Wed.Apr 11, 2018

article thumbnail

Facebook's Zuckerberg Pledges Worldwide GDPR Compliance

Data Breach Today

Second Congressional Hearing Probes Privacy Issues At a U.S. House hearing Wednesday, Facebook CEO Mark Zuckerberg said the company would eventually comply worldwide with the European Union's tough privacy law, the General Data Protection Regulation.

article thumbnail

The Questions Zuckerberg Should Have Answered About Russia

WIRED Threat Level

Russian agents used Facebook to influence the 2017 election. Congress missed the chance to delve into what the company knows about it—and how they’ll stop it in 2018.

IT 104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers Deface Popular Videos Published by Vevo

Data Breach Today

Pilfered Access Credentials Could Be to Blame A handful of popular music videos published on YouTube were defaced on Tuesday, with two hackers claiming credit. But Google, which owns YouTube, says that tampering didn't occur directly on its platform.

Access 113
article thumbnail

Five questions Mark Zuckerberg should be asked by Congress

The Guardian Data Protection

As embattled Facebook founder appears before Congress again, here is what should be put to him Zuckerberg made the rookie error of leaving out his notes, which an AP reporter promptly snapped. One section said: “Break up FB? US tech companies key asset for America; break up strengthens Chinese companies.” Really? That’s the best you’ve got? The senators need to drive this one home hard.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Enhanced FIDO Authentication Standard Expands to the Browser

Data Breach Today

A new version of the FIDO authentication standard is designed to enable the elimination of passwords for a broader range of devices, says Phil Dunkelberger, CEO of Nok Nok Labs, who describes the latest developments.

More Trending

article thumbnail

Intelligent Records Management: The Future of Information Management

Gimmal

Today, when I tell people that we have market leading software for records management, their normal reply is "What is records management?" They aren't asking the question because they don't know about the records management department in their enterprise, but because they don't understand the domain of records management.

article thumbnail

The 'Despacito' YouTube Hack Was Probably Pretty Simple to Pull Off

WIRED Threat Level

The removal of YouTube's most popular video this week was likely the result of a low-cost phishing scam rather than sophisticated hacking.

article thumbnail

Continuous data for continuous testing

IBM Big Data Hub

Most organizations are moving software development methods to newer agile methods to benefit from better technology capabilities, delivered more rapidly and with improved quality. But, finding the "right data" for agile development and continuous testing can be tricky. Learn how to make it simpler.

IT 63
article thumbnail

Stats on the Cybersecurity Skills Shortage: How Bad Is It, Really?

Dark Reading

Is it just a problem of too few security professionals, or are there other reasons enterprises struggle to build infosec teams?

IT 71
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

OpenText Extended ECM for Salesforce: The missing piece of the jigsaw

OpenText Information Management

If your organization has an ERP system (like SAP® or Oracle®) implemented for certain processes; and you are utilizing Salesforce® within your selling and support teams, then you should probably read on for three minutes. Individually, those systems are all enterprise grade and considered best in class; but they only serve to strengthen organizational silos.

ECM 56
article thumbnail

Why the cyber security skills gap is so damaging

IT Governance

The cyber security skills gap has been growing for years, and the problem is particularly bad in the UK. A report by job listings site Indeed found that the UK has the second largest demand for skilled IT professionals in the world. But what effect is this having on organisations, and how can it be mitigated? The most obvious effect is that it’s increasing the workload of existing staff.

article thumbnail

Avoiding the Ransomware Mistakes that Crippled Atlanta

Dark Reading

What made Atlanta an easy target was its outdated use of technology: old computers running on non-supported platforms, which are also a characteristic of many municipalities and most major cities.

article thumbnail

How risk assessments fit into your ISO 27001 project

IT Governance

Many organisations choose to implement ISO 27001 as it demonstrates that they have put in place the best-practice information security processes. It is also the only international standard that defines the requirements of an information security management system (ISMS). An ISMS is a set of policies, procedures, processes and systems that manage information risks.

Risk 53
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Avoiding the Ransomware Mistakes that Crippled Atlanta

Dark Reading

What made Atlanta an easy target was its outdated use of technology: old computers running on non-supported platforms, which are also a characteristic of many municipalities and most major cities.

article thumbnail

CIPL Submits Comments to Article 29 Working Party’s Draft Guidelines on the Accreditation of Certification Bodies under the GDPR

Hunton Privacy

On March 29, 2018, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP submitted formal comments to the Article 29 Working Party (the “Working Party”) on its draft guidelines on the accreditation of certification bodies under the GDPR (the “Guidelines”). The Guidelines were adopted by the Working Party on February 6, 2018, for public consultation.

