Mon.Apr 23, 2018

article thumbnail

4 steps for meeting GDPR-ready identity governance

Information Management Resources

Many of the new data protection requirements can be sustainably and cost-effectively adhered to by leveraging existing tools and processes that are already deployed in a typical organization.

GDPR 38
article thumbnail

Current forecast: Cloudy with a chance of exposed data

Thales Cloud Protection & Licensing

By Peter Galvin, Chief Strategy & Marketing Officer, Thales eSecurity. Today, organizations are rapidly adopting cloud technology. Many organizations have implemented a cloud first philosophy, requiring that any new applications or IT investments start with the cloud. And not just one cloud, but organizations are investing in multiple clouds and SaaS applications.

Cloud 75
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IRL Analogies Explaining Digital Concepts are Terrible

Troy Hunt

Remember the anti-piracy campaign from years back about "You Wouldn't Steal a Car"? This was the rather sensationalist piece put together by the Motion Picture Association of America in an attempt to draw parallels between digital piracy and what they viewed as IRL ("In Real Life") equivalents. Here's a quick recap: The very premise that the young girl sitting in her bedroom in the opening scene is in any way relatable to the guy in the dark alley sliding a slim jim down the Merc

article thumbnail

UK Teen Sentenced for 'Cyber Terrorizing' US Officials

Data Breach Today

Kane Gamble Receives Two-Year Sentence for Targeting CIA, FBI, DHS Officials British teenager Kane Gamble has been sentenced to serve two years in a youth detection center after he admitted to targeting U.S. officials - including hacking former CIA Director John Brennan's personal AOL email account - as well as dumping personal details for 20,000 FBI employees.

140
140
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Home Office data exemption sparks fears of further Windrush scandals

The Guardian Data Protection

Rights groups say new data protection legislation will lead to further miscarriages of justice The Home Office is to be given sweeping data protection exemptions that will prevent anyone seeking information about their immigration status in future, campaigners for the Windrush generation are warning. Continue reading.

Privacy 109

More Trending

article thumbnail

New Europe law makes it easy to find out what your boss has said about you

The Guardian Data Protection

General Data Protection Regulation holds that anyone in Europe can ask any company for the data it has on them Have you ever wondered what your boss or co-workers say about you behind your back? If you’re located in Europe, it will soon be extremely easy to find out. Under the General Data Protection Regulation that comes into play on 25th of May, any individual located in Europe can ask any company for the data it collects about them – and that includes their employer.

IT 89
article thumbnail

Cyberattacks: Moving From Detection to Prevention

Data Breach Today

Gregory Webb of Bromium Discusses Refocusing on the 'Web of Profit' The endpoint remains the favored attack surface for criminals, yet most cybersecurity solutions rely on detection rather than prevention, says Gregory Webb, CEO of Bromium.

article thumbnail

5 steps to an effective ISO 27001 risk assessment

IT Governance

Risk assessments are one of the most important parts of an organisation’s ISO 27001 compliance project. It’s impossible to prepare for every risk that you might be vulnerable to, so you should use the assessment stage to gauge your biggest priorities. Performing a risk assessment can be tricky, but this blog simplifies the process by breaking it down into five simple steps.

Risk 69
article thumbnail

What You Need to Know About GDPR Breach Disclosure, Response

Data Breach Today

Moving Organizations Toward Privacy by Design or Default Incident response is a critical pillar of an effective endpoint security program, one that will gain importance as GDPR enforcement comes into play on May 25. Organizations must be ready to react if and when an incident occurs in order to meet the stringent requirements that apply during an incident.

GDPR 100
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Atlanta Spent $2.6M to Recover From $52,000 Ransomware Scare

WIRED Threat Level

Whether to pay ransomware is a complicated—and costly—calculation.

article thumbnail

'Virtual Assistant' EHR Tools: Privacy, Security Issues

Data Breach Today

Data integrity and privacy issues are among potential concerns related to voice-activated "virtual assistant" tools that some vendors are beginning to offer for their electronic health record systems, says privacy and security expert Kate Borten.

Privacy 100
article thumbnail

Eventbrite apologises for footage rights grab

The Guardian Data Protection

Events website says sorry for user agreement giving it right to use footage from private events for its own purposes A website that allows users to create, promote and sell tickets to events has apologised to users for a clause in its terms of service that allowed it to attend, film and use the footage for its own purposes. Eventbrite hosts more than 2m events a year, ranging from small free gatherings of friends to large paid-for conferences.

GDPR 66
article thumbnail

Crypto Agility: Its Importance to IoT

Data Breach Today

Ted Shorter of CSS on the Need to Update Cryptographic Keys What is crypto agility, and why is it so important to IoT? Ted Shorter of Certified Security Solutions offers an explanation.

