Thu.Jan 11, 2018

article thumbnail

Patch Now or Risk GDPR Fines Later, Regulator Warns

Data Breach Today

Failures Discovered After Privacy Law Takes Effect Face Retroactive Punishment Following the alert over Meltdown and Spectre vulnerabilities, the U.K. Information Commissioner's Office is warning that failures to patch today could be punished with fines under GDPR, once enforcement of the data protection law begins later this year.

GDPR 154
article thumbnail

Daniel Abdul AIIM18 Speaker Interview

AIIM

Here’s your chance to get to know our AIIM18 speakers a little better before you get to San Antonio and see them live. We can’t wait to see you April 11-13th. Name Daniel Abdul. Email daniel.abdul@gmail.com. LinkedIn Profile [link]. Job Title VP Data Solutions Strategy and Commercial Solutions. Company UHG. Please provide one or two points that you will mention during your session.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malware Writer Allegedly Spied On Computers for 13 Years

Data Breach Today

Justice Department Accuses Ohio Man of Authoring 'Fruitfly' Malware A 28-year-old Ohio man has been accused of running a 13-year spying scheme that used malware to steal millions of photos, live images and other data from computers. He is accused of developing and using Fruitfly, a malware application for Apple Macs and Windows.

160
160
article thumbnail

Profile of the Month: Cindy Provin, Chief Executive Officer

Thales Cloud Protection & Licensing

Cindy Provin is a 20-year veteran at Thales. This month, she became the CEO for Thales eSecurity. Previously, she served as the President for Thales eSecurity Americas, and Chief Strategy & Marketing Officer for Thales eSecurity. In her new role as CEO, Cindy will be responsible for leading a world-class organization and delivering a portfolio of security solutions to protect data wherever it is created, shared or stored.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Skype Introduces End-to-End Encrypted Texts and Voice

WIRED Threat Level

After years of lingering questions about Skype's commitment to protecting user data, it will soon offer end-to-end encryption to its 300 million monthly users.

More Trending

article thumbnail

Congress Renews FISA Warrantless Surveillance Bill For Six More Years

WIRED Threat Level

The House of Representatives Thursday strengthened spying powers authorized under Section 702 of the 2008 FISA Amendments Act.

Security 109
article thumbnail

What is Enterprise Information Management (EIM)?

OpenText Information Management

Enterprise Information Management (EIM) can best be defined as a set of technologies, processes, disciplines and practices used to manage an organization’s data and content as an enterprise asset. It’s not a new concept but its importance to large organisations is growing rapidly. Frost and Sullivan has estimated that enterprise-level data grows at the rate … The post What is Enterprise Information Management (EIM)?

IT 71
article thumbnail

How to assess your organisation’s privacy risks

IT Governance

Organisations rely on personal data more than ever, collecting people’s information to fulfil any number of tasks. But the opportunities that personal data gives organisations comes with the responsibility of keeping it secure. This doesn’t just mean protecting your organisation from data breaches and cyber attacks, but also respecting data subjects’ privacy.

Risk 67
article thumbnail

Privacy: The Dark Side of the Internet of Things

Dark Reading

Before letting an IoT device into your business or home, consider what data is being collected and where it is going.

IoT 79
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Data contextualization continues to evolve in 2018

Information Management Resources

It’s vital that in addition to data connectivity, organizations also provide proper context—so users get the right information, right when they need it.

IT 60
article thumbnail

What is Enterprise Information Management (EIM)?

OpenText Information Management

Enterprise Information Management (EIM) can best be defined as a set of technologies, processes, disciplines and practices used to manage an organization’s data and content as an enterprise asset. It’s not a new concept but its importance to large organisations is growing rapidly. Frost and Sullivan has estimated that enterprise-level data grows at the rate … The post What is Enterprise Information Management (EIM)?

IT 61
article thumbnail

Yet Another FBI Proposal for Insecure Communications

Schneier on Security

Deputy Attorney General Rosenstein has given talks where he proposes that tech companies decrease their communications and device security for the benefit of the FBI. In a recent talk , his idea is that tech companies just save a copy of the plaintext: Law enforcement can also partner with private industry to address a problem we call "Going Dark." Technology increasingly frustrates traditional law enforcement efforts to collect evidence needed to protect public safety and solve crime.

article thumbnail

Weekly podcast: Carphone Warehouse, USB drives, VTech and Patch Tuesday

IT Governance

This week, we discuss a £400,000 ICO fine for Carphone Warehouse, an unfortunate prize from Taiwan’s Criminal Investigations Bureau, a $650,000 FTC settlement for VTech and the highlights of this month’s Patch Tuesday. Hello and welcome to the IT Governance podcast for Friday, 12 January 2018. Here are this week’s stories. Carphone Warehouse has been fined £400,000 by the Information Commissioner’s Office for breaching the Data Protection Act.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Responding to the Rise of Fileless Attacks

Dark Reading

Fileless attacks, easier to conduct and more effective than traditional malware-based threats, pose a growing challenge to enterprise targets.