GDPR 45
article thumbnail

The Digital Security Exchange Is Live

Schneier on Security

Last year I wrote about the Digital Security Exchange. The project is live : The DSX works to strengthen the digital resilience of U.S. civil society groups by improving their understanding and mitigation of online threats. We do this by pairing civil society and social sector organizations with credible and trustworthy digital security experts and trainers who can help them keep their data and networks safe from exposure, exploitation, and attack.

article thumbnail

Stopping Cyber Madness: Why the Private Sector Must Lead the Fight

Dark Reading

The government's ability to help secure the Internet will be limited given the light speed of the Internet versus the slower pace of government. That's why stopping the madness begins with the private sector.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How can business leaders improve diversity with intelligent automation?

CGI

How can business leaders improve diversity with intelligent automation? p.butler@cgi.com. Wed, 04/11/2018 - 03:21. Diversity is a hot topic right now and it should be. Let me explain why. The most successful organisations innovate. New ideas are developed based on different perspectives. Without these different perspectives, you fall into groupthink.

article thumbnail

Hack Back: An Eye for an Eye Could Make You Blind

Dark Reading

Attackers have had almost zero consequences or cost for stealing data from innocent victims. But what if we could hack their wallets, not their systems?

47
article thumbnail

Customer Vulnerability:- I have an IDEA that BRUCE is living in TEXAS with a SPIDER called BLAKE

CGI

Customer Vulnerability:- I have an IDEA that BRUCE is living in TEXAS with a SPIDER called BLAKE. p.butler@cgi.com. Wed, 04/11/2018 - 03:50. The UK market has seen household consumer based credit continue to increase at rates of up to 10% over the last twelve to eighteen months and if this market trend continues coupled with the much hyped interest rate hikes there is an inevitability that more individuals who already have high level of debt will experience further detrimental financial impact.

article thumbnail

2.6 Billion-Plus Data Records Breached Last Year

Dark Reading

Most exposed data records caused by human error.

77
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Medical Records Retention Best Practices

Armstrong Archives

Texas physicians must retain medical records in accordance with the requirements of Texas Medical Board Rule 165.1(b). This rule requires that physicians keep: Medical records for each patient for at least seven years from the most recent date of treatment. Medical records of patients who were younger than 18 at their most recent visit for seven years from their most recent visit or until the patient turns 21, whichever date is later.

article thumbnail

Local Government Records Management Training – Register Now!

The Texas Record

Local government classes will be held June 12-13, 2018. Each class is $15. Class size is limited to 24 people so register today! Classes are being held at the Lorenzo de Zavala Library and Archives Building, Tocker Learning Center, 1201 Brazos St., Austin, TX 78701. Local Government Classes. Introduction to Records Management – Full Day Workshop.

article thumbnail

OpenText Enfuse® 2018

OpenText Information Management

Information rules the world, and technology like EIM, AI, Robots, and IoT are transforming business on a planetary scale. At the same time, cybercrime and cyberwarfare are also being redefined. It is no longer human vs human, or human vs machine… it is machine vs machine. You have to assume the bad actors are already … The post OpenText Enfuse® 2018 appeared first on OpenText Blogs.

IoT 40
article thumbnail

ITALY: Privacy Code to be repealed, what to expect with the GDPR?

DLA Piper Privacy Matters

The current draft of Italian privacy law repeals the Privacy Code, integrating the GDPR reveals with some interesting news, but also some concerns. It is at least surprizing that after (almost) 2 years from the approval of the European privacy regulation and with the deadline of the 25th of May 2018 so close, a number of EU Member States still need to adopt their local law integrating the EU General Data Protection Regulation (GDPR).

GDPR 40
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

New Video Course for State Agencies

The Texas Record

Are you new to state records management or need a refresher? We are pleased to announce a new online video course for state agency records management officers and records liaisons. (For those of you working for counties, municipalities, school districts, etc., we are currently revamping local government online courses as well!). Click here to access the video on the course page.

article thumbnail

Attacker Dwell Time Still Too Long, Research Shows

Dark Reading

New DBIR and M-Trends reports show the window between compromise and discovery are still way too long.

50
article thumbnail

Why Is TAR Like a Bag of M&M’s?, Part Two: eDiscovery Best Practices

eDiscovery Daily

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. He has also been a great addition to our webinar program, participating with me on several recent webinars. Tom has also written several terrific informational overview series for CloudNine, including eDiscovery and the GDPR: Ready or Not, Here it Comes (which we covered as a webcast ), Understanding eDiscovery in Criminal Cases (which we also covered as a