Fri.Apr 20, 2018

article thumbnail

Abbott Issues Software Patches for More Cardiac Devices

Data Breach Today

Updates Address Cybersecurity, Battery Problems Abbott Laboratories has issued software updates for certain implantable cardiac devices to address cybersecurity flaws and battery issues that pose potential safety risks to patients. The problems were also the subject of previous warnings by two federal agencies.

article thumbnail

Cybercrime Economy Generates $1.5 Trillion a Year

Dark Reading

Threat actors generate, launder, spend, and reinvest more than $1.5 trillion in illicit funds, according to a new study on cybercrime's 'web of profit.

81
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GRC Evolves Into Integrated Risk Management

Data Breach Today

Rsam's Vivek Shivananda on How the New Approach Solves a Classic Problem As corporate information silos fall, traditional approaches to governance, risk and compliance are giving way to the new category of integrated risk management solutions. Vivek Shivananda, CEO of Rsam, discusses the evolution.

Risk 100
article thumbnail

Why Police Should Monitor Social Media to Prevent Crime

WIRED Threat Level

Opinion: Citizens may object to their social media posts being mined by law enforcement, but the practice can keep the public safe.

Mining 83
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

The Rise of Microsegmentation

Data Breach Today

Tom Patterson of Unisys Opens Up on Network Security and Behavioral Biometrics In today's extended enterprise, with organizations leveraging supply chains and the cloud, microsegmentation has become a hot network security technology. Tom Patterson of Unisys discusses the trend, as well as behavioral biometrics.

Cloud 100

More Trending

article thumbnail

US: CLOUD ACT BOLSTERS US GOVERNMENT POWERS TO OBTAIN DATA STORED ABROAD

DLA Piper Privacy Matters

After several years of uncertainty over the US government’s power to reach data stored overseas, Congress has enacted the Clarifying Lawful Overseas Use of Data Act (the CLOUD Act). Signed into law by the President, the CLOUD Act amends the Stored Communications Act to confirm that the US government may obtain data stored abroad. The CLOUD Act also allows foreign governments under some circumstances to obtain data stored within the United States.

Cloud 61
article thumbnail

Google vs the right to be forgotten: Chips with Everything podcast

The Guardian Data Protection

In April 2018, Google lost a landmark case against a businessman who used his ‘right to be forgotten’ to have links to a previous conviction taken down from the search engine. Jordan Erica Webber discusses the importance of this case and looks ahead at the coming era of General Data Protection Regulation Subscribe and review: Acast , Apple , Spotify , Soundcloud , Audioboom , Mixcloud.

GDPR 58
article thumbnail

URLs Aren’t Archives ¯_(?)_/¯, and Other Stories

The Schedule

I have not spent much time in recent months following the travails of media organizations such as Gawker and the Gothamist other than to casually peruse tweets on my timeline. A retweet caught my eye the other day, and here we are. Today’s post is mainly in response to “ Digital Media and the Case of the Missing Archives ,” written by Danielle Tcholakian who in turn seems to have been inspired by an article in the Columbia Journalism Review.

article thumbnail

Trust: The Secret Ingredient to DevSecOps Success

Dark Reading

Security practitioners must build trusted relationships with developers and within cross-functional DevOps teams to get themselves embedded into continuous software delivery processes.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

HackerOne CEO Talks Bug Bounty Programs at RSA Conference

Threatpost

Can bug bounty programs be designed to protect consumer privacy and how do programs balance white hat disclosure versus companies sitting on vulnerabilities until they are fixed?

Privacy 44
article thumbnail

Weekly Update 83

Troy Hunt

I'm home! Home is good. My travel stats for this year - not so good. As I say in the video, I need to fix this so at this stage, I'm saying "no" to pretty much everything in the second half of the year that involves international travel and I'll just do the exceptionally awesome stuff. But be that as it may, there's a bunch of other stuff to talk about this week including 3 new blog posts.

IT 43
article thumbnail

Podcast: How Millions of Apps Leak Private Data

Threatpost

Threatpost's Tom Spring talked to Roman Unuchek, senior malware analyst at Kaspersky Lab, about his discoveries this week at the RSA Conference.