57
article thumbnail

12 cyber security questions to ask your CISO – free guide

IT Governance

Despite the global spotlight on cyber attacks, many organisations still struggle to get to grips with managing emerging cyber risks in an increasingly technological world. Already burdened with a raft of director’s duties, the incoming General Data Protection Regulation (GDPR) and NIS Directive will place even greater obligations on boards to address information governance, network security and data privacy, or face staggering financial penalties.

article thumbnail

Why Facebook Security Questions Are no Substitute for MFA

Dark Reading

If identity is established based on one thing you know and one thing you have, the latter should not also be a thing you know because in the sharing economy, we share everything.

article thumbnail

How to write an ISO 27001-compliant risk assessment procedure

IT Governance

As part of your ISO 27001 certification project, your organisation will need to prove its compliance with appropriate documentation. ISO 27001 says that you must document your information security risk assessment process. Key elements of the ISO 27001 risk assessment procedure. Clause 6.1.2 of the Standard states that organisations must “define and apply” a risk assessment process.

Risk 56
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Survey Suggests Many Are Still Waiting for Spectre, Meltdown Windows Updates

Dark Reading

Microsoft's insistence on a specific registry key setting for offering the updates on systems appears to be the issue, security vendor Barkly says.

article thumbnail

Weekly Update 69 (Boat Edition)

Troy Hunt

It's my last day in the sun ?? Well, at least it's my last day in the sun for a couple of weeks so today I've gone to the sunniest place I know. It's "the boat edition" of my weekly update and I apologise up front for the rocking motion, the occasional wind noise (I lost the fluffy bit off my smartLav mic ) and the gratuitous amount of sunshine and beach.

IT 45
article thumbnail

AUSTRIA: Data protection for personal data of legal entities under the GDPR?

DLA Piper Privacy Matters

Introduction. With 31 July, the Austrian law amending the Data Protection Act 2000 (Data Protection Amendment Act 2018 – DSG 2018) was promulgated. This Act shall align the Austrian data protection law with the new General Data Protection Regulation (GDPR) and enters into force on 25 May 2018. One controversial topic arising with the DSG 2018 is its scope of applicability.

article thumbnail

Fingerprinting Digital Documents

Schneier on Security

In this era of electronic leakers, remember that zero-width spaces and homoglyph substitution can fingerprint individual instances of files.

51
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

WhatsApp Downplays Damage of a Group Invite Bug

Threatpost

WhatsApp said that claims that infiltrators can add themselves to an encrypted group chat without being noticed is incorrect.

article thumbnail

Modern Architecture Key to Haystac’s Potential

Info Source

Anthony Macciola has been in the document capture market for more than 25 years. As you can imagine, he’s seen quite a few automatic document classification and extraction offerings. So, why is he excited to have recently joined Haystac as Chairman of the Board? “On the surface, Haystac’s technology looks similar to what you and I are familiar with relative to KTA and some other capture products,” Macciola told DIR.

article thumbnail

House Votes to Reauthorize Controversial Spy Provision, Section 702

Threatpost

The U.S. House of Representatives voted to renew U.S. spy provisions, extending the powers of the NSA to collect internet communications for another six years.

article thumbnail

DocuWare Appoints Chief Revenue Officer to Accelerate Global Growth in the Cloud

Info Source

New Windsor NY, January 11, 2018 – DocuWare, provider of cloud solutions for document management and workflow automation, has promoted Max Ertl to the position of Chief Revenue Officer. The company’s managing directors and supervisory board are hereby recognizing his outstanding achievements and excellent leadership qualities. As Chief Revenue Officer (CRO) of the DocuWare Group, Max Ertl will serve as the strategic leader for the company’s global sales strategy.

Cloud 40
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Taking steps to ensure data security in the cloud

Information Management Resources

Vendors understand that their survival depends on meeting user expectations. Robust cybersecurity and reliability can make them a preferred partner.

Cloud 49
article thumbnail

RIG EK Remains Top of Heap, Turns to Cryptomining

Dark Reading

Popular exploit kit turns its sights to drive-by cryptomining in what security researchers believe will be a trend to follow in 2018.

article thumbnail

No Sanctions for Spoliation of ESI Against Plaintiff Leads to Summary Judgment Against Defendant: eDiscovery Case Law

eDiscovery Daily

We just completed our four part review of case law for 2017 and Tom O’Connor and I discussed important cases for 2017 in our webcast yesterday (click here to check it out). Now, on to cases to cover for this year…. In IBM v. Naganayagam, No. 15 Civ. 7991 (NSR) (S.D.N.Y. Nov. 21, 2017) , New York District Judge Nelson S. Romàn, finding that no intent to deprive by the plaintiff and no prejudice against the defendant for spoliation of ESI, denied the defendant’s motion for spoliation sanctions, w