Tue.Feb 13, 2018

article thumbnail

Equifax Gets a New CISO

Data Breach Today

Jamil Farshchi Moves From Home Depot to Beleaguered Credit Bureau After suffering one of the worst data breaches in history, in which 145.5 million U.S. consumers' personal details were stolen, credit bureau Equifax has hired Jamil Farshchi to serve as its new CISO. Farshchi joins from Home Depot, which hired him after suffering a massive data breach.

article thumbnail

Four important questions that AI can help retailers answer

OpenText Information Management

In my previous blog, I looked at how quickly Artificial Intelligence (AI) is rapidly becoming a part of the retail experience. Industry analysts agree that 2018 will be the year that AI brings top and bottom line benefits to innovative companies. So, where can AI most help retailers? Here’s four questions I think a combination … The post Four important questions that AI can help retailers answer appeared first on OpenText Blogs.

Retail 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attribution Games: Don't Rush to Blame

Data Breach Today

Experts Decry Attempts to Rapidly Attribute Winter Olympics Hacking Following the online attack against the opening ceremonies of the Olympic Winter Games in South Korea, some pundits were quick to guess that Russia was involved. But some attribution experts call the rush to attribute any cyberattack premature or even "irresponsible.

100
100
article thumbnail

What is a content management system (CMS)?

OpenText Information Management

The names (and acronyms) may be similar, but there’s a huge difference between the different solution sets that can fall under the banner of Content Management System (CMS). So let’s try to clear up the confusion and explain the role for an enterprise CMS today. CMS as a term has been around for a long … The post What is a content management system (CMS)?

CMS 75
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Sheltered Harbor: A New Approach to Account Backups

Data Breach Today

After two years of development in stealth mode, the Sheltered Harbor effort to get U.S. financial institutions to use a standard approach to account data backup is shifting into high gear, says Trey Maust, the new CEO of the initiative, which is backed by FS-ISAC.

100
100

More Trending

article thumbnail

Panel of Experts Describes Steps to Secure Aadhaar Data

Data Breach Today

In an exclusive, in-depth analysis, a panel of security experts concludes that India's recent Aadhaar data security conundrum, resulting in identity theft and data breaches, was due to poor implementation of security, monitoring and authentication mechanisms.

Security 100
article thumbnail

SEC Office of Compliance Inspections and Examinations Publishes 2018 Exam Priorities

Data Matters

On February 7, 2018, the Office of Compliance Inspections and Examinations (OCIE) of the U.S. Securities and Exchange Commission (the Commission) released its annual National Exam Program Examination Priorities (Exam Priorities). 1 As has been widely reported, the Exam Priorities’ general focus areas include: retail investors. compliance and risks in critical market infrastructure. oversight of the Financial Industry Regulatory Authority (FINRA) and Municipal Securities Rulemaking Board (MSRB).

article thumbnail

OpenText and Documentum – a year of progress in Energy and Engineering

OpenText Information Management

As we reach the first anniversary of the OpenText purchase of the Documentum family, I thought it was a good idea to look back at the extraordinary progress that has made in Energy and Engineering over the last 12 months — and look forward to what is happening next. There are exciting times ahead and … The post OpenText and Documentum – a year of progress in Energy and Engineering appeared first on OpenText Blogs.

article thumbnail

How to avoid duplication when implementing an ISO 27001 ISMS

IT Governance

Creating and managing documentation for your ISO 27001 information security management system (ISMS) is often the hardest part of achieving ISO 27001 certification. One of the more complex areas of this crucial step is keeping track of all your documentation and avoiding duplication. Creating and managing documentation requires a huge amount of resources, time and management.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Preparing for Brexit: six steps HR can take now

OpenText Information Management

Have you ever transferred 100% of the workforce to another country with different employment laws? Well, that’s not too far from what UK companies, as well as many multinationals, could potentially face on the official EU departure date of March 29, 2019. Whether Brexit is “soft” or “hard” and whatever form its immigration policies take, … The post Preparing for Brexit: six steps HR can take now appeared first on OpenText Blogs.

