Fri.May 18, 2018

article thumbnail

‘Tis the season of purge and replace for records managers

OpenText Information Management

This time last year, when I managed customer support and consulting for an ECM reseller, there was a high level of tension within our school board clients. Close to the end of the school year, records managers start digging through the various physical and digital records stores in preparation for next year. During this time … The post ‘Tis the season of purge and replace for records managers appeared first on OpenText Blogs.

article thumbnail

Why your organisation needs cyber incident response management

IT Governance

With cyber attacks one of the top threats to organisations , it’s crucial to have the right measures in place to protect yourself from an attack. However, cyber threats are also becoming more sophisticated and persistent, and protection isn’t always enough. Organisations should have a plan in place to respond to an attack, enabling them to contain it and ultimately control the costs and exposure.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Watching the continued convergence of analytics products and services

Information Management Resources

Just like product vendors, consultants find it harder and harder to compete just on people and prices, so now they compete on products, too.

article thumbnail

Nonstop Breaches Fuel Spike in Synthetic Identity Fraud

Data Breach Today

Leading the latest edition of the ISMG Security Report: Years of massive data breaches have fueled an increase in synthetic identity fraud, in which fraudsters combine real and bogus details to create more effective fake identities. Plus, has "The Dark Overlord" hacking group finally met its match?

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Digital Leaders Tackle Information Chaos at its Origins

AIIM

In a recent AIIM Industry Watch survey -- State of Intelligent Information Management: Getting Ahead of the Digital Transformation Curve -- I asked this question -- “ Agree or Disagree : Digitizing and standardizing business inputs is one of the key bottlenecks for Digital Transformation.” The results are clear: Information chaos needs to be tackled at its origins.

More Trending

article thumbnail

NHS warns patients they could lose text alerts as GDPR deluge continues

The Guardian Data Protection

Health service joins UK firms in rushing to comply with new data protection rules The National Health Service is texting patients to warn they could lose alerts about hospital and doctor appointments, joining the deluge of more than 1bn “GDPR” messages currently hitting personal inboxes to meet an EU deadline this week. GDPR, which stands for General Data Protection Regulation , has been described as the biggest overhaul of online privacy since the birth of the internet, and comes into force on

GDPR 96
article thumbnail

Real-Time Mobile Phone Location Tracking: Questions Mount

Data Breach Today

After Securus Technologies Gets Hacked, LocationSmart Fixes Data-Exposing Flaw Following reports about U.S. companies that enable government and other users to access real-time tracking information for all major U.S. wireless carriers' subscribers, provider Securus Technologies has reportedly been hacked, while LocationSmart has fixed a data-exposing flaw.

article thumbnail

Publish all Vote Leave's data, campaign chief challenges Facebook

The Guardian Data Protection

Dominic Cummings says move would prove campaign did not use data gathered improperly by Cambridge Analytica The chief strategist of Vote Leave has called on Facebook to publish all the data it holds on his Brexit campaign group, challenging the social network to adopt a policy of radical transparency on the impact of targeted online adverts during the EU referendum.

IT 74
article thumbnail

The Hidden Power of Threat Intelligence

Data Breach Today

Organizations today have access to countless sources of threat intelligence. And yet many still struggle to operationalize this intel effectively. Russ Spitler of AlienVault discusses how to improve detection and response with dynamic security incidents.

Access 100
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Belgian Privacy Commission Releases 2017 Annual Activity Report

Hunton Privacy

On May 2, 2018, the Belgian Privacy Commission (the “Belgian DPA”) published its Annual Activity Report for 2017 (the “Annual Report”), highlighting its main accomplishments for the past year. In 2017, the Belgian DPA focused on the following topics: EU General Data Protection Regulation (“GDPR”). The Belgian DPA issued a number of documents to help companies and organizations with their GDPR compliance efforts, including a Recommendation on internal register of processing activities and a temp

Privacy 57
article thumbnail

Maliciously Changing Someone's Address

Schneier on Security

Someone changed the address of UPS corporate headquarters to his own apartment in Chicago. The company discovered it three months later. The problem, of course, is that in the US there isn't any authentication of change-of-address submissions: According to the Postal Service, nearly 37 million change-of-address requests ­ known as PS Form 3575 ­ were submitted in 2017.

article thumbnail

Off the Record: Dead Fingers Open Phones, 120 TB Archives Move to the Cloud, Records Manager Profile

The Texas Record

Tune in monthly for a curated collection of articles we found interesting on a broad range of topics; some which are directly related to records management and others which might share common themes. No, we didn’t write these articles —hence the name of this series, “Off the Record”— but fortunately, we didn’t need to in order to share the knowledge with our subscribers.

article thumbnail

How to Hang Up on Fraud

Dark Reading

Three reasons why the phone channel is uniquely vulnerable to spoofing and what call centers are doing about it.

