Mon.May 21, 2018

article thumbnail

Blockchain Unchained - Discovering its Potential in Information Management

AIIM

Blockchain is the hot topic of the IT industry – the explosive and rapid growth of BitCoin has taken the obscure technology of distributed ledgers into mainstream consciousness. But the question we want to ask is “ Does Blockchain have a role to play in Information Management? Does it have a role beyond cryptocurrencies? ”. The short answer to that question is yes, and it could become one of the most important innovations for our industry in decades.

article thumbnail

Most GDPR emails unnecessary and some illegal, say experts

The Guardian Data Protection

Many firms have the required consent already; others don’t have consent to send a request The vast majority of emails flooding inboxes across Europe from companies asking for consent to keep recipients on their mailing list are unnecessary and some may be illegal, privacy experts have said, as new rules over data privacy come into force at the end of this week.

GDPR 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GDPR Compliance for US Healthcare: What You Need to Know

Data Breach Today

Strict HIPAA compliance is a great preparation for compliance with the European Union's General Data Protection Regulation, which will be enforced starting May 25, according to attorneys Robert Stankey and Adam Greene, who provide compliance insights in an in-depth interview.

article thumbnail

What is GDPR and how will it affect you?

The Guardian Data Protection

The EU’s General Data Protection Regulation comes into force this week – here’s what it means You could be forgiven for thinking that Europe’s General Data Protection Regulation (GDPR) is a law created to fill your inbox with identikit warnings from every company you have ever interacted with online that “the privacy policy has changed” and pleas to “just click here so we can stay in touch”.

GDPR 104
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

DDoS Attacker Receives 15-Year Sentence

Data Breach Today

Convicted Felon John Gammell Pleaded Guilty to Disruptions, Possessing Firearms John Gammell of New Mexico has been sentenced to serve 15 years in prison for launching DDoS attacks against prior employers and business competitors, as well as for being a convicted felon in possession of firearms.

140
140

More Trending

article thumbnail

Websites Still Under Siege After 'Drupalgeddon' Redux

Data Breach Today

Unpatched Websites Provide Easy Targets for Attackers Patching a content management system has never been a straightforward affair, and the carnage from back-to-back critical vulnerabilities in the Drupal CMS continues to play out. Unpatched, hacked Drupal sites are delivering virtual currency miners, and in some cases malware.

CMS 133
article thumbnail

Data protection and the NHS | Letters

The Guardian Data Protection

Jon Baines says NHS trusts and others misunderstand the General Data Protection Regulation, Richard Stallman says personal data is only harmless when not collected, and John Chen of BlackBerry says individuals should own their own data The General Data Protection Regulation does not require organisations to contact consumers to obtain approval for further communications (however the contact details were originally collected).

GDPR 62
article thumbnail

FCC to Investigate US Mobile Phone Location-Revealing Flaw

Data Breach Today

Senator Urges US Communications Regulator to Expand Inquiry Following the disclosure of a flaw in the website of LocationSmart that could have been easily exploited to track the location of cellular phone users throughout the U.S. in real time, the Federal Communications Commission has referred the matter to its enforcement bureau for investigation.

article thumbnail

The Guardian view on AI in the NHS: a good servant, when it’s not a bad master | Editorial

The Guardian Data Protection

The NHS collects vast amounts of data. It must be used in imaginative ways that respect privacy and make life better for patients and health workers Technology helps us live better and for longer; in fact it has been doing so since the birth of modern medicine. And as each new technology comes into use, it turns out to have medical uses, even though these are not always the ones that are sold hardest: in the 1920s the American press was full of advertisements for the health benefits of radium, w

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

GDPR: The Looming Impact on US Banks

Data Breach Today

The EU's General Data Protection Regulation, which will be enforced beginning May 25, has significant implications for how financial institutions worldwide handle customer data, says Brett King, CEO of Moven, an all-digital bank, who sizes up the challenges.

GDPR 113
article thumbnail

FRANCE: The new data protection law under Constitutional review

DLA Piper Privacy Matters

By Denise Lebeau-Marianna and Caroline Chancé. The newly adopted French data protection law is already challenged by Senators who requested a constitutional review the day after the new law’s adoption. This had been announced: at least 60 Senators have referred the new French data protection law to the French Constitutional Council. Despite the accelerated procedure initiated by the Government in December 2017, it is unlikely that the law will be promulgated on time for the entry into appl

GDPR 58
article thumbnail

Procrastinators' Guide to GDPR Compliance

Data Breach Today

Organizations Are Not as Ready as They Might Believe If you're paying attention, you've probably already seen a handful of GDPR-related headlines just today, let alone in the last week or month. But there are two good reasons for the deluge of GDPR discussion right now: It's incredibly important and the time to act is now.

