Mon.Feb 19, 2018

article thumbnail

Intel Faces 32 Spectre/Meltdown Lawsuits

Data Breach Today

Plaintiffs Seek Damages Over Security Vulnerabilities, Alleged Insider Trading Intel faces 32 lawsuits filed over the trio of flaws in its CPUs known as Meltdown and Spectre, seeking damages for the security vulnerabilities as well as alleged insider trading. The flaws have also been cited in lawsuits against chipmakers AMD and ARM, as well as against Apple.

Security 164
article thumbnail

The Tories claim the data protection bill will make us safer. That’s not true | Diane Abbott

The Guardian Data Protection

The government’s growing store of personal details allows automatic adjudication on crucial aspects of our lives Is your data safe? The answer must be no if this government manages to push through its data protection bill without important amendments. The Tory claim that the bill is necessary for protecting our data is false. Related: The DWP – a bureaucracy of outstanding brutality | Diane Taylor Related: The data protection bill is yet another legal threat to UK press freedom Continue reading.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Is US Computer Crime Justice Draconian?

Data Breach Today

Prosecutors Cry 'Deterrence' to Justify Lengthy Sentences. Who's Deterred? Is U.S. computer crime justice draconian? That's one obvious question following England's Court of Appeal ruling that suspected hacker Lauri Love would not be extradited to the United States, in part, because they said the U.S. justice system could not be trusted to treat Love humanely.

164
164
article thumbnail

Key considerations for empowering a digital workforce

CGI

Key considerations for empowering a digital workforce. harini.kottees…. Mon, 02/19/2018 - 02:37. As discussed in my earlier blog post, Seizing the opportunities of digital transformation , the key to success in the digital age is not just about technology. It’s also about developing a clear digital strategy based on an understanding of how the workplace is changing and becoming increasingly mobile.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Locking Down PowerShell to Foil Attackers: 3 Essentials

Data Breach Today

Microsoft Taps Machine Learning to Better Combat Fileless Malware Microsoft has been working to reduce the ability of attackers who use the PowerShell scripting language to "live off the land" in enterprise networks, in part via machine learning. But IT administrators should also have these three essential malicious PowerShell script defenses in place.

IT 157

More Trending

article thumbnail

Kickstart your GDPR program

OpenText Information Management

The role of Data Discovery in General Data Protection Regulation (GDPR) compliance is the essential first step to building a successful GDPR program, but it’s one that many companies are struggling to take. Companies are faced with terabytes or petabytes of data spread throughout their organization – and beyond – and don’t clearly know what … The post Kickstart your GDPR program appeared first on OpenText Blogs.

GDPR 68
article thumbnail

Weekly discussion podcast: Critical Information Infrastructure, Part 4

IT Governance

This week’s extract is taken from Toomas Viira’s book Lessons Learned – Critical Information Infrastructure Protection , which is a vital source of information and thought-provoking insights into potential issues within critical information infrastructure (CII). Episode 4 – Critical Infrastructure: “Cyber threats have changed considerably in recent years.

article thumbnail

Does your data deserve a private cloud?

IBM Big Data Hub

Your business and your data are both unique. For that reason, your enterprise architecture must also be tailored to fit the exact needs of your business. When data is involved, you want choices, not trade offs. And, more importantly, you want your solutions to build upon and complement one another.

Cloud 62
article thumbnail

On the Security of Walls

Schneier on Security

Interesting history of the security of walls: Dún Aonghasa presents early evidence of the same principles of redundant security measures at work in 13th century castles, 17th century star-shaped artillery fortifications, and even "defense in depth" security architecture promoted today by the National Institute of Standards and Technology , the Nuclear Regulatory Commission , and countless other security organizations world-wide.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Only 53 Percent of Surveyed Security Officers Are Confident in Security of Data by Third Parties: Cybersecurity Trends

eDiscovery Daily

A recently issued report provides an interesting look at how Chief Information Security Officers (CISOs) and others responsible for security are addressing the challenges in today’s cybersecurity climate. The report ( The Shifting Cybersecurity Landscape: How CISOs and Security Leaders Are Managing Evolving Global Risks to Safeguard Data , by Ankura and Ari Kaplan Advisors), issued earlier this month, explores the roles of CISOs (chief information security officers), the adoption of cloud techno

article thumbnail

Claude Pepper’s Vision of Treating Alzheimer’s Disease Continues into the 21st Century

Archives Blogs

Newspaper Clippings of Claude Pepper’s Research on Alzheimer’s Disease Claude Pepper Library Collection, Series: 302A, Box 26, Folder 2. Many remember Senator Claude Pepper as the “nation’s spokesman for the elderly,” serving as a chairman of the U.S. House Subcommittee on Health and Long-term care and the House Select Committee on Aging during the 1970s.

article thumbnail

eDiscovery Expert Brett Burney Reviews CloudNine Platform

eDiscovery Daily

CloudNine – Competitively Priced Cloud-Based Platform for Data Processing, Review, and Production Supported by a Full Professional Services Portfolio . An eDiscovery Platform Review by Brett Burney*. Backed by a strong history of litigation services, the CloudNine platform is an easy-to-use choice for processing, reviewing, and producing the electronic data you collect from your client or an opposing party.