Fri.Jan 26, 2018

article thumbnail

Allscripts Ransomware Attack: Lawsuit Already Filed

Data Breach Today

Class Action Lawsuit Alleges EHR Vendor Failed to Secure Its Systems In the wake of a ransomware attack that disrupted patient care services for hundreds of Allscripts' customers, a class action lawsuit has been filed against the cloud-based electronic health records vendor for allegedly "failing to secure its systems and data from cyberattacks.

article thumbnail

4 Special Requirements Social Media and Collaboration Create for GDPR Compliance

AIIM

A new set of European rules and standards related to privacy and data protection (the General Data Protection Regulation , or GDPR ) has set in motion a mad compliance and security scramble not only for European companies, but also for any company doing business in Europe or with European customers. The regulation is designed to harmonize privacy across the EU, codify more rigorous privacy rights; strike a balance between privacy and security and create an explicit obligation for both data contr

GDPR 92
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Blockchain's Bid to Rid the World of Data Breaches

Data Breach Today

Leading the latest edition of the ISMG Security Report: Ransomware crypto-locks customer data stored by a cloud-based service provider. Also, there's a move afoot to use blockchain technology to better protect people's personally identifiable information.

article thumbnail

Your Sloppy Bitcoin Drug Deals Will Haunt You For Years

WIRED Threat Level

Scouring the blockchain, researchers found years-old evidence tying Silk Road transaction to users' public accounts.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Are spreadsheets really the best tools for financial planning and forecasting?

IBM Big Data Hub

Still using spreadsheets for financial planning? Learn more in this webinar how predictive technologies can improve the accuracy of your own planning and forecasting.

72

More Trending

article thumbnail

OpenText opened arms and tech to InfoArchive

OpenText Information Management

If you had asked me just over a year ago how the acquisition of Documentum, InfoArchive, Captiva, and others by OpenText would evolve, frankly I would not have been sure. I remember attending Momentum Europe in Barcelona shortly after the acquisition was announced. As a member of the InfoArchive team, we had doubts. Some of … The post OpenText opened arms and tech to InfoArchive appeared first on OpenText Blogs.

66
article thumbnail

The Effects of the Spectre and Meltdown Vulnerabilities

Schneier on Security

On January 3, the world learned about a series of major security vulnerabilities in modern microprocessors. Called Spectre and Meltdown, these vulnerabilities were discovered by several different researchers last summer, disclosed to the microprocessors' manufacturers, and patched­ -- at least to the extent possible. This news isn't really any different from the usual endless stream of security vulnerabilities and patches, but it's also a harbinger of the sorts of security problems we're going t

article thumbnail

How AI Is Redefining Cybersecurity

eSecurity Planet

A look at how security vendors that are employing artificial intelligence and machine learning to help IT security teams.

article thumbnail

6 Tips for Building a Data Privacy Culture

Dark Reading

Experts say it's not enough to just post data classification guidelines and revisit the topic once a year. Companies have to build in privacy by design.

Privacy 61
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Keylogger Campaign Returns, Infecting 2,000 WordPress Sites

Threatpost

Over 2,000 WordPress sites are infected as part of a keylogger campaign that leverages an old malicious script.

article thumbnail

Hardware Security: Why Fixing Meltdown & Spectre Is So Tough

Dark Reading

Hardware-based security is very difficult to break but, once broken, catastrophically difficult to fix. Software-based security is easier to break but also much easier to fix. Now what?

article thumbnail

China Releases National Standard on Personal Information Security

Hunton Privacy

On January 25, 2018, the Standardization Administration of China published the full text of the Information Security Technology – Personal Information Security Specification (the “Specification”). The Specification will come into effect on May 1, 2018. The Specification is voluntary, but could become influential within China because it establishes benchmarks for the processing of personal information by a wide variety of entities and organizations.

article thumbnail

Dutch Intel Agency Reportedly Helped US Attribute DNC Hack to Russia

Dark Reading

The General Intelligence and Security Service of the Netherlands broke into Cozy Bear's network in 2014 and spotted the group launching attacks, de Volkskrant says.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Easy Media Storage and Rotation Tips

