business, operations, IT and records management in the early planning stages of a document imaging project. [.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

APT 34 Is an Iran-Linked Hacking Group That Probes Critical Infrastructure

WIRED Threat Level

A new Iran-linked hacking group called APT 34 has been spotted lurking in the networks of financial, energy, telecom, and chemical companies.

More Trending

article thumbnail

25% increase in confidential data theft

IT Governance

It has been revealed that there has been a 25% increase in the number of High Court cases involving stolen confidential data. One key contributory factor may be an increase in staff turnover, as employees may take key client and financial information with them when they leave. Another contributory factor may be the range of devices available to employees, such as smartphones and online Cloud storage platforms, as it allows them to “feel more confident about taking confidential data without arous

article thumbnail

Modernizing the Canada Science and Technology Museum through Open Heritage

OpenText Information Management

Historically, citizens have turned to museums to provide stewardship over our shared public heritage and provide expert interpretations and opinions on artifacts, but today the traditional institutional authority is changing. Now, citizens expect immediate access, participation and engagement with public knowledge and data sources, driving the need for new ways of approaching information management.

Access 71
article thumbnail

Weekly podcast: NCSC and Kaspersky, parliamentary passwords and macOS High Sierra (again)

IT Governance

This week, we discuss the NCSC’s warning to senior civil servants, the poor password habits of MPs, and a bug in the patch Apple rushed out last week. Hello and welcome to the IT Governance podcast for Friday, 8 December 2017. Here are this week’s stories. The chief executive of the UK’s National Cyber Security Centre, Ciaran Martin, has warned senior civil servants about using Russian antivirus (AV) software in government departments.

article thumbnail

Microsoft's Project Sopris Could Secure the Next Generation of IoT

WIRED Threat Level

With Project Sopris, Microsoft has a new hardware solution for the next wave of IoT security problems.

IoT 92
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

IG Toolkit v14.1 compliance still required for healthcare organisations

IT Governance

Healthcare was the hardest-hit industry in terms of the number of breaches in the first half of 2017, according to the Gemalto Breach Level Index report , suffering 228 data breaches that resulted in 31 million stolen records. One of the most notable incidents this year was the WannaCry ransomware attack, which affected an estimated 300,000 devices and led to the cancellation of approximately 14,778 patient appointments.

article thumbnail

Ransomware Meets 'Grey's Anatomy'

Dark Reading

Fictional Grey Sloan Memorial Hospital is locked out of its electronic medical records, but in the real world, healthcare organizations face even greater risks.

article thumbnail

How can your organisation become more cyber secure?

IT Governance

Cyber attacks are increasing year after year as criminal hackers’ knowledge evolves, but many organisations’ cyber security is not evolving with it. A criminal hacker will spot a weakness in an organisation and exploit it. This isn’t always a technological weakness, as criminal hackers also exploit people and take advantage of a lack of effective organisational processes and procedures.

article thumbnail

Working Party Releases Opinion on Joint Review of EU-U.S. Privacy Shield

Hunton Privacy

As we previously reported , this October, the EU Commission released its report and accompanying working document on the first annual review of the EU-U.S. Privacy Shield framework. On November 28, 2017, the Article 29 Data Protection Working Party (the “Working Party”) adopted an opinion on the review (the “Opinion”). While the Opinion notes that the Working Party “welcomes the various efforts made by US authorities to set up a comprehensive procedural framework to support the operation of the

Privacy 49
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Banking Apps Found Vulnerable to MITM Attacks

Threatpost

Using a free tool called Spinner, researchers identified certificate pinning vulnerabilities in mobile banking apps that left customers vulnerable to man-in-the-middle attacks.

article thumbnail

Leveraging data to elevate the customer experience

Information Management Resources

Many organizations are harnessing only a fraction of the potential value of analytics and thus missing out on the chance to turn insights into a competitive advantage.

article thumbnail

Conficker: The Worm That Won't Die

Dark Reading

More than nine years after it infected millions of systems worldwide, the malware continues to be highly active, according to a Trend Micro report.