IT 67
article thumbnail

2018 Worldwide Threats Briefing: 5 Takeaways, From Russia to China

WIRED Threat Level

In a Senate hearing Tuesday, the heads of the three-letter intelligence agencies detailed their greatest concerns.

article thumbnail

Digital transformation in Financial Services requires a rethink of identity management

OpenText Information Management

The recent Gartner’s 2018 CIO Agenda Survey found that digital transformation is more important for banking than any other industry sector. The CIOs talked about enabling technologies such as AI, APIs and analytics. However, the discussion didn’t cover identity management and that’s an area that needs to be urgently addressed if Financial Service companies are … The post Digital transformation in Financial Services requires a rethink of identity management appeared first on OpenText Blogs.

article thumbnail

Jumping Air Gaps

Schneier on Security

Nice profile of Mordechai Guri, who researches a variety of clever ways to steal data over air-gapped computers. Guri and his fellow Ben-Gurion researchers have shown, for instance, that it's possible to trick a fully offline computer into leaking data to another nearby device via the noise its internal fan generates , by changing air temperatures in patterns that the receiving computer can detect with thermal sensors , or even by blinking out a stream of information from a computer hard dr

IT 53
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Amino Apps Makes the Case for Anonymity Online

WIRED Threat Level

The saying goes, "On the internet, no one knows you're a dog." Is that a good thing for an app for teens?

article thumbnail

Information Governance vs Records Management [Video]

Record Nations

Records management and information governance are two terms with similarities in their responsibilities and principles yet are executed very differently. Video Transcript Recognizing the Difference The terms “records management” and “information governance” are often used interchangeably. While the two do have similar purposes, there are also clear distinctions between them.

article thumbnail

Can Android for Work Redefine Enterprise Mobile Security?

Dark Reading

Google's new mobility management framework makes great strides in addressing security and device management concerns while offering diverse deployment options. Here are the pros and cons.

article thumbnail

Toshiba’s State-of-the-Art Eco Copier Wins 2018 Better Buys Innovative Product of Year Award

Info Source

LAKE FOREST, Calif. (February 13, 2018) — Toshiba America Business Solutions ’ g roundbreaking hybrid copier, the e-STUDIO 4508LP , continues to receive industry accolades earning the Better Buys 2018 Innovative Product of the Year award for best monochrome copier. . Better Buys’ editors recognized Toshiba’s first-of-its-kind copier for its capability to produce both erasable and standard black prints.

Paper 40
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Lazarus Group Attacks Banks, Bitcoin Users in New Campaign

Dark Reading

A new Lazarus Group cyberattack campaign combines spear-phishing techniques with a cryptocurrency scanner designed to scan for Bitcoin wallets.

article thumbnail

Vera to Power Canon Solutions America’s New Security Solutions and Services Strategy

Info Source

– Canon Solutions America’s Enterprise Services and Solutions group will leverage Vera’s advanced data protection and rights management platform for secure data capture, detailed auditing, and data privacy. — Vera’s data-centric security technology is designed to encrypt customer data in transit, at rest, and in use , helping to protect sensitive information from data loss and damaging breaches.

article thumbnail

As Primaries Loom, Election Security Efforts Behind Schedule

Dark Reading

While federal agencies lag on vulnerability assessments and security clearance requests, the bipartisan Defending Digital Democracy Project releases three new resources to help state and local election agencies with cybersecurity, incident response.

article thumbnail

CHINA: NEW DATA PROTECTION STANDARD – WHAT YOU NEED TO KNOW

DLA Piper Privacy Matters

By Scott Thiel and Carolyn Bigg. The long awaited new National Standards on Information Security Technology – Personal Information Security Specification GB/T 35273-2017 (“PI Specification”) has now been released, and will come into force on 1 May 2018. This represents the new de facto standard for practical data protection handling, in effect complementing and clarifying the various existing data protection laws (for example, under the Cybersecurity Law and the Consumer Protec

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

AI and Machine Learning: Breaking Down Buzzwords

Dark Reading

Security experts explain two of today's trendiest technologies to explain what they mean and where you need them.

article thumbnail

“Master” the Love – Today and on February 28th: eDiscovery Trends

eDiscovery Daily

Happy Valentine’s Day! Hope you’re all feeling the love today! Speaking of feeling the love, we’re only two weeks away from the first event of the year at The Master’s Conference in Dallas! The Master’s Conference brings together leading experts and professionals from law firms, corporations and the bench to develop strategies, practices and resources for managing eDiscovery and the information life cycle.

article thumbnail

Fake News: Could the Next Major Cyberattack Cause a Cyberwar?

Dark Reading

In the way it undercuts trust, fake news is a form of cyberattack. Governments must work to stop it.

article thumbnail

Two Nasty Outlook Bugs Fixed in Microsoft’s Feb. Patch Tuesday Update

Threatpost

One of the bugs could allow a successful attack simply by a user viewing an email in Outlook's Preview pane.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Microsoft Fixes Two Security Flaws in Outlook

Dark Reading

February security patches include updates for 50 vulnerabilities, 14 of which are critical.

article thumbnail

The most in-demand trait for new data pro hires - passion

Information Management Resources

What employers most need from analysts is enthusiasm for what the employee can do with data to drive business decisions and advance the corporate mission.

article thumbnail

Equifax Names New CISO

Dark Reading

Former Home Depot CISO takes the reins in the wake of Equifax's massive data breach and fallout.