GDPR 100
article thumbnail

Machine learning everywhere: IBM banks on trust and open standards

IBM Big Data Hub

Hear from IBM's Dinesh Nirmal on his thoughts on AI and the potential for widespread adoption as IBM puts its weight behind enterprise data science.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Google to Delete 'Secure' Label from HTTPS Sites

Dark Reading

Google acknowledges HTTPS as the Internet standard with plans to remove 'secure' from all HTTPS sites.

article thumbnail

Japan's Directorate for Signals Intelligence

Schneier on Security

The Intercept has a long article on Japan's equivalent of the NSA: the Directorate for Signals Intelligence. Interesting, but nothing really surprising. The directorate has a history that dates back to the 1950s; its role is to eavesdrop on communications. But its operations remain so highly classified that the Japanese government has disclosed little about its work ­ even the location of its headquarters.

article thumbnail

Get Smart About Network Segmentation & Traffic Routing

Dark Reading

Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.

52
article thumbnail

TeenSafe Tracking App Exposes Thousands of Private Records

Threatpost

Records for a mobile app that parents can use to monitor what their kids are doing online has been exposed in the latest Amazon Web Services cloud misconfiguration.

Cloud 42
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Laying the foundation for cybersecurity

CGI

Laying the foundation for cybersecurity. premanath.puch…. Mon, 05/21/2018 - 05:13. At a recent technology breakfast, I heard an attendee ask a speaker about an approach to modernize security. The question reminded me of a thought I’ve had often: You can’t build without a foundation. Modernizing security sounds like a great goal, but the reality is, most organizations are still struggling with the basic elements of securing information and information assets.

article thumbnail

Where is the content in collaboration?

Attensa

The adoption of workstream tools is impressive. Slack alone has grown at a rate that makes it the fastest growing business application to-date. Microsoft Teams and the many other viable workstream tools are joining the movement and there is a clear epic being written about how the workstyles of teams are changing. Traditionally, content has been crucial to many business processes.

IT 40
article thumbnail

FCC Seeks to Refresh the TCPA Record

HL Chronicle of Data Protection

Now that the dust has settled from the D.C. Circuit’s highly anticipated Telephone Consumer Protection Act decision in ACA International, et al, v. FCC , the Federal Communications Commission is going back to the drawing board in a new Public Notice that seeks comment on foundational TCPA issues. In March, the D.C. Circuit struck down the FCC’s 2015 interpretation of the definition of “automatic telephone dialing system” (autodialer) as overly broad, arbitrarily vague, and “utterly unreasonable.

article thumbnail

Wicked Botnet Uses Passel of Exploits to Target IoT

Threatpost

The code is integrated with at least three exploits that target unpatched IoT devices, including closed-circuit cameras and Netgear routers.

IoT 45
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Dark Reading Conference Call for Speakers Closes Friday

Dark Reading

Don't be shy, security practitioners. Share your best practices at our 2nd annual INsecurity Conference, to be held Oct. 23-25 in Chicago.

article thumbnail

Roaming Mantis Swarms Globally, Spawning iOS Phishing, Cryptomining

Threatpost

Analysis shows that the malware, previously a banking trojan focused on Android devices, has rapidly evolved just in the past month.

article thumbnail

North Korean Defectors Targeted with Malicious Apps on Google Play

Dark Reading

Sun Team hacking group is behind RedDawn, which steals victims' photos and data and passes them to threat actors.

49
article thumbnail

Weighing the pros and cons of database-as-a-service

Information Management Resources

When considering DBaaS, there are numerous quick decisions an organization has to make about data handling which, if incorrect, are difficult and costly to fix.

41
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

eDiscovery for the Rest of Us: eDiscovery Best Practices, Part Three

eDiscovery Daily

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. He has also been a great addition to our webinar program, participating with me on several recent webinars. Tom has also written several terrific informational overview series for CloudNine, including eDiscovery and the GDPR: Ready or Not, Here it Comes (which we covered as a webcast ), Understanding eDiscovery in Criminal Cases (which we also covered as a

article thumbnail

'Roaming Mantis' Android Malware Evolves, Expands Targets

Dark Reading

Roaming Mantis has evolved rapidly, adding geographies, platforms, and capabilities to its original scope.

IT 45
article thumbnail

Malicious PHP Script Infects 2,400 Websites in the Past Week

Threatpost

A botnet called Brain Food is pushing diet pills via infected WordPress and Joomla websites.