Wed.Jun 06, 2018

article thumbnail

7 reasons why provider data is often inaccurate

Information Management Resources

The problem spans providers, payers and government agencies, says Atul Pathiyal.

article thumbnail

Managing Digital Security as Risk and Complexity Rise

Thales Cloud Protection & Licensing

Gartner defines digital risk management as “the integrated management of risks associated with digital business components, such as cloud, mobile, social, big data, third-party technology providers, OT and the IoT.” And, as we’ve all seen, the failure to manage digital risks can have a negative impact on the reputation, operations and market value of affected enterprises.

Risk 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

With predictive maintenance, AI keeps the wheels rolling

OpenText Information Management

Whether you’re talking about a fleet of city buses, a coffee chain’s espresso machines, an office’s networked laptops and printers, or even a natural gas pipeline, these things need regular restocking and servicing to avoid breakdowns. You want to avoid disruptions in service, unhappy customers, revenue losses, maybe even threats to public safety. The traditional … The post With predictive maintenance, AI keeps the wheels rolling appeared first on OpenText Blogs.

article thumbnail

Congress Considers Ways to Beef Up Healthcare Cybersecurity

Data Breach Today

At Hearing, and in Letter, Concerns Raised About Confusion Over HHS's Role Congress is considering how to help beef up the healthcare sector's preparedness and response to cyber threats. But why is there so much confusion about the role of the Department of Health and Human Services?

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Australia drafts laws forcing Facebook and Google to reveal encrypted data

The Guardian Data Protection

Security agencies would be given access to encrypted messaging apps under bid to ‘modernise’ laws Technology companies such as Facebook and Google would be forced to give Australian security agencies access to encrypted data under legislation to be introduced by the Turnbull government. But the government has refused to say how the security agencies would access the data.

More Trending

article thumbnail

Ten best practices for a successful RIM training program – Part one

TAB OnRecord

As you begin new records and information management programs, you will inevitably encounter the challenge of how to train employees and enlist their cooperation. In this two-part blog post, we share the ten best practices for a successful records and information management training program. Obtain senior management endorsement Your training program will have its [.

article thumbnail

LabMD Wins Court Battle Over FTC Security Enforcement

Data Breach Today

Appellate Court Throws Out Enforcement Action in Dispute Dating Back to 2013 LabMD, a now-defunct cancer testing laboratory, has won a major victory in its longstanding legal dispute with the Federal Trade Commission. A U.S. Court of Appeals on Wednesday vacated an FTC enforcement action against the lab in a data security dispute dating back to 2013.

Security 100
article thumbnail

Germany: First court decision on GDPR

DLA Piper Privacy Matters

Only five days after the GDPR became applicable, the first German court, the Regional Court ( Landgericht ) Bonn (in a decision dated 29 May 2018, case number 10 O 171/18 – in German only), issued a ruling on the practical application of the GDPR. This probably makes the court’s ruling the first GDPR court decision worldwide, and the decision addressed the hot-button issue of public availability of ICANN “WHOIS data”.

GDPR 75
article thumbnail

The GDPR: What do I need to do?

IT Governance

Although the EU General Data Protection Regulation (GDPR) has come into effect, a large number of organisations are not yet compliant. A Ponemon Institute survey found that almost half of companies would not meet the 25 May 2018 deadline. So, if you haven’t finished your compliance project or have only just started, don’t panic – you’re not alone. To help, IT Governance has created a checklist to highlight the essential steps your organisation must take in order to become GDPR compliant.

GDPR 73
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Turnbull would 'love to see' Facebook's Zuckerberg face Australian MPs

The Guardian Data Protection

Intelligence committee wants to know what data was shared with Chinese firms and why Malcolm Turnbull would “love to see the boss” of Facebook appear before Australia’s intelligence committee, as parliament grapples with new security threats wrought by global internet and social network giants. After coming to terms on the government’s proposed foreign interference and espionage laws, which are expected to have bipartisan support when the joint committee hands down its report later on Thursday ,

article thumbnail

Coca-Cola data breach affects thousands of employees

IT Governance

It has been revealed that Coca-Cola suffered a data breach in September 2017, but was asked not to disclose it by law enforcement while the incident was being investigated. The breach occurred when a former employee took a hard drive containing the personal data of about 8,000 Coca-Cola employees. A Coca-Cola spokesperson said: “We are issuing data breach notices to about 8,000 individuals whose personal information was included in computer files that a former employee took with him when he left

article thumbnail

An Encryption Upgrade Could Upend Online Payments

WIRED Threat Level

While ditching TLS 1.0 encryption will benefit the payments ecosystem, it'll be rough going for those with older devices.

