Wed.Dec 06, 2017

article thumbnail

The world’s largest shipbroker suffers a data breach

IT Governance

Clarksons, the world’s largest shipbroker, is preparing for the fallout from a recent data breach. An investigation has found that unauthorised access was gained through an isolated user account. Before the breach could be responded to, essential information was stolen. The criminal hacker is demanding money in exchange for not releasing the information to the public.

article thumbnail

Viewing and collaborating on files doesn’t have to be painful!

OpenText Information Management

Do any of the following scenarios sound familiar? The impossible-to-open file Your manager sends you a file (in email, of course), and when you try to open it you get an error telling you that you don’t have the appropriate software to view this document type. You search the internet and select a free tool … The post Viewing and collaborating on files doesn’t have to be painful!

IT 65
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

High Court finds Morrisons liable for 2014 data breach

IT Governance

Morrisons is responsible for a data breach caused by a malicious insider, the High Court has ruled. A class action of 5,518 employees took the supermarket to court, claiming compensation for the “upset and distress” caused by the 2014 data breach , in which Andrew Skelton, a senior internal auditor at the retailer’s Bradford office, leaked the payroll data of 99,998 employees.

article thumbnail

What Makes the IoT so Vulnerable to Attack?

Outpost24

This piece is part 3 of our ongoing series on IoT security. Don't forget to download the eBook to understand the IoT security gap and how your business needs to address it, today.

IoT 64
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How to create an information security policy

IT Governance

As part of your ISO 27001 certification project, your organisation will need to prove its compliance with appropriate documentation. ISO 27001 says that you must document an information security policy. What is an information security policy? An information security policy is one of the mandatory documents outlined in Clause 5.2 of ISO 27001 and sets out the requirements of your information security management system (ISMS).

More Trending

article thumbnail

Germany Preparing Backdoor Law

Schneier on Security

The German Interior Minister is preparing a bill that allows the government to mandate backdoors in encryption. No details about how likely this is to pass. I am skeptical.

article thumbnail

How the Major Intel ME Firmware Flaw Lets Attackers Get 'God Mode' on a Machine

Dark Reading

Researchers at Black Hat Europe today revealed how a buffer overflow they discovered in the chip's firmware can be abused to take control of a machine - even when it's turned 'off.

IT 55
article thumbnail

Data privacy in Turkey

Data Protection Report

This article was written by Ekin Inal and Cansu Kahya, lawyers of Bilgiç Attorney Partnership, a partnership registered with the Istanbul Bar Association, with which Norton Rose Fulbright has a professional association. Turkey continues to further develop its data protection regime. Recent developments include publication of a regulation and a guideline focusing on deletion, destruction and anonymization of personal data.

article thumbnail

Why Cybersecurity Must Be an International Effort

Dark Reading

The former head of cyber for the US State Department calls for agreements across countries to improve government cybersecurity.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Google Patches Critical Encryption Bug Impacting Pixel, Nexus Phones

Threatpost

As part of its December Android and Pixel/Nexus security updates, Google has issued patches addressing a bevy of flaws, 11 of which are rated critical.

article thumbnail

Cyberattack: It Can't Happen to Us (Until It Does)

Dark Reading

Just because your small or medium-sized business isn't as well known as Equifax or Yahoo doesn't mean you're immune to becoming a cybercrime victim.

IT 52
article thumbnail

FCC Releases Plan to Repeal Net Neutrality Rules

Hunton Privacy

Recently, FCC Chairman Ajit Pai released a draft of the Restoring Internet Freedom Order (the “Order”). If adopted, the Order would repeal the rules put in place by the FCC in 2015 that prohibit high-speed internet service providers (“ISPs”) from stopping or slowing down the delivery of websites and from charging customers extra fees for high-quality streaming and other services.

Privacy 40
article thumbnail

Data Protection Regime in Turkey Takes Shape

Data Protection Report

Turkey continues to develop a legal framework on data protection. On October 28, 2017, the Turkish Data Protection Authority (the “ Authority ”) published an important regulation supplementing the Law on Protection of Personal Data (the “ Data Protection Law ”), namely the Regulation on the Deletion, Destruction and Anonymization of Personal Data (the “ Regulation ”).