IT 53
article thumbnail

Join the Team: Digital Preservation’s potential for ambitious innovators

Preservica

Interview with Jon Tilbury, Preservica CTO. Preservica is in an exciting stage of growth and innovation, and with that comes an extensive recruitment program. CTO Jon Tilbury is in the process of establishing a team of Innovation Software Engineers to explore new technologies and show how Preservica’s leading Digital Preservation product can be used in new ways and new markets.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Internet of Things Statistics

Information Matters

Finding “reliable” data about the installed base of Internet of Things (IoT) devices, market size and forecasts is not easy and can be expensive if you have to buy a commercial market report. However, there is quite a bit of free data out there which I have collated here. Creating IoT stats is notoriously difficult depending on accuracy of models, assumptions and definitions.

IoT 45
article thumbnail

CIPL Submits Comments to Article 29 WP’s Proposed Guidelines on Data Breach Notification

Hunton Privacy

On December 1, 2017, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP submitted formal comments to the Article 29 Working Party (the “Working Party”) on its Guidelines on Personal Data Breach Notification (the “Guidelines”). The Guidelines were adopted by the Working Party on October 3, 2017, for public consultation.

article thumbnail

4 predictions for 2018: Data-driven decisions pay off

Information Management Resources

A growing focus on anaytics will enable business leaders to gain powerful insights into their organization to make smarter decisions.

article thumbnail

eDiscovery and the GDPR: Ready or Not, Here it Comes, Part Three: eDiscovery Best Practices

eDiscovery Daily

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. He has also been a great addition to our webinar program, participating with me on several recent webinars, including our webinar last Friday on E-Discovery Day ( Murphy’s eDiscovery Law – How to Keep What Could Go Wrong From Going Wrong ), which was great.

GDPR 49
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Attacker 'Dwell Time' Average Dips Slightly to 86 Days

Dark Reading

Real-world incident response investigation data from CrowdStrike reveals attacker trends with fileless malware, ransomware, and other weapons.

article thumbnail

Digital leaders: Driving pace and scale in a dynamic market, part 4 (business model)

CGI

Digital leaders: Driving pace and scale in a dynamic market, part 4 (business model). cgiadmin. Thu, 12/07/2017 - 02:50. As organizations in every sector continue to pursue digital transformation strategies and programs to compete in an increasingly digital-first world, a key challenge is driving business model transformation. Earlier posts in this blog series have covered the impact of digitalization on the market environment, along with digital leader actions with respect to organizational cha

article thumbnail

Why Third-Party Security is your Security

Dark Reading

Managing third-party risk isn't just a good idea, in many cases, it's the law. This security framework can help you minimize the threat.

article thumbnail

Insurers’ top trends and priorities: A look at CGI’s 2017 Voice of Our Clients findings (part 1)

CGI

Insurers’ top trends and priorities: A look at CGI’s 2017 Voice of Our Clients findings (part 1). p.butler@cgi.com. Thu, 12/07/2017 - 15:32. Every year, CGI meets in-person with clients across the globe to get a pulse on their top trends and priorities to understand their challenges and opportunities, especially as the urgency to become digital organizations continues to accelerate across industries.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Android Ransomware Kits on the Rise in the Dark Web

Dark Reading

More than 5,000 Android ransomware kit listings have been spotted so far this year, with the median price range hitting $200.

article thumbnail

Insurers’ top trends and priorities: A look at the 2017 CGI Client Global Insights (part 2)

CGI

Insurers’ top trends and priorities: A look at the 2017 CGI Client Global Insights (part 2). pooja.cs@cgi.com. Thu, 12/07/2017 - 15:43. In my previous blog , I introduced findings from in-person interviews CGI held in 2017 with more than 1,300 client executives across 17 countries, including insurance business and IT executives. We conduct these interviews each year to get a pulse on clients’ top trends, along with their business and IT priorities, so that we can align our strategies and offeri

article thumbnail

Mavro Imaging Celebrates 10th Anniversary

Info Source

Westampton, NJ – December 7, 2017 – We are pleased to announce that Mavro Imaging is celebrating its ten-year anniversary. In just ten short years, Mavro’s flagship document imaging and data capture software, MavBridge™, has become a customer favorite in the industry. With over 250 installations throughout the United States and Canada, MavBridge™ is used successfully every day to process millions of documents across a wide range of industries: Bank Lockboxes, Utilities, Insurance, Nonprofi