Wed.Apr 04, 2018

article thumbnail

Should HHS Offer Incentives for Cybersecurity Frameworks?

Data Breach Today

AMA Proposes Exemption from HIPAA Risk Analysis for Doctors Who Use a Framework Should federal regulators provide physicians with a free pass from having to conduct a HIPAA risk analysis or face a random HIPAA compliance audit if they implement a cybersecurity framework? That's what the AMA is proposing. Security experts weigh in with reactions.

article thumbnail

Thales Executives Speak to Press about UK Cybersecurity Developments

Thales Cloud Protection & Licensing

Thales eSecurity’s CTO Jon Geater and Peter Carlisle , Thales eSecurity’s VP of Sales, EMEA, were recently featured in major news outlets espousing their opinions about internet-connected devices and the new Cyber Security Export Strategy. Geater, on new UK IoT security guidelines. Earlier this month, the UK government announced guidelines to make internet-connected devices safer.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facebook's Zuckerberg: GDPR Won't Apply Worldwide

Data Breach Today

CEO Says Compliance Outside EU Should Be 'In Spirit' of GDPR Facebook CEO Mark Zuckerberg says the social networking company is already complying with parts of Europe's GDPR privacy legislation, but it won't comply with all of its requirements worldwide. Zuckerberg's comments are likely to rile critics following the uproar around voter-profiling firm Cambridge Analytica.

GDPR 127
article thumbnail

Facebook refuses to promise GDPR-style privacy protection for US users

The Guardian Data Protection

Firm working on version of EU data protection law but Mark Zuckerberg stops short of confirming all changes will apply to US users Facebook is rolling out stronger privacy protections to users ahead of the introduction of Europe’s General Data Protection Regulation (GDPR), but Mark Zuckerberg will not promise all future changes will apply to the company’s American users.

GDPR 94
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Panera Bread Security Lesson: Rise to the Challenge

Data Breach Today

Leaving API Endpoint Exposed After Researcher's Alert Was Recipe for Failure Panera Bread appears to have failed to fix a customer data leak for more than eight months after getting a heads-up from an independent security researcher. Here's what others should learn from the bakery café chain's mistakes.

Security 100

More Trending

article thumbnail

Facebook suspects 300,000 Australians had data shared with Cambridge Analytica

The Guardian Data Protection

Chief technology officer reveals 87 million users worldwide had data harvested Facebook has admitted that the data of more than 300,000 Australians might have been “improperly shared” with Cambridge Analytica. The social media giant’s chief technology officer, Mike Schroepfer, published a statement overnight which revealed the data of up to 87 million people across the globe had been shared with the analytics firm, 37 million more than previously reported.

article thumbnail

Why risk assessments are essential for GDPR compliance

IT Governance

Any organisation that’s required to comply with the EU General Data Protection Regulation (GDPR) needs to conduct regular risk assessments. This isn’t just because the Regulation says so; it’s because risk assessments are an essential part of cyber security, helping organisations address an array of problems that, if left unchecked, could cause havoc.

GDPR 81
article thumbnail

Insecure SCADA Systems Blamed in Rash of Pipeline Data Network Attacks

Threatpost

After a cyberattack shut down numerous pipeline communication networks this week experts are stressing the importance of securing third-party systems in supervisory control and data acquisition (SCADA) environments.

article thumbnail

Analytics and AI. The rise of the data-driven manufacturer

OpenText Information Management

Times are tough. Global economic growth for the manufacturing sector is slow with few signs of recovery. Companies have worked hard to reduce costs and boost productivity. There’s now really only one asset that hasn’t been optimized: corporate data. Manufacturing firms are still a long way off fully exploiting the mountains of data they produce. … The post Analytics and AI.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Intel Halts Spectre Fixes On Older Chips, Citing Limited Ecosystem Support

Threatpost

Intel has halted patches for older chips addressing the Spectre vulnerability, according to a recent microcode update.

Cloud 75
article thumbnail

7 principles of the PRINCE2 project management method

IT Governance

Project management methods are a set of inter-related phases, activities and tasks that define a project process from start to finish. In the UK, one of the most widely known and established project management approaches is PRINCE2 ®. PRINCE2 deals with the organisation, management and control of projects. 7 principles of PRINCE2. There are seven principles that should be met in a PRINCE2 project: Continued business justification – a project should be justified in its original expenditure commit

Risk 58
article thumbnail

GDPR. Forget bitcoin, data is the new currency of retail

OpenText Information Management

On May 25, 2018, the new EU data privacy regulation, known as the General Data Protection Regulation (GDPR), comes into force. Shortly after that the sky falls in and the world ends. Well, it does if some of the press comment is to be believed. But what if, just if, it’s not that bad? For … The post GDPR. Forget bitcoin, data is the new currency of retail appeared first on OpenText Blogs.

