Wed.Dec 13, 2017

article thumbnail

Ukip to face tribunal over use of data in EU referendum campaign

The Guardian Data Protection

Information commissioner announces inquiry into parties’ use of personal information after Ukip’s refusal to cooperate Ukip is to face a tribunal over its use of analytics during the EU referendum after refusing to cooperate with an investigation by the Information Commissioner’s Office (ICO). The ICO announced a formal investigation into how political parties use data analytics to target voters in response to concern about how social media was used during the referendum.

Analytics 111
article thumbnail

I'm Sorry You Feel This Way NatWest, but HTTPS on Your Landing Page Is Important

Troy Hunt

Occasionally, I feel like I'm just handing an organisation more shovels - "here, keep digging, I'm sure this'll work out just fine." The latest such event was with NatWest (a bank in the UK), and it culminated with this tweet from them: I'm sorry you feel this way. I can certainly pass on your concerns and feed this back to the tech team for you Troy?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Mirai Botnet Was Part of a College Student Minecraft Scheme

WIRED Threat Level

The DDoS attack that crippled the internet last fall wasn't the work of a nation-state. It was three college kids working a *Minecraft* hustle.

IT 111
article thumbnail

The future of API banking dominates SIBOS

OpenText Information Management

Something that barely raised any interest only two years ago was the focus of many of the discussions at this year’s SIBOS. The use of APIs in banking has rapidly gone from a peripheral issue to central to the thinking for many banks. As banks are beginning to gear up for API-related business, the question … The post The future of API banking dominates SIBOS appeared first on OpenText Blogs.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Bots and Form Letters Make It Nearly Impossible to Find Real FCC Net Neutrality Comments

WIRED Threat Level

Over seven months, 39 Nicholas Thompsons submitted net neutrality comments to the FCC. We tried to track each of them down.

IT 101

More Trending

article thumbnail

Who is Responsible for IoT Security?

Outpost24

This piece is part 4 of our ongoing series on IoT security. Don't forget to download the ebook to understand the IoT security gap and how your business needs to address it, today.

IoT 67
article thumbnail

Penetration tests could have spared NHS from WannaCry

IT Governance

NHS Digital has announced a £20 million project to improve data security across the service. The Security Operations Centre will provide : A monitoring service which analyses intelligence from multiple sources and shares guidance, advice and threat intelligence with health care organisations; On-site data security assessments for NHS organisations; Specialist support for NHS organisations that think they have been affected by a cyber security incident; and.

article thumbnail

Apple Security Flaws Give Some Researchers Concern About Deeper Issues

WIRED Threat Level

Apple's had a rough stretch for security. But is it just a rough patch, or something deeper?

article thumbnail

MPs admit to sharing passwords

IT Governance

Sharing login credentials is never a good idea, especially at work. Not only does this practice breach internal policies but it also increases the likelihood of a data breach. It only takes one password to fall into the wrong hands for cyber criminals to be able to access your systems and networks and cause harm. Sharing passwords often occurs because team members trust one another and share the workload, but what would happen if one of those employees turned rogue?

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

2 Million Fake Net Neutrality Comments Stole American Identities

Dark Reading

New York Attorney General Eric Schneiderman updates the investigation into fake content submitted during the net neutrality comment process.

67
article thumbnail

E-Mail Tracking

Schneier on Security

Good article on the history and practice of e-mail tracking: The tech is pretty simple. Tracking clients embed a line of code in the body of an email­ -- usually in a 1x1 pixel image, so tiny it's invisible, but also in elements like hyperlinks and custom fonts. When a recipient opens the email, the tracking client recognizes that pixel has been downloaded, as well as where and on what device.

article thumbnail

CASL: A Call for Clarity

Privacy and Cybersecurity Law

Today the Standing Committee on Industry, Science and Technology presented its report on Canada’s Anti-Spam Law (CASL) to the House […].

