Fri.Feb 16, 2018

article thumbnail

U.S. Indicts 13 Russians for Election Interference

Data Breach Today

'Information Warfare Against the United States' Alleged A U.S. grand jury has taken the extraordinary step of indicting 13 Russian nationals and three Russian companies for allegedly interfering with the U.S. political system, including the 2016 presidential election, in what the Justice Department portrays as "information warfare against the United States.

171
171
article thumbnail

Transparency in eDiscovery? Save it for your clients

OpenText Information Management

This article was first published in Legaltech News. “Cooperation should not result in one party exerting extensive control over another’s discovery process or the application of a heightened discovery standard.” – Anna Mercado Clark, partner at Phillips Lytle LLP Civil litigation doesn’t have to be uncivil, or so the idea goes. In the spirit of … The post Transparency in eDiscovery?

IT 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian Indictments: 'It's About Time'

Data Breach Today

Cyber intelligence expert Tom Kellermann discusses the significance and impact of the announcement that 13 Russian nationals and three Russian entities were indicted Friday for allegedly meddling in the 2016 presidential election.

IT 133
article thumbnail

How We Learned to Love Event Based Retention

AIIM

Allow me to introduce you to Wendy McLain, Manager of Enterprise Content & Records Management at Valero. Valero is a publicly traded international oil and gas company, with revenue in the billions of dollars. Wendy will be presenting at The AIIM Conference 2018. Her session is called "How We Learned to Love Event Based Retention: A Valero Energy Case Study in Records Management.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Microsoft Outlines Digital ID Plan Using Blockchain

Data Breach Today

Encrypted ID 'Hubs' Will Safely Store Personal Data After a year of brainstorming on blockchain technology, Microsoft says it will add support in its Authenticator app for a decentralized identity system that's designed to put users in control of their personal information.

More Trending

article thumbnail

Russia's Election Meddling: CIA Offensive at the Ready

Data Breach Today

Leading the latest edition of the ISMG Security Report: U.S. intelligence chiefs warn Congress that Russia's information operations continue, while Europol says criminals love cryptocurrencies, both for stealing via scams as well as to launder "dirty money.

Security 113
article thumbnail

Mueller Indictment Against Russia Details Efforts to Undermine US Democracy

WIRED Threat Level

Robert Mueller's office has come out with a 37-page indictment that details the extraordinary lengths Russian agents went to influence the 2016 presidential election.

Security 106
article thumbnail

Why Some Entities Pay Extortionists to Unlock Patient Data

Data Breach Today

When faced with a ransomware attacks, why do some healthcare entities choose to pay extortionists a ransom to decrypt data? Security expert Ron Pelletier offers insights.

article thumbnail

Mueller Indictment: Russian Trolls Stole Real US Identities to Fool Facebook

WIRED Threat Level

A new Justice Department indictment alleges Russia's disinformation operations created bank and social media accounts using the stolen identities of real US citizens.

Security 103
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

What's in store for a CDO at Think 2018

IBM Big Data Hub

When you wake up, the last thing you want to ask yourself is, “What did my data do last night?” CDOs who find themselves asking that question can put a stop to it on March 19. IBM is bringing experts and leaders across data governance and integration to the annual Think conference.

article thumbnail

Cyber attacks are the top threat to organisations

IT Governance

Each year, the BCI in association with BSI produces the Horizon Scan Report , which presents findings on short- and long-term business threats. Cyber attacks and data breaches have been the top two threats for the past three years. This year’s report reveals that cyber threats continue to be the top concern for business continuity and resilience professionals. 53% of respondents were “extremely concerned” about the risk of a cyber attack, and 42% were concerned about the risk of a data breach.

article thumbnail

Max Mosley threatens to sue papers over orgy story under data laws

The Guardian Data Protection

Former Formula One boss says references to ‘private party’ breach Data Protection Act Max Mosley is threatening to sue Britain’s three largest newspaper groups, claiming they are in breach of the Data Protection Act because they continue to refer to an infamous sadomasochistic orgy involving the former Formula One boss a decade ago. The 77-year-old claims that data protection and privacy laws require the press to stop disseminating information about him that is not in the public interest, but me

Paper 61
article thumbnail

Weekly podcast: Browsealoud cryptojacking, Bee Token phishing and Olympic attacks

IT Governance

This week, we discuss the use of cryptocurrency mining software on numerous government websites, a phishing scam that robbed Bee Token investors of $1 million and cyber attacks on the Pyeongchang Winter Olympics. Hello and welcome to the IT Governance podcast for Friday, 16 February 2018 – and thanks to Camden for reading last week’s one while I was away.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Apple Rushes Fix for Latest ‘Text Bomb’ Bug As Abuse Spreads

Threatpost

Apple said it is working on a fix for the latest text bomb bug that crashes a number of iOS and Mac apps that display specific Telugu language characters. .