Retail 54
article thumbnail

Mark your calendars: Mandatory data-breach notification rules come into force November 1

Privacy and Cybersecurity Law

via Anca Sattler, Dentons Canada LLP. The federal government released an Order in Council , dated March 26, 2018, announcing that the mandatory data-breach notification rules will come into force on November 1, on the recommendation of Navdeep Bains, Minister of Industry, Science and Economic Development. After nearly three years, sections 10, 11, and 14, subsections 17(1) and (4) and sections 19 and 22 to 25 of the Digital Privacy Act, Chapter 32 will come into effect to amend the Personal Info

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

One-Third of Internal User Accounts Are 'Ghost Users'

Dark Reading

Attackers and malware can easily move laterally through an organization, thanks to inadequate access controls on file systems and a proliferation of inactive but enabled users.

Access 50
article thumbnail

Mark your calendars: Mandatory data-breach notification rules come into force November 1

Privacy and Cybersecurity Law

The federal government released an Order in Council, dated March 26, 2018, announcing that the mandatory data-breach notification rules will […].

article thumbnail

Intel Tells Remote Keyboard Users to Delete App After Critical Bug Found

Threatpost

Intel said it is lights out for its Remote Keyboard app just as security researchers find three vulnerabilities that let local attackers inject keystrokes in sessions.

article thumbnail

5 Critical Questions You Need to Ask About Your Sensitive Data

OpenText Information Management

Data privacy regulations, interconnectivity (virtual machines, cloud, IoT, BYOD), and cyber threats are changing the global digital landscape. With this transformation comes inherent risk, and adapting to a data-centric mindset can reduce compliance risk and mitigate damage in the event of a cyber attack. When evaluating your organization’s data strategy, it’s important to ask five … The post 5 Critical Questions You Need to Ask About Your Sensitive Data appeared first on OpenText Blogs.

IoT 45
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Active Cyber Defense Is an Opportunity, Not a Threat

Dark Reading

If honest citizens can be tracked online with cookies and beacons that share where we are and what we are doing, then why should security professionals restrict their ability to hack attackers?

article thumbnail

Thanks to Facebook, expect GDPR to spread beyond the EU

Information Management Resources

The strong and immediate reaction to this data misuse incident should serve as a warning shot for all companies collecting and using consumer personal data.

GDPR 53
article thumbnail

How Gamers Could Save the Cybersecurity Skills Gap

Dark Reading

McAfee shares its firsthand experience on training in-house cybersecurity pros and publishes new data on how other organizations deal with filling security jobs.

article thumbnail

Facebook Bolsters Privacy Measures With New Data Access Restrictions

Threatpost

Facebook on Wednesday listed a number of new data access restrictions it is implementing as the social media company looks to prioritize privacy for end users.

Access 45
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Securing Retail Networks for an Omnichannel Future

Dark Reading

Retailers who haphazardly move to digital from a brick-and-mortar environment can leave their businesses open to significant cybersecurity vulnerabilities. Here's how to avoid the pitfalls.

Retail 43
article thumbnail

The Sainsbury Archive to create new cloud-based digital archive

Preservica

The Sainsbury Archive, which charts the growth and history of one of the UK's largest supermarkets, has chosen Preservica's AWS cloud-hosted digital preservation platform to actively preserve invaluable digital assets relating to the company's operations. Featured in Retail Technology Review, Marcela Bonthron, Sainsbury's Archive Co-ordinator said: "Previously we'd been using local servers to store Sainsbury archive valuable data and records, but the need for a robust approach to digital preserv

article thumbnail

Off the Record: Ransomware Threats and RM Modernization, Apple Promotes Access and Washington Denies Access

The Texas Record

Tune in monthly for a curated collection of articles we found interesting on a broad range of topics; some which are directly related to records management and others which might share common themes. No, we didn’t write these articles —hence the name of this series, “Off the Record”— but fortunately, we didn’t need to in order to share the knowledge with our subscribers.

Access 40
article thumbnail

Kofax Accelerates Digital Transformation in the Insurance Industry

Info Source

Irvine, CA, April 4, 2018 – Kofax ® , a leading provider of software to simplify and transform the First Mile of business, today announced that Kofax TotalAgility® is accelerating the digital transformation efforts of half of the top-ranked life insurers in the U.S. By digitizing critical touchpoints—such as onboarding new policy holders, processing insurance claims and provisioning services—the TotalAgility platform helps accelerate customer journeys to a positive outcome, delivering a friction

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Iran 'the New China' as a Pervasive Nation-State Hacking Threat

Dark Reading

Security investigations by incident responders at FireEye's Mandiant in 2017 found more prolific and sophisticated attacks out of Iran.

article thumbnail

$1M salaries for top AI talent? You bet, says Japan

Information Management Resources

Dizzying paychecks for tech talent are also becoming the norm in China, where compensation at one of the nation’s largest startups can exceed $3 million.

article thumbnail

Microsoft Patches Critical Flaw in Malware Protection Engine

Dark Reading

The emergency update addressed CVE-2018-0986, which would let an attacker execute malicious code on a Windows machine.

48