Mon.Feb 12, 2018

article thumbnail

Facebook personal data use and privacy settings ruled illegal by German court

The Guardian Data Protection

Firm to appeal decision by Berlin regional court which upholds complaints that users not given informed consent Facebook’s default privacy settings and use of personal data are against German consumer law, according to a judgement handed down by a Berlin regional court. The court found that Facebook collects and uses personal data without providing enough information to its members for them to render meaningful consent.

article thumbnail

Equifax Confirms 'Probable' Breached Data Was Indeed Stolen

Data Breach Today

Breach Victim Tally Remains Unchanged, But Investigators Find More PII Stolen Equifax says that its digital forensic investigators have found that while its tally of 145.5 million U.S. breach victims hasn't changed, more of them had their email addresses, tax identification numbers and driver's license information exfiltrated.

IT 177
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Internet Security Threats at the Olympics

Schneier on Security

There are a lot : The cybersecurity company McAfee recently uncovered a cyber operation, dubbed Operation GoldDragon, attacking South Korean organizations related to the Winter Olympics. McAfee believes the attack came from a nation state that speaks Korean, although it has no definitive proof that this is a North Korean operation. The victim organizations include ice hockey teams, ski suppliers, ski resorts, tourist organizations in Pyeongchang, and departments organizing the Pyeongchang Olympi

article thumbnail

Government Websites Deliver Cryptocurrency Mining Code

Data Breach Today

Security of Code Pushed by Content Delivery Networks Remains Ongoing Concern More than 4,200 websites, some belonging to the U.S., U.K. and Australian governments, have been turning their visitors' computers into mining machines to harvest the virtual currency Monero. The security lapse continues the recent trend of cryptocurrency mining malware overtaking ransomware.

Mining 150
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

It's like Deja Vu all over again -- a Records Management classic

AIIM

As Yogi supposedly once said, it's like deja vu all over again. I recently came across this article from e-doc Magazine (remember that?) by my friend Nishan DeSilva (then of Watson Wyatt fame, now at Microsoft). (Speaking of e-doc Magazine, how many remember it's successor, Infonomics magazine. Gosh I wish we had held onto that name.). Many of the core concepts are still relevant and can be applied to the current challenges facing records managers.

More Trending

article thumbnail

'Olympic Destroyer' Malware Hit Pyeongchang Ahead of Opening Ceremony

WIRED Threat Level

Researchers at Cisco Talos detail a new piece of disruptive, highly infectious malware with a clear target: the Pyeongchang Olympics IT infrastructure.

IT 87
article thumbnail

Hackers Win Olympic Gold Medal for Disruption

Data Breach Today

Researchers Say Destructive Wiper Dubbed 'Olympic Destroyer' Hits Pyeonchang Hackers crashed the Winter Olympics, apparently by using destructive malware dubbed "Olympic Destroyer." The attack resulted in the Pyeonchang 2018 website being offline for 12 hours and WiFi unavailable during the opening ceremony, but organizers say no competitions were disrupted.

124
124
article thumbnail

Preserving the human touch in a data-driven world

Information Management Resources

In today’s digital world, interpersonal connections matter more than ever. Technology can be shaped so that it adapts to people, using technology for people rather than instead of people.

article thumbnail

Equifax Breach: Worse Than Advertised

Data Breach Today

Digital Forensic Investigators Find Hackers Stole Even More Personal Data Hackers stole even more information than previously reported last year in the massive breach of Equifax, the credit bureau has confirmed, saying it's determined that more email addresses, tax identification numbers and driver's license information was exfiltrated.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Next-Generation quality monitoring for the contact center

OpenText Information Management

Coaching employees to deliver an amazing customer experience isn’t as easy a pat on the back and a “that-a-boy” comment on a monitoring form. Coaching requires thoughtful insights and an objective and meaningful conversation about performance – past and present. As a former contact center quality leader, I often heard phrases like these at the … The post Next-Generation quality monitoring for the contact center appeared first on OpenText Blogs.

article thumbnail

3 principles for climbing the AI ladder with IBM Governed Data Lake

IBM Big Data Hub

Recently, we capped off the first leg of the “Enabling digital business with an IBM governed data lake” road shows in the Asia Pacific region with our customers and partners.

article thumbnail

Transforming businesses one step at a time

OpenText Information Management

Blockchain is a disruptive technology which businesses the world over have begun to embrace as part of their digital transformation initiatives. Blockchain is a method of structuring data that allows a digital ledger of transactions to be created and shared amongst the participants via a distributed network of computers. Using public or private key cryptography … The post Transforming businesses one step at a time appeared first on OpenText Blogs.

article thumbnail

Cryptojacking Found in Critical Infrastructure Systems Raises Alarms

WIRED Threat Level

Once confined to browsers, hijacking computers to mine cryptocurrency has branched out to dangerous places.