IT 63
article thumbnail

4 Things You Should Be Destroying

Archive Document Data Storage

As a business owner, you generate confidential waste daily. One of the most important things you can do is dispose of it securely. But it’s not always easy knowing what to destroy versus what to recycle. Here’s a list of the which items you should destroy regularly: Documents with Financial Information. Identity thieves know organisations generate confidential waste.

Sales 49
article thumbnail

Rise of the 'Hivenet': Botnets That Think for Themselves

Dark Reading

These intelligent botnet clusters swarm compromised devices to identify and assault different attack vectors all at once.

61
article thumbnail

New National Academies Report on Crypto Policy

Schneier on Security

The National Academies has just published " Decrypting the Encryption Debate: A Framework for Decision Makers." It looks really good, although I have not read it yet. Not much news or analysis yet. Please post any links you find in the comments, and I will summarize them here.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Weekly Update 74

Troy Hunt

I had plans this week. Monday was going to be full of coding work around Pwned Passwords V2 (and a few other HIBP things) then Texthelp went and got themselves pwned and there went my day writing about the ramifications of that. This is a genuinely important issue and the whole concept of the JavaScript supply chain needs much better thought. We've got the technology, it's just that most people don't know it exists!

article thumbnail

Siemens Leads Launch of Global Cybersecurity Initiative

Dark Reading

The new 'Charter of Trust' aims to make security a key element of the digital economy, critical infrastructure.

article thumbnail

Today’s financial consumer: Open for business (part 2 of 2)

CGI

Today’s financial consumer: Open for business (part 2 of 2). harini.kottees…. Fri, 02/16/2018 - 02:11. As mentioned in my previous blog , consumers across the globe are increasingly interested in FinTech-fueled innovative services, but also much more open to going to other providers beyond their current primary banks, if necessary, to get them. As a reminder, the insights discussed here are driven by CGI’s 2017 Global Financial Consumer Survey , which surveyed 2,250 bank consumers in nine coun

article thumbnail

13 Russians Indicted for Massive Operation to Sway US Election

Dark Reading

Russian nationals reportedly used stolen American identities and infrastructure to influence the 2016 election outcome.

54
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Unsecured PHI Leads to OCR Settlement with Closed Business

Hunton Privacy

On February 13, 2018, the U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) announced that it entered into a resolution agreement with the receiver appointed to liquidate the assets of Filefax, Inc. (“Filefax”) in order to settle potential violations of HIPAA. Filefax offered medical record storage, maintenance and delivery services for covered entities, and had gone out of business during the course of OCR’s investigation. .

article thumbnail

FedEx Customer Data Exposed on Unsecured S3 Server

Dark Reading

Thousands of documents from US and international citizens were exposed on an Amazon S3 bucket configured for public access.

Access 48
article thumbnail

January reader favorite: Despite increased interest, quantum computing is still years away

Information Management Resources

The technology, which has the potential to dramatically alter the business computing landscape, is likely to receive a lot of attention in 2018.

48
article thumbnail

Russian Hackers Sentenced in Heartland Payment Systems Breach Case

Dark Reading

Two more men involved in the massive payment card theft from multiple major US corporations that began in 2007 now sent to federal prison.

43
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

In memory of Dr. Nancy H. Marcus

Archives Blogs

We are saddened to hear of Dr. Nancy Marcus’ passing this last Monday. Dr. Marcus served at FSU in several roles for 30 years. During her tenure, she served as the director of the Marine Laboratory, chair of the Department of Oceanography, and as Dean of the Graduate School from 2005 until her retirement in 2017. Dr. Marcus was named a Robert O. Lawton Distinguished Professor in 2001, the highest honor that FSU faculty can award one of their own.

article thumbnail

6 steps firms can take to mitigate Spectre and Meltdown risks

Information Management Resources

Security leaders must take a pragmatic and risk-based approach to combating this entirely new class of vulnerabilities. Gartner offers these 6 steps to reduce risk.

Risk 33
article thumbnail

Opprobrious Epithets and Cherry Rum

Archives Blogs

This week, I’d like to draw your attention to a fascinating collection that was recently digitized and made available in Amherst College Digital Collections: the Amherst College Early History Manuscripts and Pamphlets Collection. A map of South College from the first year of the college’s existence, 1821/22, showing the students living in each room.