article thumbnail

Conversation with TSLAC Archivist About Meeting Minutes

The Texas Record

Bound Railroad Commission Minutes from the early 20th Century. Minutes are produced by every local government and state agency in Texas. They are afforded the most enduring retention period of PERMANENT for both Local Governments and State Agencies. In TSLAC’s state agency schedule minutes are given the distinct honor of being the only series on the schedule that requires BOTH permanent retention by the agency and transfer to the State Archives.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Infographic: 5 benefits of distance learning

IT Governance

This month, IT Governance launched its ISO27001 Certified ISMS Foundation (Distance Learning) training course. This modular recording of our popular one-day classroom course is the ideal starting point for all prospective ISO 27001 project managers and auditors, or anyone who wishes to build a career in information security management. It provides a straightforward and cost-effective route to understanding the key elements required to achieve compliance with the Standard.

article thumbnail

Former Cambridge Analytica CEO Alexander Nix Testifies Before Parliament

WIRED Threat Level

Alexander Nix testified before Parliament, but provided more bluster than answers.

article thumbnail

The GDPR: What will happen when the UK leaves the EU?

IT Governance

There are less than ten months until Brexit, and we still know little about the process other than the fact that it “means Brexit”. Questions remain over everything from trade deals to the rights of ex-pats, but one issue that has been sorted is the future of the UK’s data protection laws. The relatively swift handling of this issue is mostly because of the EU General Data Protection Regulation (GDPR) , a law that came into force two months before the Brexit vote and which the UK government knew

GDPR 58
article thumbnail

The Habituation of Security Warnings

Schneier on Security

We all know that it happens: when we see a security warning too often -- and without effect -- we start tuning it out. A new paper uses fMRI, eye tracking, and field studies to prove it.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

'Strutting' Past the Equifax Breach: Lessons Learned

Dark Reading

In hindsight, there were two likely causes for last year's massive breach: the decision to use Apache Struts, and a failure to patch in a timely fashion. Both are still a recipe for disaster.

48
article thumbnail

Customer experience in Financial Services

OpenText Information Management

In a recent blog, I wrote about the increasing prominence of AI in financial services. It’s one of the areas I’ll be presenting on at this year’s OpenText™ Enterprise World, our annual customer conference. The other session I’ll be holding is around customer experience. It’s a hot topic that’s topping the agenda of most financial … The post Customer experience in Financial Services appeared first on OpenText Blogs.

article thumbnail

Survey Shows Florida at the Bottom for Consumer Cybersecurity

Dark Reading

A new survey shows that residents of the Sunshine State engage in more risky behavior than their counterparts in the other 49 states.

article thumbnail

VPNFilter Malware Impact Larger Than Previously Thought

Threatpost

Researchers said they now believe the malware has infected twice the number of router brands than previously stated and that the malware packs a much deadlier punch.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Gartner Security Summit: Enterprises, Vendors Respond to Cybercriminals

eSecurity Planet

Vulnerabilities abound and cybercriminals are more aggressive than ever, but enterprises and security vendors are responding.

article thumbnail

Zip Slip Flaw Affects Thousands of Open-Source Projects

Threatpost

An exploit allows attackers to remotely overwrite archive files with their own content, and from there pivot to achieving remote command execution on the machine.

article thumbnail

VPNFilter Poses Broader Threat Than First Thought; Endpoints At Risk Too

Dark Reading

New research shows the router and NAS system malware affects more vendor devices as well, Cisco Talos says.

Risk 55
article thumbnail

Making sense of all that IoT data

RFID Global Solution, Inc.

Making sense of all that IoT data by Diana Hage The ability to know where something or someone is located is core to many companies’ success. Having that level of granular information at one’s fingertips changes the way business managers can make rapid, data-driven decisions. Without a doubt, knowing where something is located is highly … Making sense of all that IoT data Read More ».

IoT 40
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Five Indicted for Conning Target, Shoppers Out of Nearly $800K

Dark Reading

Members of a fraud ring were charged with compromising Target's internal gift-card system and defrauding customers out of almost $800,000.

48
article thumbnail

GDPR, ePrivacy-Regulation and social media – What to know

Data Protection Report

In addition to several changes to existing rules on data protection , the EU General Data Protection Regulation ( GDPR ) does also have a considerable impact on online marketing and social media, affecting in particular business models based on advertising tools such as tracking pixels, placed advertisements or social plug-ins. Legitimate interest for online marketing pursuant to the GDPR.

GDPR 40
article thumbnail

Digital Banking Trends Survey Identifies Robotic Process Automation Software as a Promising New Technology

Info Source

Irvine, CA, June 6, 2018 – Kofax ® , a leading supplier of software to automate and digitally transform information intensive processes, today announced the results of a global survey of 100 leading financial institutions conducted in conjunction with Digital Banking Trends, the banking industry’s innovative resource providing news, analysis and opinion on the business of digital banking, fintech and financial services.