Wed.Feb 28, 2018

article thumbnail

What Comes Next in the CareFirst Data Breach Case?

Data Breach Today

Now that the Supreme Court has declined to review a case stemming from a 2014 cyberattack on CareFirst Blue Cross Blue Shield, what comes next? Attorney Patricia Carreiro analyzes the potential implications for the class-action lawsuit filed after a breach that affected 1.1 million individuals.

article thumbnail

'Living laboratories': the Dutch cities amassing data on oblivious residents

The Guardian Data Protection

In Eindhoven and Utrecht smart tech is tackling traffic, noise and crime. But with privacy laws proving futile and commercial companies in on the act, are the plans as benign as they seem? Stratumseind in Eindhoven is one of the busiest nightlife streets in the Netherlands. On a Saturday night, bars are packed, music blares through the street, laughter and drunken shouting bounces off the walls.

Privacy 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity M&A Roundup: PhishMe, Phantom Acquired

Data Breach Today

PhishMe Becomes 'Cofense' After It's Purchased; Splunk Buys Phantom Cybersecurity company mergers and acquisitions continue. Among the major deals: The sale of PhishMe to a privacy equity syndicate and Splunk's purchase of Phantom. But these are just the latest in a series of moves so far this year as consolidation continues.

article thumbnail

Great Data Scientists Don’t Just Think Outside the Box, They Redefine the Box

Bill Schmarzo - Dell EMC

Special thanks to Michael Shepherd, AI Research Strategist, Dell EMC Services, for his co-authorship. Learn more about Michael at the bottom of this post. Imagine you wanted to determine how much solar energy could be generated from adding solar cells to a particular house. This is what Google’s Project Sunroof does with Deep Learning. Enter an address and Google uses a Deep Learning framework to estimate how much money you could save in energy costs with solar cells over 20 years (see Figure 1)

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

How to fix the widening cyber security skills gap

IT Governance

The cyber security skills gap has been widening for years – there are simply not enough trained professionals to meet organisations’ growing cyber security needs. As a result, the value of those with the requisite skills is inflated, but they are left in charge of understaffed and poorly equipped defence teams. According to the latest figures, 68% of organisations acknowledge that demand for cyber security staff is high , and there is reportedly a 25 percentage point gap between availability and

More Trending

article thumbnail

Immigration officials to continue to seek NHS England patient data

The Guardian Data Protection

Ministers reject calls to suspend practice amid fears it is stopping migrants seeking medical help Ministers have rejected a call from MPs to immediately suspend the disclosure of confidential NHS patient data to the Home Office to trace potential immigration offenders despite evidence it is deterring migrants in England from seeking medical help. A joint letter from Home Office and health ministers to the chair of the Commons health select committee discloses that 1,297 requests for non-clinica

IT 78
article thumbnail

Combat the increasing ransomware threat by educating employees

IT Governance

A recent Sophos survey of 2,700 IT managers in organisations with 100-5,000 employees around the world, revealed that many businesses are not prepared for ransomware attacks. 54% of those surveyed had experienced an attack within the past year. A further 31% are expected to fall victim in the future. Key findings. 45% of UK organisations experienced a ransomware attack within the past 12 months.

article thumbnail

EU exit plan: why does the draft fall short?

The Guardian Data Protection

The EU and UK’s disagreements over a number of Brexit provisions mean the transition deal remains uncertain Leaving the European Union was meant to be the easy bit. But when the first draft text of the UK withdrawal agreement emerged on Wednesday, it has become clearer than ever that Brexit negotiations are in troubled waters. The European commission’s draft legal text is partly based on a “gentleman’s agreement” struck between the UK and EU in December.

IT 61
article thumbnail

What is ‘privacy by design’?

IT Governance

Privacy by design is a voluntary approach to projects that promotes privacy and data protection compliance, and helps you comply with the Data Protection Act 1998 (DPA). The Information Commissioner’s Office (ICO) encourages organisations to seriously consider privacy and data protection throughout a project lifecycle, including when: Building new IT systems to store or access personal data; Needing to comply to regulatory or contractual requirements; Developing internal policies or strategies w

Privacy 68
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Apple to Store Encryption Keys in China

Schneier on Security

Apple is bowing to pressure from the Chinese government and storing encryption keys in China. While I would prefer it if it would take a stand against China, I really can't blame it for putting its business model ahead of its desires for customer privacy. Two more articles.

article thumbnail

Protect Against Internet of Things Security Issues

Outpost24

The rise of the internet of things has brought with it some of the most convenient, user-friendly applications we could ever dream of.

article thumbnail

How to Defend Servers Against Cryptojacking

eSecurity Planet

Here are some steps you can take to reduce the risk of becoming an unwitting accomplice to cryptojacking attacks.

Risk 65
article thumbnail

Nearly Half of Cybersecurity Pros Solicited Weekly by Recruiters

Dark Reading

More than 80% say they are 'open' to new job offers, while 15% are actively on the search, a new (ISC)2 survey shows.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

What's the difference MiFID and MiFID II?