46
article thumbnail

Understanding fast data and its importance in an IoT-driven world

Information Management Resources

Processing high volumes and continuous streams of information in real-time with low to medium latency, it is scalable, has a high uptime and can quickly recover from failure situations.

IoT 43
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Akamai CSO Talks Cryptominers, IoT and the Reemergence of Old Threats

Threatpost

Andy Ellis, CSO Akamai, discusses how the company works with others within the cybersecurity landscape to help keep the internet safe.

IoT 44
article thumbnail

At RSAC, SOC 'Sees' User Behaviors

Dark Reading

Instruments at the RSA Security Operations Center give analysts insight into attendee behavior on an open network.

article thumbnail

GDPR can't fix stupid

Information Management Resources

The General Data Protection Regulation will not be a cure-all for the world’s data privacy problems simply because, like every law, it is subject to the bureaucracy out of which it was born.

GDPR 34
article thumbnail

Biometrics Are Coming & So Are Security Concerns

Dark Reading

Could these advanced technologies be putting user data at risk?

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Blockchain is about to revolutionize the shipping industry

Information Management Resources

To make it work, dozens of shipping lines and thousands of related businesses around the world will have to work out a protocol that can integrate all the new systems onto one vast platform.

article thumbnail

SunTrust Ex-Employee May Have Stolen Data on 1.5 Million Bank Clients

Dark Reading

Names, addresses, phone numbers, account balances, may have been exposed.

45
article thumbnail

Organizations should take steps to make data centers go 'green'

Information Management Resources

While tech giants have started to take the lead on ensuring environmentally conscious data centers, it is time to consider new standards that will serve as a guidepost for the industry.

IT 31
article thumbnail

02-16-18

Info Source

DIR 2-16-2018. Tweet.

40
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Why Facebook fears the EU's new privacy rules

Information Management Resources

The best indication that the firm isn't actually 'sorry' is the social network's intention to change its terms of service to put all non-European users under the jurisdiction of its U.S. headquarters.

Privacy 31
article thumbnail

We’re Less Than A Month Away From The CIGO Summit in Chicago, May 9-10!

IGI

CLICK HERE TO REGISTER. We are now less than a month away from the Fourth Annual Chief Information Governance Officer (CIGO) Summit on May 9th & 10th in Chicago at the beautiful DBR Skyview Conference Center. The CIGO Summit is a by-invitation-only, executive event for senior leaders in cybersecurity, information management, law, privacy, data analytics, records management, compliance, and other IG-related disciplines.

article thumbnail

More organizations putting focus on customer data integration

Information Management Resources

Many are using graph database technology to provide the necessary relationship mapping, combined with master data management, data federation and artificial intelligence.

article thumbnail

Weekly podcast: Russia warning, RBKC fined and TaskRabbit breached

IT Governance

This week, we discuss an alert from the NCSC, US DHS and FBI, a £120,000 fine for the Royal Borough of Kensington and Chelsea, and a data breach at IKEA’s TaskRabbit marketplace. Hello and welcome to the IT Governance podcast for Friday, 20 April 2018. Here are this week’s stories. The UK’s National Cyber Security Centre (NCSC) has issued a joint Technical Alert with the US Department of Homeland Security (DHS) and the FBI about malicious cyber activity carried out by the Russian governmen

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Alphabet's Schmidt says AI good for defense as Googlers disagree

Information Management Resources

At a Congressional committee hearing, the corporate director gave a strong endorsement of the Pentagon’s proposal for a new artificial intelligence center and its collaboration with technology companies.

article thumbnail

Belgian Privacy Commission Issues Recommendation on Data Protection Impact Assessment

Hunton Privacy

The Belgian Privacy Commission (the “Belgian DPA”) recently released a Recommendation (in French and Dutch ) on Data Protection Impact Assessment (“DPIA”) and the prior consultation requirements under Articles 35 and 36 of the EU General Data Protection Regulation (“GDPR”) (the “Recommendation”). The Recommendation aims to provide guidance on the core elements and requirements of a DPIA, the different actors involved and specific provisions.

Privacy 58
article thumbnail

A breach from within: Why JPMorgan fired lead security staffer

Information Management Resources

The firing happened in 2013 after the staffer gained access to emails from top executives and shared them outside the company, according to a news report.