Mon.Nov 27, 2017

article thumbnail

The 10 Records Scheduling Commandments

The Schedule

And it came to pass that Brad was preparing materials for records management training sessions, as one does; And the frustration with the records management practices put in place by his predecessor did boil over. Then did Brad throw together a quick-and-dirty records management graphic, and he shared it on Twitter for a lark. Lo! That graphic became Brad’s most RT’ed Records Management-related post ever, for Brad hath toucheth a nerve.

article thumbnail

_The Quantum Spy_ Author David Ignatius on the Future of High-Tech Espionage

WIRED Threat Level

In his latest novel, David Ignatius tackles the intersection of quantum computing and spying.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to implement an ISMS

IT Governance

If your organisation is at all concerned about data protection, it should have an information security management system (ISMS). An ISMS is a system of processes, documents, technology and people that helps organisations manage, monitor and improve their information security in one place. ISO 27001 describes best practice for an ISMS, and certifying to the Standard means you can be sure that your organisation’s security measures are as effective as possible.

Risk 65
article thumbnail

Uber Data Hack

Schneier on Security

Uber was hacked, losing data on 57 million driver and rider accounts. The company kept it quiet for over a year. The details are particularly damning : The two hackers stole data about the company's riders and drivers ­-- including phone numbers, email addresses and names -- from a third-party server and then approached Uber and demanded $100,000 to delete their copy of the data, the employees said.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The clock is ticking — see how we can help you accelerate GDPR

IBM Big Data Hub

Managing enterprise information has always been a good idea, however with the potential for looming penalties from the General Data Protection Regulation (GDPR) non-compliance, companies are waking up and some organizations are even seeing GDPR as an opportunity to establish strengthened relationships with their customers.

GDPR 58

More Trending

article thumbnail

Driving breakthrough innovation and change

IBM Big Data Hub

Speed to market and differentiation are two key factors for business success. To achieve both, organizations need to rapidly innovate and drive change.

article thumbnail

Hunton Privacy and Insurance Leaders Address Prevention and Insurability of Cyber Attacks

Hunton Privacy

On November 3, 2017, Securityroundtable.org published an article highlighting the vulnerabilities businesses face in a world of e-commerce and interconnectivity, and spotlighted a crisis-planning panel hosted by Hunton & Williams held on November 1. Speakers at the event included Lisa Sotto , chair of the Global Privacy and Cybersecurity practice at Hunton & Williams; Eric Friedberg , Co-President of Stroz Friedberg; Stephen Gannon, General Counsel and Chief Legal Officer of Citizens Fin

article thumbnail

Governance insights from ARMA Live

IBM Big Data Hub

I just wrapped up attending and keynoting at this year’s ARMA Live conference. We're moving towards not just bringing together the practices, benefits and mandates of security, privacy and information governance, but also seeing the benefits and opportunities of business results of ever more personalized and trusted relationships with customers and partners, and developing whole new business opportunities.

article thumbnail

8 Low or No-Cost Sources of Threat Intelligence

Dark Reading

Here's a list of sites that for little or no cost give you plenty of ideas for where to find first-rate threat intelligence.

55
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Average Organization Faced 8 DDoS Attacks a Day in Q3 2017

eSecurity Planet

That's a 35 percent increase over the previous quarter.

76
article thumbnail

Cyber Forensics: The Next Frontier in Cybersecurity

Dark Reading

We can now recover evidence from the RAM on a cellphone, even if the account is locked, and use it to prosecute a case.

article thumbnail

Newly Published Exploit Code Used to Spread Mirai Variant

Threatpost

Qihoo 360 Netlab researchers reported on Friday that they are tracking an uptick in activity associated with what it said is a variant of the Mirai botnet.

IT 46
article thumbnail

Rethinking failure

MIKE 2.0

Imagine an organisation with ten job levels (ranked from entry to CEO). In the first year, there are 512 people at the lowest level who are all assigned to projects, half of which succeed and the other half fail in the first 18 months. The successful 256 are promoted to the next level and again assigned to projects with a 50/50 chance of success. The 128 whose projects succeed are again promoted.

Risk 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New BankBot Version Avoids Detection in Google Play -- Again

Dark Reading

Mobile banking Trojan BankBot uses a unique payload downloading technique to skip past Google Play Protect.

51
article thumbnail

Imgur Confirms 2014 Breach of 1.7 Million User Accounts

Threatpost

Researcher Troy Hunt is credited for tipping image sharing site Imgur off to a 2014 breach of 1.7 million user accounts.

article thumbnail

Three tips for mastering digital transformation

Information Management Resources

Organizations that saw real results had and built a unique digital DNA that enabled them to succeed where other similar companies failed or saw far fewer results.

article thumbnail

Thoma Bravo to Acquire Barracuda Networks for $1.6 billion

Dark Reading

The cloud email security and management company accepts buyout offer as a means to accelerate its growth.

Cloud 44
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Process This! – Close Outlook Before Compressing or Zipping PST Files for Processing: eDiscovery Best Practices

eDiscovery Daily

Having recently experienced this with a client, I thought I would revisit this helpful tip. This is one of the tips Tom O’Connor and I will be covering this Friday – E-Discovery Day – on our webcast Murphy’s eDiscovery Law: How to Keep What Could Go Wrong From Going Wrong at noon CST (1:00pm EST, 10:00am PST). Click here to register for Friday’s webcast.

article thumbnail

McAfee Looks to Cloud with Skyhigh Acquisition

Dark Reading

McAfee agrees to buy CASB provider Skyhigh Networks, demonstrating a strong focus on cloud security.

Cloud 44
article thumbnail

China regulators, police said to probe Qudian data leak

Information Management Resources

Officials are probing allegations that information from more than a million students who are clients of the Beijing-based firm was leaked and possibly sold online.

article thumbnail

Developers Can Do More to Up Their Security Game: Report

Dark Reading

Developers can play a vital role in accelerating the adoption of AppSec practices, security vendor says.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

7 steps to guard against ransomware attacks

Information Management Resources

To protect against this malware threat, organizations need to harden the target – including the users, the apps and the data.

article thumbnail

Developers Can Do More to Up Their Security Game: Veracode

Dark Reading

Developers can play a vital role in accelerating the adoption of AppSec practices, security vendor says.

article thumbnail

Understanding the difference between a data dictionary and a data glossary

Information Management Resources

One defines elements, their meanings and their allowable values, while the other is enterprise-wide and should be created to improve business understanding of the information they produce and use.

29
article thumbnail

Ethical Boardroom: Looking Into the Crystal Ball by Jason R. Baron of Drinker Biddle & Reath

IGI

Washington, D.C., of counsel Jason R. Baron at Drinker Biddle & Reath authored an article for Ethical Boardroom titled “Looking Into the Crystal Ball,” outlining his predictions on what corporate information governance (IG) issues will loom large in the coming year. Jason predicts the European Union’s General Data Protection Regulation will drive greater attention to IG, given the prospect of ongoing audits and fines for noncompliance with key privacy provisions.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

What the world's central banks are saying about cryptocurrencies

Information Management Resources

Eight years since the birth of bitcoin, finance execs around the world are increasingly recognizing the potential upsides and downsides of digital currencies.

article thumbnail

UBS seeks to expand workforce in artificial intelligence

Information Management Resources

The firm rolled out a robo-adviser last year that uses algorithms to help customers build and manage portfolios with little or no human interaction.

article thumbnail

Japan ranked last choice in Asia for top foreign tech talent

Information Management Resources

It could get worse. The country faces a growing shortage of workers in 'frontier IT' -- big data, artificial intelligence and the Internet of Things.