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Dispute Over Scope of Preservation Obligation Leads to Partial Sanctions For Now: eDiscovery Case Law

eDiscovery Daily

In E.E.O.C. v. GMRI, Inc., No. 15-20561-CIV-LENARD/GOODMAN (S.D. Fla. Nov. 1, 2017) , Florida Magistrate Judge Jonathan Goodman, in a very lengthy and detailed order, denied in part and granted in part the plaintiff’s motion for sanctions for spoliation of paper applications, interview booklets, and emails. Judge Goodman did not grant the request for most-severe type of relief sought – permissible inferences at the summary judgment and trial stages – but did rule that the plaintiff could “prese

Paper 43
article thumbnail

Nearly 2/3 of Industrial Companies Lack Security Monitoring

Dark Reading

New Honeywell survey shows more than half of industrial sector organizations have suffered cyberattacks.

article thumbnail

WNYC’s Vintage Microphones

Archives Blogs

“This microphone is not an ordinary instrument,For it looks out on vistas wide indeed:My voice commingles now with northern lights and asteroids and Alexander’s skeleton,With dead volcanoes and with donkey’s earsIt swims with minnows and it’s in the Sphinx’s jaw.It drifts among whatever spirits pass across the night.Here is a thought to fasten to your throat: Who knows who may be listening?

IT 42
article thumbnail

Using the scientific method in data analytics for better results

Information Management Resources

Answers without questions are simply objects that exist. To really get answers out of your 'big data' you need the right questions.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How a Booklet of General Plans Helped Save 32 Trapped Sailors After the Attack on Pearl Harbor

Unwritten Record

Among the vast holdings of the National Archives, in Record Group 19: Alphabetical Series of Ship Engineering Drawings, are a type of ship plans known simply as “Booklets of General Plans”. These plans are illustrations various vessels showing elements such as the starboard and portside views of boats, schematics of weaponry, and deck layouts including the numerous tiny compartments on each level of the ship.

article thumbnail

Many organizations can't shake data security fears with the IoT

Information Management Resources

Even though a majority of organizations have adopted or plan to adopt IoT technologies within the next year, many are still concerned about cybersecurity threats, says Peter Tsai.

IoT 36
article thumbnail

Most Retailers Haven't Fully Tested Their Breach Response Plans

Dark Reading

More than 20% lack a breach response plan altogether, a new survey shows.

Retail 47
article thumbnail

Timeline for GDPR compliance: Do you measure up?

Information Management Resources

With just a few months before the General Data Protection Regulation (GDPR) takes effect, many organizations have yet to begin preparations for the sweeping data privacy and data security mandate.

GDPR 30
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Online Fraud Dropped 33 Percent Between Black Friday and Cyber Monday

eSecurity Planet

It also dropped throughout 2017, a recent study found.

IT 40
article thumbnail

Artificial intelligence gets real for investors: A timeline

Information Management Resources

AI’s recent feats – beating a Go champion, navigating driverless cars, making money for investors – were many decades in the making. Here are some key highlights.

article thumbnail

Leveraging PCI DSS Principles for General Data Protection

Thales Cloud Protection & Licensing

In the month of November, I wrote about the options available specifically to secure data as part of a PCI DSS compliance effort. In this blog, I explore ideas for how the technology in question can be leveraged effectively for much broader general data protection requirements that are equally important for a wide variety of organizations. The benefits of thinking beyond PCI DSS.

article thumbnail

Support for CDOs growing among businesses

Information Management Resources

But Chief Data Officers find that with more respect comes greater responsibility.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Morgan Stanley woos millennials via robo-adviser with ETFs

Information Management Resources

The banking and wealth management powerhouse is starting a new digital investment platform for clients which will combine technology and human advisers.

29
article thumbnail

Who’s afraid of the big, bad robot?

Information Management Resources

A new survey finds few immediate fears, but numerous long-term concerns, about the role of artificial intelligence in the workplace.

article thumbnail

Infosys chairman seeks to reclaim past glory with digital push

Information Management Resources

Chairman Nandan Nilekani says offerings around artificial intelligence and IoT will make the company stronger.