Mon.Jun 04, 2018

article thumbnail

Three models for determining the true value of data

Information Management Resources

With proper targeted analysis, data scientists can uncover meaningful insights to guide decisions on products, customer experience, risk mitigation, processes and profitability.

article thumbnail

Cryptocurrency: A Gold Mine for Open-Source Intelligence

Data Breach Today

Expert Says Virtual Currency Systems Leak Useful Data to Track Criminals Experts have long warned that bitcoin is not as private as it appears. The very design of bitcoin, as well as some other virtual currencies, can lend a surprising amount of information about the groups using it to transact. In fact, it's sometimes easier to track than if criminals used the banking system.

Mining 160
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AIIM: The State of Intelligent Information Management

Attensa

In mid-May AIIM released a study authored by John Mancini titled The State of Intelligent Information Management. It’s a thoughtful perspective on the intersection of traditional content management and the increased focus of organizations on digital transformation – favorite Attensa themes! The report is free to AIIM members. Since buying a professional membership is less than the cost of buying the report I’d suggest that approach.

article thumbnail

Preparing for the AI tidal wave

Information Management Resources

Here are three things insurers can do to take maximum advantage of machine learning’s potential.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Beyond Security: 4 Authentication Considerations For The Identity Revolution

Data Breach Today

More Trending

article thumbnail

Another Fitness App Exposes Users' Data

Data Breach Today

Independent Researcher Finds PumpUp Data Was Accessible on Unsecured Amazon Server For at least the third time in recent months, a mobile fitness app maker apparently has exposed consumers' sensitive personal information. The latest app to expose data: PumpUp.

Access 168
article thumbnail

Phishing Scams Target FIFA World Cup Attendees

Dark Reading

Soccer-themed emails and Web pages target fans with fake giveaways and the chance to snag overpriced, illegitimate 'guest tickets.

article thumbnail

The Use of Machine Data in Finding Fraud

Data Breach Today

Splunk's Jim Apger on How to Draw the Fraud Story Out of Data When it comes to fraud, enterprise data has a story to tell, and it's up to security and fraud leaders to know how to interpret that story. Jim Apger of Splunk discusses reading and reacting to these stories.

Security 113
article thumbnail

Why incident response planning is critical for your organisation

IT Governance

When your organisation suffers a major disruption, an effective incident response plan (IRP) could mean the difference between a bad day at the office and going out of business. We’re not exaggerating: the costs of disruptive incidents mount up, and if you can’t cauterise the damage promptly, the effects could be devastating. Incident response management combines thorough planning with adaptability, enabling organisations to detect incidents promptly and respond appropriately.

GDPR 65
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

10 Hot Sessions: Infosecurity Europe in London

Data Breach Today

Cybersecurity Conference Tackles Cybercrime, AI, Breach Response, Privacy, GDPR The annual Infosecurity Europe conference returns to London this week, with a focus on the latest cybersecurity trends and essential practices for organizations. Hot topics range from artificial intelligence and breach response to GDPR and battling cybercriminals and nation-states.

article thumbnail

WWDC 2018: Apple Just Made Safari the Good Privacy Browser

WIRED Threat Level

The next version of Safari takes on ad-trackers more aggressively than ever.

Privacy 97
article thumbnail

Leveraging SaaS to Fill the Skills Gap

Data Breach Today

Security leaders have been addressing the global skills gap for better than a decade now, with little to show for it. But Joe Cosmano of iboss recommends a new approach, leveraging software-as-a-service to make up for the staffing shortfall.

Security 100
article thumbnail

US-North Korea Summit News Used as Lure In New Malware Campaign

Dark Reading

Previously known threat actor Group 123 likely behind NavRAT malware, security vendor says.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

E-Mail Vulnerabilities and Disclosure

Schneier on Security

Last week, researchers disclosed vulnerabilities in a large number of encrypted email clients: specifically, those that use OpenPGP and S/MIME, including Thunderbird and AppleMail. These are serious vulnerabilities : An attacker who can alter mail sent to a vulnerable client can trick that client into sending a copy of the plaintext to a web server controlled by that attacker.

article thumbnail

Building a Safe, Efficient, Cost-Effective Security Infrastructure

Dark Reading

The Industrial Internet of Things allows organizations to address both physical and digital security concerns.

