Wed.Feb 14, 2018

article thumbnail

Russia Will Meddle in US Midterm Elections, Spy Chief Warns

Data Breach Today

White House Inaction Questioned by Some Lawmakers The top U.S. intelligence official has warned Congress that Russia will attempt to meddle in the this year's U.S. midterm elections, a repeat of the country's alleged 2016 U.S. presidential election interference.

189
189
article thumbnail

Content Migration -- Go Manual? Or Find a Partner?

AIIM

Carefully think through the pros and cons of your approach to content migration. The advent of a new generation of modern content solutions and the desire of many organizations to reduce the number of content systems is driving organizations to look at how they can update their content management infrastructure. More and more organizational leaders face the need to migrate legacy content to a newer content suite, either in the cloud or on premise.

ECM 90
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

$100,000 Fine in Case Involving Defunct Records Storage Firm

Data Breach Today

Second HIPAA Settlement in Recent Months With a Troubled Company For the second time in recent months, a federal regulator has signed a HIPAA settlement with an organization that's either gone out of business or filed for bankruptcy. What triggered the latest settlement?

113
113
article thumbnail

Don’t Follow the Money; Follow the Customer!

Bill Schmarzo - Dell EMC

“Mr. Schmarzo, we’ve noticed that your cholesterol count is at 210, so we have prescribed Fluvastatin and placed selected foods into your shopping basket to help you control your cholesterol. Complete the purchase by selecting ‘ here ’ and we’ll deliver the medication and groceries to your home today between 4:00 and 4:20pm. If you complete the full Fluvastatin prescription, then we’ll reduce your monthly healthcare insurance payment by 5%.”.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How IoT Affects the CISO's Job

Data Breach Today

As internet of things devices become increasingly common in the enterprise, CISOs must lead the way in making sure emerging security issues, including a higher risk of distributed denial-of-service attacks, are adequately addressed, says John Pescatore of the SANS Institute, which offers training for CISOs and others.

IoT 100

More Trending

article thumbnail

Australia Launches Real-Time 'New Payments Platform'

Data Breach Today

Payments Are Speedy But Irreversible; Will Fraud Rise? Australia is the latest country to roll out real-time payments, where funds from an account at one bank reach an account at another bank in seconds. While convenient, the system poses fresh fraud challenges and consumer protection concerns.

100
100
article thumbnail

Align your cyber resilience strategy with government best practice

IT Governance

A Cyber Resilience Strategy for Scotland: Public Sector Action Plan 2017/18 was developed by the Scottish government and the National Cyber Resilience Leaders Board (NCRLB) to enhance the cyber resilience of digital public services in Scotland. According to the action plan, Scottish public-sector bodies and their key partners will need to improve cyber security and promote cyber resilience by the end of 2018.

article thumbnail

Can Consumers' Online Data Be Protected?

Schneier on Security

Everything online is hackable. This is true for Equifax's data and the federal Office of Personal Management's data, which was hacked in 2015. If information is on a computer connected to the Internet, it is vulnerable. But just because everything is hackable doesn't mean everything will be hacked. The difference between the two is complex, and filled with defensive technologies, security best practices, consumer awareness, the motivation and skill of the hacker and the desirability of the data.

article thumbnail

Coventry University investigated after data breach

IT Governance

An investigation has been launched following a data breach at Coventry University in November 2017. The breach occurred after an email attachment containing confidential student information was sent to almost 2,000 students. The university has apologised and insists that no financial or address information was leaked. The Information Commissioner’s Office (ICO) is aware of the incident and is making enquiries.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Fileless Malware: Not Just a Threat, but a Super-Threat

Dark Reading

Exploits are getting more sophisticated by the day, and cybersecurity technology just isn't keeping up.

article thumbnail

eDiscovery Expert Tom O’Connor Reviews CloudNine Platform

eDiscovery Daily

What I Like About CloudNine. An eDiscovery Platform Review by Tom O’Connor. Introduction. In my 30 plus years of experience as a consultant, author, and speaker in the field of automated litigation support systems, I’ve used almost every software program deployed for the litigation market. And I’ve also reviewed many them, beginning with my days in the 80’s working with the late Dick Robbins and eventually, after his untimely death, taking over the writing of his book The Automated Law Fir

article thumbnail

Windows 10 Critical Vulnerability Reports Grew 64% in 2017

Dark Reading

The launch and growth of new operating systems is mirrored by an increase in reported vulnerabilities.

61
article thumbnail

Don’t Follow the Money; Follow the Customer!