Hanzo Learning Center

The Markets in Financial Instruments Directive 2004/39/EC (MiFID) first appeared in 2007 with the goal of regulating investment services and enhancing consumer protection across Europe. In 2011, the European Commission began revising MiFID -- ultimately arriving at MiFID II , which didn’t actually arrive in the form of implementation until January of this year.

article thumbnail

Hacking on TV: 8 Binge-Worthy and Cringe-Worthy Examples

Dark Reading

From the psycho-drama Mr. Robot to portraying the outright dangers of ransomware taking down a hospital in Grey's Anatomy, hacking themes now run deep in today's TV shows.

article thumbnail

Preparing for GDPR: Less than 80 working days to go

CGI

Preparing for GDPR: Less than 80 working days to go. p.butler@cgi.com. Wed, 02/28/2018 - 10:04. As we approach May 2018, the full implementation date for the General Data Protection Regulation (GDPR), or more likely, the implementation date of the UK Data Protection Bill which will be drafted into UK law to reflect GDPR, I thought it worth talking about what one can do in the working days we have left to prepare for it.

GDPR 40
article thumbnail

Virtual Private Networks: Why Their Days Are Numbered

Dark Reading

As companies move to the cloud and depend less on physical servers and network connections, their reliance on VPNs for security will eventually evolve, if not disappear altogether.

Cloud 43
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Is Bancassurance MK2 the answer….to an affordable transfer of liability from state to the private sector for retirement provision?

CGI

Is Bancassurance MK2 the answer….to an affordable transfer of liability from state to the private sector for retirement provision? p.butler@cgi.com. Wed, 02/28/2018 - 10:21. A quick trip through pension time (abridged). The State Pension – retire when the state can afford it – increasingly later in life in the future. Defined Benefit company pensions – retire at 50 with a gold plated income!

Retail 40
article thumbnail

How to Secure 'Permissioned' Blockchains

Dark Reading

At the heart of every blockchain is a protocol that agrees to the order and security of transactions in the next block. Here's how to maintain the integrity of the chain.

article thumbnail

Digital Customer Experience is becoming the deciding battlefield on the insurance landscape

CGI

Digital Customer Experience is becoming the deciding battlefield on the insurance landscape. p.butler@cgi.com. Wed, 02/28/2018 - 10:36. Digital Customer Experience … where to start with this hugely important topic, it has many broad strands each undergoing continual, exciting, even exponential change and so in my experience requires engagement and good coordination across the business.

article thumbnail

The State of Application Penetration Testing

Dark Reading

Data from real-world pen tests shows configuration errors and cross-site scripting are the most commonly found vulnerabilities.

49
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

WP29 brings Binding Corporate Rules in line with the GDPR

Data Protection Report

On February 6, 2018, the Article 29 Working Party (WP29) adopted updated guidelines on Binding Corporate Rules (“ BCRs “), which replace the previous WP29 working documents 153 and 195 on BCRs and Processor BCRs. BCRs are one of the permitted data export solutions under European data protection law, allowing members of a corporate group that have committed to a binding and approved set of data protection rules to transfer personal data within their organization (including from inside

GDPR 40
article thumbnail

Russia: Main Takeaways from Roskomnadzor’s Open Doors Day

HL Chronicle of Data Protection

Recently, the Russian Data Privacy Authority (Roskomnadzor) organized an Open Doors Day in honor of the International Data Privacy Day. During the occasion, Roskomnadzor officers presented on the authority’s 2017 enforcement activities. They followed this presentation with an open question and answer period, during which they responded to numerous questions raised by attendees.

article thumbnail

Spotcap Expedites Lending Decisions Using Kofax Kapow Robotic Process Automation

Info Source

Irvine, CA, February 28, 2018 – Kofax ® , a leading provider of software to simplify and transform the First Mile of business, today announced that Spotcap, a multinational provider of finance to small and medium-sized enterprises (SMEs), has implemented Kofax Kapow Robotic Process Automation (RPA) software to support its proprietary credit assessment algorithm.

article thumbnail

Misconfigured Memcached Servers Abused to Amplify DDoS Attacks

Threatpost

Over the past few days researchers say DDoS attacks have been using memcached servers to amplify DDoS attacks using UDP-based packets.

Cloud 45
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Zero-Day Attacks Major Concern in Hybrid Cloud

Dark Reading

Hybrid cloud environments are particularly vulnerable to zero-day exploits, according to a new study.

Cloud 47
article thumbnail

Intel Releases Updated Spectre Fixes For Broadwell and Haswell Chips

Threatpost

Intel has issued stable microcode to help protect its Broadwell and Haswell chips from the Spectre Variant 2 security exploits.

article thumbnail

Tending Your Garden: Why Information Governance Should be an Ongoing Process in Your Organization: eDiscovery Best Practices

eDiscovery Daily

Editor’s Note: Jim Gill’s writing about eDiscovery and Data Management has been twice recognized with JD Supra Reader’s Choice Awards and he holds an MFA in Creative Writing from Southern Illinois University, Carbondale. Before working in eDiscovery, Jim taught college writing at a number of institutions and his creative work has been published in numerous national literary journals, as well as being nominated for a Pushcart Prize.