Archive Document Data Storage

Too often, small businesses become overwhelmed by the prospect of having to carry out a backup strategy. But inaction isn’t an option because data protection is crucial to the success of your business. Use these easy media storage and rotation tips to give your data the protection it deserves. Back up Daily, Weekly and Monthly. Data loss happens without warning.

article thumbnail

Endpoint and Mobile Top Security Spending at 57% of Businesses

Dark Reading

Businesses say data-at-rest security tools are most effective at preventing breaches, but spend most of their budgets securing endpoint and mobile devices.

article thumbnail

Navigating the Road Ahead: Auto Industry Stakeholders and Regulators Convene to Discuss Connected Vehicle Privacy

HL Chronicle of Data Protection

In the same week that the automotive industry gathers in Washington, D.C. for the 2018 Washington Auto Show, a cross-section of automotive stakeholders, government officials, and consumer and privacy advocates came together at Hogan Lovells’ Washington office to discuss privacy issues facing connected vehicles. The half-day conference, co-hosted by Hogan Lovells and the Future of Privacy Forum, convened on January 23, with the theme of “Privacy and the Connected Vehicle: Navigating the Road Ahea

Privacy 40
article thumbnail

Former CIA CTO Talks Meltdown and Spectre Cost, Federal Threats

Dark Reading

Gus Hunt, former technology leader for the CIA, explains the potential long-term cost of Meltdown and Spectre.

57
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Finding the right skills balance in data security hires

Information Management Resources

Many organizations focus exclusively on hard technology experience with their recruiting, overlooking the relationship acumen and 'soft skills' that make for a more balanced and successful worker.

article thumbnail

Selling Cloud-Based Cybersecurity to a Skeptic

Dark Reading

When it comes to security, organizations don't need to look at cloud as an either/or proposition. But there are misconceptions that need to be addressed.

Cloud 46
article thumbnail

Lenovo Fixes Hardcoded Password Flaw Impacting ThinkPad Fingerprint Scanners

Threatpost

Lenovo said nearly a dozen ThinkPad and ThinkCentre laptops contain a hardcoded password flaw.

article thumbnail

Business continuity and availability remains top priority for IT

Information Management Resources

Toward that goal, enhanced security will be the main initiative organizations will pursue over the next 24 months, according to a report by enterprise software provider Syncsort.

IT 42
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Intel CEO: New Products that Tackle Meltdown, Spectre Threats Coming this Year

Dark Reading

In an earnings call yesterday, Intel CEO Brian Krzanich says security remains a 'priority' for the microprocessor company.

article thumbnail

How to transform from data survivor to data thriver

Information Management Resources

When it comes to digital transformation, many organizations either don’t know where to start or they’re jumping off the wrong diving board.

article thumbnail

DIR 1-5-2018

Info Source

DIR 1-5-2018. Tweet.

40
article thumbnail

13 top paying jobs in security, software development and IT leadership

Information Management Resources

Talented chief information officers can easily earn over a quarter million dollars these days, while salaries for skilled developers and cyberpros also continue to rise.

IT 34
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Another Sport to Peruse

Archives Blogs

Cover from the Florida State Tennis: 2005-06 Seminole Women’s Tennis Media Guide [ original item ]. We’ve continued to steadily digitize our collection of sports media guides in our University Archives. The latest sport to be digitized is tennis. We have good timing since we’ve entered prime tennis season with the Australian Open marking the start of the professional season underway currently.

article thumbnail

Artificial intelligence nears the summit of hype in Davos

Information Management Resources

AI was on the lips of seemingly every corporate chief and policy maker attending this year’s conference in Switzerland, as well as dominating more than 20 headlines covering the event.

article thumbnail

Friday Squid Blogging: Squid that Mate, Die, and Then Sink

Schneier on Security

The mating and death characteristics of some squid are fascinating. Research paper. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.

Paper 43