Bill Schmarzo - Dell EMC

“Mr. Schmarzo, we’ve noticed that your cholesterol count is at 210, so we have prescribed Fluvastatin and placed selected foods into your shopping basket to help you control your cholesterol. Complete the purchase by selecting ‘ here ’ and we’ll deliver the medication and groceries to your home today between 4:00 and 4:20pm. If you complete the full Fluvastatin prescription, then we’ll reduce your monthly healthcare insurance payment by 5%.”.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Filing Deadline for New Infosec Law Hits NY Finance Firms Thursday

Dark Reading

Banks and financial services companies in New York must file by tomorrow to certify they are compliant with the state Department of Financial Services' new cybersecurity regulation, 23 NYCRR 500.

article thumbnail

CFTC Brings Cybersecurity Enforcement Action

Hunton Privacy

On February 18, 2018, in a settled enforcement action , the U.S. Commodity Futures Trading Commission (“CFTC”) charged a registered futures commission merchant (“FCM”) with violations of CFTC regulations relating to an ongoing data breach. Specifically, the FCM failed to diligently supervise an information technology provider’s (“IT vendor’s”) implementation of certain provisions in the FCM’s written information systems security program.

article thumbnail

ABBYY Reports 25% Revenue Growth in 2017

Info Source

MILPITAS, Calif., – Feb. 13, 2018 – ABBYY ® , a global provider of intelligent capture solutions to improve business outcomes, today announced the results of 2017. The company achieved a total revenue growth of 25%, the highest rate in five years. Throughout 2017, ABBYY completed a number of large-scale projects for its corporate clients in the United States, Europe, Australia, and other countries around the world.

article thumbnail

Singapore passes new Cybersecurity Bill: Here’s what you need to know before it comes into force

Data Protection Report

The Singapore Parliament passed the much discussed Cybersecurity Bill (the Bill) on 5 February 2018 and it is anticipated that the new law will come into force soon. [1] The new law creates a regulatory framework for the monitoring and reporting of cybersecurity threats to essential services in Singapore through the appointment of the Commissioner of Cybersecurity.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Researchers Find New Twists In ‘Olympic Destroyer’ Malware

Threatpost

Researchers now believe attackers may have had prior access to networks and that malware was more sophisticated than originally believed.

Access 47
article thumbnail

The GDPR Clock Is Running Out. Now What?

Dark Reading

Many organizations impacted by new European Union data privacy rules that go into effect May 25 are still blind to some of the basics.

GDPR 46
article thumbnail

Dell EMC Patches Critical Flaws in VMAX Enterprise Storage Systems

Threatpost

Attacks include a hard-coded password vulnerability that could give attackers unauthorized access to systems.

article thumbnail

Cybercrime Costs for Financial Sector up 40% Since 2014

Dark Reading

A 9.6% increase just in the past year, and denial-of-service attacks are partly to blame.

51
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Data is global: SOC audits are vital under EU’s new GDPR

Information Management Resources

Though U.S. and European companies may not use identical privacy practices, social organization control audits are one bridge between the two that can aid in compliance.

GDPR 37
article thumbnail

Encrypted Attacks Continue to Dog Perimeter Defenses

Dark Reading

Attacks using SSL to obfuscate malicious traffic finding fertile ground for growth.

article thumbnail

Taking steps to thwart the 5 top data security threats

Information Management Resources

Organizations can better mitigate risks and combat future attacks by applying lessons learned from last year, and gaining a greater understanding of what lies ahead.

article thumbnail

Intel Expands Bug Bounty Program, Offers up to $250K

Dark Reading

Microprocessor giant adds vulnerability-finding category for Meltdown, Spectre-type flaws.

42
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Data provenance seen as a top healthcare use case for blockchain

Information Management Resources

Three of four finalists in ONC competition use the technology to address privacy and security issues associated with electronic health information exchange.

article thumbnail

Rebuilding in the Post-War Years: The Legacy of the Hasterlik-Hine Collection

Archives Blogs

This is the final blog post from the students in charge of the Hasterlik-Hine Digitization Project in cooperation with the Institute of World War II and the Human Experience. . Written from 1945-1948, the final portion of the digitized portion of the Hasterlik-Hine collection offers an invaluable glimpse into life after World War II. Excitement over Giulia Koritschoner’s upcoming trip to the United States characterizes many of the post-war letters, as does joy about reconnecting with the f

Paper 20
article thumbnail

AI may hold the key to success with predictive analytics

Information Management Resources

Traditional machine learning techniques can be very labor intensive, but artificial intelligence can learn and improve performance results quickly, says John Crupi.