Mon.Jun 25, 2018

article thumbnail

Supreme Court Rules on Mobile Location Data: Get a Warrant

Data Breach Today

ACLU Says Decision 'Provides a Groundbreaking Update to Privacy Rights' The U.S. Supreme Court has ruled that location data generated by mobile phones is protected by the Fourth Amendment, meaning police need "probable cause" before they can access it. The ACLU says the ruling "provides a groundbreaking update to privacy rights" in the digital age.

Privacy 157
article thumbnail

Organizations, security pros at odds on preparedness against cyber attacks

Information Management Resources

Despite the increased confidence among many organizations regarding their defense strengths, a new study finds a number of trends that weigh against better IT security postures.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 Document Scanning Myths, Debunked

Archive Document Data Storage

In the Information Age, it’s wise to know the facts. Even a smidgen of misinformation can cause your business to miss out on big benefits. Here are several common myths about document scanning to watch out for: Myth 1: Document Scanning is Easy. Scanning a few documents with a desktop scanner is straightforward and easy, but converting several boxes of records with a desktop scanner may take several days or even weeks.

ECM 40
article thumbnail

AI Could Vastly Improve Our Work Lives

AIIM

Artificial intelligence has the ability to change our lives for the better. Increasingly, businesses are looking to automation to complete tasks in a more cost effective and efficient manner. Unfortunately, automation may lead to job loss. In fact, the finance, manufacturing, and service industries have already cut jobs due to automation. While there are certainly risks posed by the advancement of AI, there are also several benefits.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Australia's HealthEngine Caught in Data-Sharing Fiasco

Data Breach Today

Medical Appointment Booking Platform Says It Obtains Consent Australia's large online medical booking platform, HealthEngine, has become embroiled in a privacy controversy after it reportedly passed personal medical details to a personal injury law firm. HealthEngine maintains it obtained users' consent, but the revelation appears to have caught many by surprise.

Privacy 125

More Trending

article thumbnail

WPA3 Wi-Fi Security Will Save You From Yourself

WIRED Threat Level

With better password security and idiot-proof IoT connections, WPA3 will make your internet experience much, much safer.

IoT 100
article thumbnail

GDPR – the facts and what it means for the retail sector

IT Governance

We all know by now that, on 25 May 2018, the General Data Protection Regulation (GDPR) came into effect. With all the noise, however, it’s possible that the key facts haven’t been heard clearly, especially by those in smaller businesses where there isn’t always a defined person to take the lead for IT. So, what are the key facts? The GDPR is not an IT issue.

Retail 71
article thumbnail

The Lost Art of Making Decisions

PerezBox

At the end of one of my keynotes last year I was asked: Tony, how did you know what decision to make? In war, there is nothing worse than a. Read More. The post The Lost Art of Making Decisions appeared first on PerezBox.

70
article thumbnail

ISO 27001 Lead Implementer, Lead Auditor and Internal Auditor ? what?s the difference?

IT Governance

Anyone interested in getting into or advancing their career in cyber security probably knows that they will need training and qualifications. But given that the field is so broad, how are you supposed to decide which course is most appropriate? This blog will help you make that decision. We take three of our most popular training courses – the ISO27001 Certified ISMS Internal Auditor , ISO27001 Certified ISMS Lead Auditor and ISO27001 Certified ISMS Lead Implementer courses – and explain what th

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Learn to deliver fast ROI with data science

IBM Big Data Hub

IBM Data Science Experience was designed to kick-start and rapidly scale data science projects, fitting any deployment needs in a multicloud environment.

article thumbnail

How can operators of essential services prepare for the NIS Regulations (NIS Directive)?

IT Governance

The UK’s Network and Information Systems Regulations 2018 (NIS Regulations) are derived from the EU Directive on security of network and information systems (NIS Directive), and took effect on 10 May 2018. The NIS Regulations require operators of essential services (OES) and digital service providers (DSPs) to implement “appropriate and proportionate technical and organisational measures” to manage the risks posed to their business operations.

article thumbnail

Malware in South Korean Cyberattacks Linked to Bithumb Heist

Dark Reading

Lazarus Group is likely behind a spearphishing campaign containing malicious code to download Manuscrypt malware.

65
article thumbnail

Marketing and the GDPR

IT Governance

The EU General Data Protection Regulation (GDPR) has big implications for marketing departments and how they can advertise products and services. Marketing personnel will be pleased that direct marketing comes under “legitimate interest”, one of the six lawful bases for processing. But how does this, and other aspects of the GDPR, apply in the real world of marketing?