IT 62
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Latin American ‘Biñeros’ Bond Over Fraudulent Purchase Scheme

Threatpost

A type of card-not-present fraud is spreading throughout the Latin American underground, uniting groups of malefactors in a communal effort to perpetrate it as widely as possible.

IT 42
article thumbnail

Actor Advertises Japanese PII on Chinese Underground

Dark Reading

The dataset contains 200 million rows of information stolen from websites across industries, likely via opportunistic access.

Access 53
article thumbnail

TeleGrab Malware Steals Telegram Desktop Messaging Sessions, Steam Credentials

Threatpost

A recently discovered malware steals cache data and messaging sessions from the desktop version of encrypted messaging service Telegram.

article thumbnail

New Research Seeks to Shorten Attack Dwell Time

Dark Reading

It can take months for an organization to know they've been hacked. A new DARPA-funded project seeks to reduce that time to hours.

IT 49
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

ABBYY Introduces FineReader Engine 12, Comprehensive OCR SDK Suitable for Virtual and Cloud Environments

Info Source

MILPITAS, Calif., – May 17, 2018 – ABBYY ® , a global provider of content intelligence services, today announced the launch of ABBYY FineReader Engine 12, a next-generation software development kit (SDK) that allows businesses to integrate text recognition, PDF conversion, and data capture functionalities into software applications running in the cloud, on premises or virtual machines.

Cloud 40
article thumbnail

New Mexico Man Sentenced on DDoS, Gun Charges

Dark Reading

Using DDoS for hire services and possessing firearms as a felon combine to land a New Mexico 15 years in federal prison.

50
article thumbnail

Maia Mosillo of Kodak Alaris Recognized as one of CRN’s 2018 Women of the Channel

Info Source

ROCHESTER, N.Y, May 16 – Alaris, a Kodak Alaris business, announced today that CRN ® , a brand of The Channel Company , has named Maia Mosillo, Alaris Senior Digital Marketing Manager, to its prestigious 2018 Women of the Channel list. The executives who comprise this annual list span the IT channel, representing vendors, distributors, solution providers and other organizations that figure prominently in the channel ecosystem.

Sales 40
article thumbnail

Syrian Electronic Army Members Indicted for Conspiracy

Dark Reading

Two men have been charged for their involvement in a plot to commit computer hacking as members of the Syrian Electronic Army.

47
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Misconfigured Reverse Proxy Servers Spill Credentials

Threatpost

Researchers created a proof-of-concept attack that allows remote attackers to access protected APIs to extract credentials.

Access 47
article thumbnail

Overcoming the most common obstacles to IoT implementation

Information Management Resources

When the effort does not work, it is likely due to pushing solutions at a scale that stretches engineering capabilities or moving too fast to integrate new technologies into a current system.

IoT 39
article thumbnail

Hurdles Remain After Senate Votes To Restore Net Neutrality

Threatpost

The U.S. Senate gave the nod to restoring the 2015 Open Internet Order, putting net neutrality on the fast track to a House vote.

article thumbnail

Cambridge Analytica files for U.S. bankruptcy after data scandal

Information Management Resources

The company said in a May 2 statement on its website that it lost 'virtually all' customers and suppliers as a result of reports that it improperly obtained information from tens of millions of Facebook Inc. users.

IT 31
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Threatpost News Wrap Podcast for May 18

Threatpost

Threatpost editors Tom Spring, Tara Seals and Lindsey O'Donnell discuss the week’s information security news.

article thumbnail

10 ways organizations can succeed with data remediation

Information Management Resources

When corporations are able to successfully execute a program, they are better able to handle future challenges as data volumes and formats continue to expand.

article thumbnail

RedDawn Espionage Campaign Shows Mobile APTs on the Rise

Threatpost

The Sun Team APT, likely linked to North Korea, uses Google Play and Facebook as attack vectors.