IoT 100
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Challenges faced while training an AI to combat abuse

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

Insider Threat: Putting Theory Into Practice

Data Breach Today

Rockwell Automation CISO Dawn Cappelli Now Shifts Focus to External Threats For years, Dawn Cappelli studied and wrote about the insider threat. Then she went to Rockwell Automation and built an insider program. She discusses the program's success and her expanded role as vice president and CISO.

100
100
article thumbnail

Discovering best practices for IoT at Think 2018

IBM Big Data Hub

Think 2018 in Las Vegas was a record breaking event, where tens of thousands of attendees gathered to talk with one another and share their experiences. Visionary speakers and experts shared their solutions for some of the world’s most daunting challenges.

IoT 66
article thumbnail

Russia is Banning Telegram

Schneier on Security

Russia has banned the secure messaging app Telegram. It's making an absolute mess of the ban -- blocking 16 million IP addresses , many belonging to the Amazon and Google clouds -- and it's not even clear that it's working. But, more importantly, I'm not convinced Telegram is secure in the first place. Such a weird story. If you want secure messaging, use Signal.

Cloud 66
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Why is a DPIA required by the GDPR?

IT Governance

The new EU General Data Protection Regulation (GDPR) confirms that privacy must be designed by default into the processing of personal data. This ‘privacy by design’ concept is not new, and has for many years been recommended by the UK Information Commissioner’s Office (ICO), as outlined in its report ‘ Conducting privacy impact assessments code of practice ’.

GDPR 65
article thumbnail

Digital transformation in retail

OpenText Information Management

Last month, Target announced its latest figures that showed a remarkable turnaround from the same time the year before. The company said that its digital investment was a big part of this success. Digital transformation can deliver incredible results but some organizations can be blinded by the potential of digital technologies and miss the important … The post Digital transformation in retail appeared first on OpenText Blogs.

article thumbnail

Weekly discussion podcast #12: Security in the Digital World

IT Governance

This week’s extract is taken from Graham Day’s book Security in the Digital World. This must-have guide features simple explanations, examples and advice to help you become security-aware in a developing digital world. Discussion Podcast Episode 12 – Security in the Digital World, Social Networking Security: “Every social networking application has security settings that must be assessed before being applied.” Learn how to: Keep your information secure; Apply the necessary controls to your

article thumbnail

Employee engagement and the quality management renaissance

OpenText Information Management

This post has been written by guest author Paul Stockford of Saddletree Research. What is the “quality management renaissance”? When I think of the word “renaissance” the first thing that comes to mind is the Renaissance period in European history, which lasted from the 14th century to the 17th century and is considered the cultural … The post Employee engagement and the quality management renaissance appeared first on OpenText Blogs.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Importance of Security Awareness Training and the Impact of Attack Demonstrations

Architect Security

In “The Importance of Security Awareness Training“, SANS says: “One of the best ways to make sure company employees will not make costly errors in regard to information security is to institute company-wide security-awareness training initiatives that include, but are not limited to classroom style training sessions, security awareness website(s), helpful hints via e-mail, or […].

article thumbnail

California privacy initiative likely to increase costs of civil litigation if passed in November

Data Protection Report

A little more than one month from implementation of GDPR, companies may be tempted to relax and exhale (and if GDPR is still causing you headaches, consult our checklist ). After all, the U.S. couldn’t be crazy enough to implement something as onerous and difficult, right? RIGHT?!? Enter California, which appears likely to place an initiative on the November 2018 ballot that could bring some familiar aspects of GDPR to the sixth largest economy in the world.

Privacy 40
article thumbnail

Threat Actors Turn to Blockchain Infrastructure to Host & Hide Malicious Activity

Dark Reading

bit domains are increasingly being used to hide payloads, stolen data, and command and control servers, FireEye says.

article thumbnail

Yet Another Biometric: Ear Shape

Schneier on Security

This acoustic technology identifies individuals by their ear shapes. No information about either false positives or false negatives.

47
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Threat Intel: Finding Balance in an Overcrowded Market

Dark Reading

Industry insiders discuss how threat intelligence has changed and what may happen as the market becomes increasingly saturated.

article thumbnail

Muhstik Botnet Exploits Highly Critical Drupal Bug

Threatpost

A botnet has exploited a highly critical Drupal CMS vulnerability, which was previously disclosed by Drupal in March.

CMS 48
article thumbnail

How F5 Networks' CISO Defends the Enterprise

eSecurity Planet

VIDEO: F5 CISO Mike Convertino discusses the technology and human resources he uses to help secure his network and inform F5's product development.