article thumbnail

Let your customers improve your website

OpenText Information Management

The goal of testing is to get information about the behavior of visitors to a website so that our customers can improve the user experience. We want to find out what visitors like and what they dislike. OpenText™ Optimost is an A/B and Multi-variable testing (MVT) platform that allows customers to continually improve their website’s … The post Let your customers improve your website appeared first on OpenText Blogs.

article thumbnail

Federal Agencies Face an Uphill Battle in Cyber-Preparedness

Threatpost

In the wake of the elimination of the federal cybersecurity czar position, it turns out that three-quarters of agencies are unprepared for an attack.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

FTC Posts Blog on Data Deletion Rule under COPPA

Hunton Privacy

On May 31, 2018, the Federal Trade Commission published on its Business Blog a post addressing the easily missed data deletion requirement under the Children’s Online Privacy Protection Act (“COPPA”). The post cautions that companies must review their data policy in order to comply with the data retention and deletion rule. Under Section 312.10 of COPPA, an online service operator may retain personal information of a child “for only as long as is reasonably necessary to fulfill the purposes for

article thumbnail

One week into GDPR – what you need to know

Data Protection Report

Websites go dark, complaints are filed within an hour, European Commission suffers an embarrassing data leak, and the US Commerce Secretary warns about the unintended trade impact of the law – all in the first week of the GDPR. The European Union’s far-reaching General Data Protection Regulation (GDPR) went into effect on 25 May amid much anticipation.

GDPR 40
article thumbnail

6 great reasons why manufacturers should attend Enterprise World 2018

OpenText Information Management

My CEO recently pointed out that current research predicts that by 2020, 60% of plant floor workers will work alongside automated assistance technologies. The pace and scale of technological change in manufacturing is stunning. And, it’s only getting bigger and faster. There has never been a more important time to join us at Enterprise World … The post 6 great reasons why manufacturers should attend Enterprise World 2018 appeared first on OpenText Blogs.

article thumbnail

Facebook Defends Against Device-Integrated APIs Policy, But Concerns Remain

Threatpost

Facebook is again in hot water after an article alleged it struck deals with device-makers to access users' data.

Access 43
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Plaintiff Argument for Failure to Produce Cell Phone Data in Wife’s Name is “Unpersuasive”: eDiscovery Case Law

eDiscovery Daily

In Ortiz v. Amazon.com LLC, et al, No. 17-cv-03820-JSW (MEJ) (N.D. Cal. May 25, 2018 ) , California Magistrate Judge Maria-Elena James ordered the plaintiff, who failed to produce court-ordered cell phone records because the account was in his wife’s name and refused to provide her information, to provide defendant Golden State with his cell phone account holder’s name and address so that defendant could subpoena the cell phone records from her.

article thumbnail

Cloudflare Gets Transparent on DNS Resolver Outage

Threatpost

It’s a cautionary tale for those coding the complex algorithms that go into automated mitigation.

article thumbnail

Fortinet Completes Bradford Networks Purchase

Dark Reading

NAC and security firm added to Fortinet's portfolio.

article thumbnail

Google won't renew Pentagon AI drone deal after staff backlash

Information Management Resources

Signed last September, the contract lets the Defense Department use the firm's artificial intelligence tools to analyze digital footage for an initiative called Project Maven.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Do your customers have an alternative?

InfoGovNuggets

What happens to your business if you or your customers can’t get to the Internet? “Visa Hit by Outrage In Parts of Europe,” The Wall Street Journal , June 2, 2018 B12. Users of Visa cards in Europe couldn’t use their cards on Friday as the result of a hardware failure. Are you prepared for a hardware failure that prevents your customers from reaching you?

article thumbnail

Microsoft agrees to buy coding site GitHub for $7.5B

Information Management Resources

The deal helps Microsoft, which is increasingly relying on open-source software, to add programming tools and tie up with a company that has become a key part of the way Microsoft writes its own software.

IT 29
article thumbnail

Mining on your own land

InfoGovNuggets

Who owns the information on social media? Everyone? “Wall Street Moves Toward Mining of Social-Media Data,” The Wall Street Journal , June 4, 2018 B4. Companies now looking focusing on “alternative data reports” concerning a potential acquisition target, which are things such as user “purchase data, mobile app usage[,] and web surveys of prices.” This data is mined from social media.

Mining 28