GDPR 53
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Secure Code: You Are the Solution to Open Source's Biggest Problem

Dark Reading

Seventy-eight percent of open source codebases examined in a recent study contain at least one unpatched vulnerability, with an average of 64 known vulnerabilities per codebase.

article thumbnail

Secure Speculative Execution

Schneier on Security

We're starting to see research into designing speculative execution systems that avoid Spectre- and Meltdown-like security problems. Here's one. I don't know if this particular design secure. My guess is that we're going to see several iterations of design and attack before we settle on something that works. But it's good to see the research results emerge.

article thumbnail

Midsized Organizations More Secure Than Large Ones

Dark Reading

New report offers data and analysis as to why midsized organizations hit a cybersecurity sweet spot in terms of security efficacy.

article thumbnail

WannaCry Extortion Fraud Reemerges

Threatpost

The emails claim that all of the victim’s devices have been hacked and infected with the infamous ransomware -- and then ask for Bitcoin to "fix" it.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

It’s not too late to get ready for the GDPR

OpenText Information Management

The General Data Protection Regulation (GDPR), the European Union’s (EU) new privacy regulation, has now been in place since May 25, 2018. The GDPR is one of the largest data privacy legislations to be enacted, and it brings significant challenges to organizations with customers, employees or suppliers who are EU nationals. Although we’ve been talking … The post It’s not too late to get ready for the GDPR appeared first on OpenText Blogs.

GDPR 45
article thumbnail

Facebook accidentally leaks app data

Adam Levin

If Facebook’s ongoing privacy woes become any more regular, clocks may soon become obsolete. This week’s (first?) news about the increasingly leak-prone company (or increasingly transparent company when it comes to leaks?) has to do with an accident. Scratch that. What do you call an ongoing accident? Perhaps the correct answer, is Facebook. The company has been accidentally sending data from apps that run on their platform to testers (people who use beta versions of the apps to identify bugs),

article thumbnail

Brava! and Blazon: Your software superhero team

OpenText Information Management

Almost every organization has a need for advanced document viewing, collaboration, and transformation services. However, a growing challenge in the modern workplace is balancing accessibility — making sure the right people have access to the right information at the right time — with ensuring sensitive information is properly secured and stored. Enter OpenText™ Brava!

Access 45
article thumbnail

iOS Hack Lets Attackers Brute Force iPhone, iPad Passcodes

Dark Reading

A vulnerability in Apple's iOS lets anyone with a Lightning cable bypass the passcode entry restriction designed to protect the company's devices.

47
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

What Metrics Should Enterprises Focus On to Improve Cybersecurity?

eSecurity Planet

VIDEO: Dmitri Alperovitch, co-founder and CTO of CrowdStrike, says simply focusing on malware prevention isn't enough for modern cybersecurity.

article thumbnail

Intel Names Window Snyder as Chief Software Security Officer

Dark Reading

The microprocessor giant hires security veteran credited with leading both Microsoft's and Apple's security advancements.

article thumbnail

South Carolina’s Insurance Cybersecurity Law Takes Effect in 2019

Adam Levin

South Carolina became the first state to pass a law requiring all insurance entities to create and maintain a cybersecurity and data breach response program. . Among the law’s provisions is a requirement to notify the state government within 72 hours in the event of a breach or cybersecurity event affecting 250 or more people, the protection of policyholder’s personally identifiable information, and an annual statement detailing their breach response plan. .

article thumbnail

5 things that make the President’s Management Agenda different this time

CGI

5 things that make the President’s Management Agenda different this time. pallavi.m@cgi.com. Tue, 06/26/2018 - 01:44. Over the years, we have seen different versions of the President’s Management Agenda (PMA) issued?all striving to attain similar outcomes, but sometimes urging different methods to achieve them. So, what makes the latest PMA different?

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Reasons Why We Need I.T. Management Professionals in Cybersecurity

Cyber Info Veritas

Ever since the internet became a mainstay, something used by the layperson for things such as connection, online shopping, and even online businesses, hacking has been on the rise, which in itself precipitates the need for cybersecurity on a personal and professional level. Phishing, Trojans, ransomware, penetration attacks, Over WIFI attacks, and worms; these are some of the most common strategies used by hackers to gain access to your information or to get you to give them access to your priva

article thumbnail

Carpenter!

Adam Shostack

The decision in Carpenter v. United States is an unusually positive one for privacy. The Supreme Court ruled that the government generally can’t access historical cell-site location records without a warrant. (SCOTUS Blog links to court documents. The court put limits on the “third party” doctrine, and it will be fascinating to see how those limits play out.

Paper 40
article thumbnail

California Consumer Privacy Bill Fast-Tracked to Replace November Ballot Initiative

HL Chronicle of Data Protection

On June 22, California lawmakers announced Assembly Bill 375 , a broad-based consumer privacy bill that is intended to serve as an alternative to the California Consumer Privacy Act (CCPA), a far-reaching consumer privacy initiative that is on track to be on the California ballot this November. The chief sponsor of the CCPA, Alastair Mactaggart, has stated that he will withdraw the initiative from the ballot if AB 375 is passed this week.

Privacy 40