IT 52
article thumbnail

GDPR and the human element of personal data protection

Information Management Resources

The new mandate should be seen as a fantastic opportunity to get in-house policies, systems and technologies into shape, as well as demonstrating governance compliance.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

NIST Releases Draft Update To Cybersecurity Framework

Privacy and Cybersecurity Law

In 2014, the National Institute of Standards and Technology (NIST) released its first version of the Framework for Improving Critical […].

article thumbnail

Healthcare Faces Poor Cybersecurity Prognosis

Dark Reading

Experts say the healthcare industry is underestimating security threats as attackers continue to seek data and monetary gain.

article thumbnail

CASL: A Call for Clarity

Privacy and Cybersecurity Law

Today the Standing Committee on Industry, Science and Technology presented its report on Canada’s Anti-Spam Law (CASL) to the House of Commons, as part of the three-year CASL statutory review. The report title is telling: Canada’s Anti-Spam Legislation: Clarifications are in Order. Having heard 40 witnesses ranging from CRTC counsel and enforcement staff, to small and large businesses and business associations, to consumer protection and privacy experts, the Committee made a strong

article thumbnail

Malware Decompiler Tool Goes Open Source

Dark Reading

Avast's RetDec machine-code decompiler now available for free on Github.

77
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

19-Year-Old TLS Vulnerability Weakens Modern Website Crypto

Threatpost

New research shows how an old vulnerability called ROBOT can be exploited using an adaptive chosen-ciphertext attack to reveal the plaintext for a given TLS session.

Privacy 49
article thumbnail

80% of Americans Admit to Risky Cybersecurity Behaviors

Dark Reading

Nearly half of survey respondents use unsecured WiFi networks and a third open unsolicited email attachment, a report finds.

article thumbnail

Internet of Things market growing by 15 percent annually

Information Management Resources

By 2021, more than 55 percent of spending on IoT projects will be for software and services, says Carrie MacGillivray.

article thumbnail

Black Hat Asia 2018: First Briefings Announced

Dark Reading

Black Hat Asia returns to Singapore, March 20-23, 2018 with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall, and more.

45
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

EUROPE: Article 29 Working Party publish draft Guidelines on Consent

DLA Piper Privacy Matters

On 12 December 2017, the Article 29 Working Party (WP29) published draft Guidelines on Consent under the General Data Protection Regulation (GDPR). The guidelines expand on the WP29’s ‘ Opinion on the definition of consent’ (July 2011), addressing the concept of consent in the context of the enhanced regulatory regime under the GDPR. The Guidelines apply a strict interpretation of the principles that underpin valid consent in the GDPR.

GDPR 40
article thumbnail

Automation Could Be Widening the Cybersecurity Skills Gap

Dark Reading

Sticking workers with tedious jobs that AI can't do leads to burnout, but there is a way to achieve balance.

article thumbnail

The Top Excuses for Not Storing Files Offsite

Archive Document Data Storage

We get it: as a busy business owner, you have a multitude of tasks on your plate and file storage may be low on your priority list. But don’t let these excuses ruin an opportunity for increased productivity and profitability! I Don’t Worry about Disasters. You should worry about disasters—or better yet, plan for them. Every business, including yours, is vulnerable to, and should prepare for, the unexpected.

article thumbnail

Google Sheds Light on Data Encryption Practices

Dark Reading

Google explains the details of how it secures information in the cloud and encrypts data in transit.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

DeepMind has simple tests that may prevent Musk’s AI apocalypse

Information Management Resources

The firm's proposed safety tests come at a time when the field is increasingly concerned about the unintended consequences of artificial intelligence.

article thumbnail

8 Steps for Building an IT Security Career Path Program

Dark Reading

A cybersecurity career-path program can help with talent retention and recruitment.

IT 51
article thumbnail

Internet of Things market to grow by 15 percent annually

Information Management Resources

By 2021, more than 55 percent of IoT spending will be for software and services, says Carrie MacGillivray.