Thu.Mar 15, 2018

article thumbnail

5 Ways to Improve Insider Threat Prevention

Data Breach Today

If you browsed the latest security headlines, you'd probably think the majority of data breaches were related to hackers, political activists, malware or phishing. While the latter two hint at it, the truth is that nearly half of all data breaches can be traced back to insiders in some capacity.

article thumbnail

Migration is a good opportunity for some immediate quality wins

AIIM

The movement to the cloud is past the tipping point. Cloud solutions are no longer a question of “should we?” but rather “when?” Organizations may not be ready to go 100% to the cloud, but for nearly 80% of organizations, cloud is a critical part of their strategy. Consider this data from a Fall 2017 AIIM survey of 182 end user organizations: How do you view your delivery/deployment methods for content management over the next 2 years?

Cloud 89
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Health Data Breaches Added to Tally Vary Widely

Data Breach Today

Malware, Mailing Errors and More Reported on the 'Wall of Shame' Large breaches involving hackers continue to plague the healthcare sector this year, but incidents involving lower-tech issues, including mailing errors, also are persisting.

article thumbnail

Reader favorites March 2018: Our most popular RIM resources

TAB OnRecord

Our most popular resources this month cover cost savings, risk management and RIM training. Learn how to digitize paper documents, how to take the risk out of records retention, and how to decide if custom folders are right for your organization. Five keys to a successful digital document conversion Planning to digitize your files? [.] Read More. The post Reader favorites March 2018: Our most popular RIM resources appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

PCI Offers Lower Fees in Developing Markets

Data Breach Today

Part of Effort to Spread Use of Global Standards for Transactions The PCI Security Standards Council is offering 40 percent lower fees for participating organizations in nations with lower-income economies. "We want to encourage countries in Africa and South Asia to get engaged with us," Jeremy King, international director at PCI SSC, tells ISMG in an exclusive interview.

Marketing 113

More Trending

article thumbnail

OIG: HHS Improves Security, Yet Flaws Remain

Data Breach Today

List of Concerns Highlights Areas Others Should Scrutinize as Well HHS continues to improve its information security program, but it needs to take steps to address a number of ongoing weaknesses, according to a new watchdog agency report. What are those glaring weaknesses, which are also, unfortunately, common at many healthcare organizations?

Security 100
article thumbnail

Singapore Joins APEC Cross-Border Privacy Rules System and Privacy Recognition for Processors Program

Data Matters

On March 6, 2018, Singapore announced that it has joined the APEC Cross-Border Privacy Rules (CBPR) system as well as the APEC Privacy Recognition for Processors (PRP) program. Singapore is the sixth member of the CBPR system, which includes Canada, Japan, Korea, Mexico and the United States, and is the second member of the PRP program after the US.

Privacy 68
article thumbnail

Customer experience as a catalyst for digital transformation

OpenText Information Management

With 63% of Financial Services organizations either planning or formally engaged in digital transformation initiatives, how does a financial brand drive conversion, create loyalty and maintain a competitive edge? Customer experience is a catalyst in many digital transformation projects, as businesses invest in new digital technologies and processes to more effectively engage customers, partners or … The post Customer experience as a catalyst for digital transformation appeared first on Ope

article thumbnail

What is ISO 20000?

IT Governance

ISO 20000 is the international standard that describes best practice for IT service management (ITSM). It helps organisations evaluate how effectively they deliver managed services, measure service levels and assess their performance. It is strongly linked to ITIL ® , the most common approach for IT service management. The Standard is split into five parts: Part 1: Service management system requirements.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Let's Call it "Collabication"

Hanzo Learning Center

When Does “Collaboration” Simply Become “Communication”? Humans have been communicating for thousands of years. The earliest cave paintings date back 40,000 years to the Ice Age. And just as Prehistoric Man has evolved, so have the methods by which we connect with one another.