Mining 86
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Developing a more sustainable business environment

OpenText Information Management

Over the past decade there has been an increasing drive for companies to developer greener and more sustainable business environments. Climate change has been a key driver for this initiative and the Paris Climate Accord was a key turning point for nearly every country around the world. Each country that signed up to the agreement … The post Developing a more sustainable business environment appeared first on OpenText Blogs.

67
article thumbnail

Snapchat's Snap Map Will Now Be Available On the Web

WIRED Threat Level

By bringing the Snap Map out of the app and onto the web, Snap hopes to bring Snapchat to the masses like never before.

article thumbnail

Records Management vs Information Governance

Record Nations

While the terms “records management” and “information governance” may have overlapping principles and are often used interchangeably, there are some key differences that should be considered by management professionals. Put simply, information governance encompasses all data management as a whole. Records management is a subset within information governance.

article thumbnail

How to implement ISO 27001 into your SME quickly and easily

IT Governance

ISO/IEC 27001:2013 is the international standard that describes best practice for an information security management system (ISMS). An ISMS is a system of processes, documents, technology and people that helps to manage, monitor, audit and improve your organisation’s information security. Achieving ISO 27001 certification verifies that your company’s information security is managed in line with international best practice.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why Bug Bounties Matter

eSecurity Planet

Paying security researchers to find vulnerabilities can be a winning formula. Find out more in the first part of this eSecurity Planet series.

article thumbnail

NHS Digital release GDPR guidance for health and social care

IT Governance

NHS Digital today released guidance aimed at helping health and social care organisations achieve compliance with the General Data Protection Regulation (GDPR) by the 25 May deadline. The guidance highlights the changes that the GDPR will introduce against current guidelines in health and social care, and provides a checklist for healthcare providers and their supply chain to demonstrate compliance with the Regulation.

GDPR 56
article thumbnail

Tracking Bitcoin Wallets as IOCs for Ransomware

Dark Reading

By understanding how cybercriminals use bitcoin, threat analysts can connect the dots between cyber extortion, wallet addresses, shared infrastructure, TTPs, and attribution.

article thumbnail

Weekly discussion podcast: Critical Information Infrastructure, Part 3

IT Governance

This week’s extract is taken from Toomas Viira’s book Lessons Learned – Critical Information Infrastructure Protection , which is a vital source of information and thought-provoking insights into potential issues within critical information infrastructure (CII). Episode 3 – Critical Infrastructure: “. Information and communications technology (ICT) is a critical sector in many countries.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

One in Three SOC Analysts Now Job-Hunting

Dark Reading

The more experienced a SOC analyst gets, the more his or her job satisfaction declines, a new survey of security operations center staffers shows.

article thumbnail

FTC Releases PrivacyCon 2018 Agenda

Hunton Privacy

On February 6, 2018, the Federal Trade Commission (“FTC”) released its agenda for PrivacyCon 2018, which will take place on February 28. Following recent FTC trends, PrivacyCon 2018 will focus on privacy and data security considerations associated with emerging technologies, including the Internet of Things, artificial intelligence and virtual reality.

article thumbnail

Cyberattack Aimed to Disrupt Opening of Winter Olympics

Dark Reading

Researchers who identified malware targeting the 2018 Winter Olympics say the attackers had previously compromised the Games' infrastructure.

50
article thumbnail

Lucky Number 7 Has Arrived

The Texas Record

The SLRM Records Management Assistance team is pleased to introduce me, the 7th government information analyst, Andrew Glass! Originally hailing from Corpus Christi, I opted to stick to my roots and will be consulting for the East-South region of Texas. I am an experienced problem solver and have spent most of my adult life as a teacher or working in a library.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

AUSTRALIA: Review into Open Banking – Farrell Report released

DLA Piper Privacy Matters

By Peter Jones and Sinead Lynch. Following in the footsteps of Governments across international borders, the results of the long-awaited and much discussed Review into Open Banking in Australia were released late on Friday, 9 February, 2018. The 158 page report recommends a model for the introduction of open banking as part of the broader ‘Consumer Data Right’ introduced by the Government late last year.

Privacy 40
article thumbnail

Google to Mark All HTTP Websites 'Not Secure'

Dark Reading

Google will push websites to adopt HTTPS encryption by marking all HTTP sites as 'not secure' starting in July 2018.

article thumbnail

FRANCE: Draft Data Protection Law – One Step Closer to a Final Version

DLA Piper Privacy Matters

By Denise Lebeau-Marianna and Caroline Chancé. On 9 February 2018, the French National Assembly adopted at first reading the new draft data protection law implementing the EU General Data Protection Regulation (“GDPR”) and EU Data Protection Directive on Police and Criminal Justice Cooperation into French law. After two days of discussion and 180 amendments reviewed, the French National Assembly has adopted the draft law aimed at adapting the French data protection framework in anticipatio

GDPR 40