IT 66
article thumbnail

How to Secure ‘Permissioned’ Blockchains

Thales Cloud Protection & Licensing

Permissioned blockchains are growing in popularity as businesses attempt to cash in on the blockchain trend while keeping a firm hand on the tiller. Contrary to their non-permissioned cousins (such as bitcoin or Ethereum), permissioned blockchains are controlled by an authority that grants permission to every node that participates. In this blog ( originally published on Dark Reading), Duncan Jones, Head of Skunkworks at Thales eSecurity, Duncan discusses the characteristics of a perimissioned b

article thumbnail

Artificial Intelligence and the Attack/Defense Balance

Schneier on Security

Artificial intelligence technologies have the potential to upend the longstanding advantage that attack has over defense on the Internet. This has to do with the relative strengths and weaknesses of people and computers, how those all interplay in Internet security, and where AI technologies might change things. You can divide Internet security tasks into two sets: what humans do well and what computers do well.

article thumbnail

New Sanctions Against Russia Finally Take the Country's Online Chaos Seriously

WIRED Threat Level

From election meddling to NotPetya to grid hacking, Russia's digital provocations are no longer being ignored.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Walmart Jewelry Partner Exposes Personal Data Of 1.3M Customers

Threatpost

A Walmart jewelry partners' misconfigured AWS S3 bucket left personal details and contact information of 1.3 million customers in plain sight.

article thumbnail

Dispelling myths about the IBM Integrated Analytics System

IBM Big Data Hub

There are some misleading messages in the market about the IBM Hybrid Data Management and its data warehouse strategy. So here’s some clarification.

article thumbnail

GandCrab Ransomware Crooks Take Agile Development Approach

Threatpost

Despite setbacks hackers behind GandCrab malware are pushing ahead with lucrative new ransomware strain thanks to quick-and-dirty agile development approach.

article thumbnail

(ISC)2 Report: Glaring Disparity in Diversity for US Cybersecurity

Dark Reading

While the average US security salary is $122,000, the average salary for people of color is $115,000, with men identifying as minorities making $6000 more than minority women.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Iran-Linked Group ‘TEMP.Zagros’ Updates Tactics, Techniques In Latest Campaign

Threatpost

An Iran-linked group is linked to a massive spear phishing campaign that sends malicious Word Docs to victims in Asia and the Middle East.

article thumbnail

Voice-Operated Devices, Enterprise Security & the 'Big Truck' Attack

Dark Reading

The problem with having smart speakers and digital assistants in the workplace is akin to having a secure computer inside your office while its wireless keyboard is left outside for everyone to use.

article thumbnail

Hyperbole Swirls Around AMD Processor Security Threat

Threatpost

Security community takes a critical look at CTS-Labs' disclosure of vulnerabilities in AMD vulnerabilities found in EPYC servers, Ryzen workstationsm and Ryzen mobile offerings.

article thumbnail

Microsoft Report: Cybersecurity's Top 3 Threats Intertwine

Dark Reading

Botnets, ransomware, and simple attack methods dominate the threat landscape and build on each other to drive effectiveness.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Join us IN D.C. for Digital Government Institute's EDRM Conference AND EXPO March 22!

Gimmal

Later this month, records and information management professionals in the D.C. area will be gathering for the Digital Government Institute's 15th annual E-Discovery, Records & Information Management Conference & Expo. This event will focus on the best ways to securely store, access and manage important government records.

article thumbnail

Online Ads vs. Security: An Invisible War

Dark Reading

Why visiting one website is like visiting 50, and how you can fight back against malvertisers.

article thumbnail

Russian hackers attacking U.S. power grid, aviation, FBI Warns

Information Management Resources

Cybercriminals are conducting a broad assault on the U.S. electric grid, water processing plants, air transportation facilities and other targets, according to government officials.

article thumbnail

Cryptojacking Threat Continues to Rise

Dark Reading

Unauthorized cryptocurrency mining can consume processing power and make apps unavailable as well as lead to other malware.

Mining 45
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Mary Mack of ACEDS: eDiscovery Trends 2018

eDiscovery Daily

This is the second of the 2018 Legaltech New York (LTNY) Thought Leader Interview series. eDiscovery Daily interviewed several thought leaders at LTNY this year (and some afterward) to get their observations regarding trends at the show and generally within the eDiscovery industry. Today’s thought leader is Mary Mack of ACEDS. Mary is the Executive Director of the Association of Certified eDiscovery Specialists (ACEDS).

article thumbnail

Palo Alto Buys Evident.io to Secure the Cloud

Dark Reading

The $300 million deal is part of an industry-wide consolidation of cloud, data, and network security companies.

Cloud 45
article thumbnail

A tactical 5-step model for achieving GDPR compliance

Information Management Resources

It’s imperative to understand what the General Data Protection Regulation is at its core – having the ability to store and process personal data securely, responsibly and lawfully.