Wed.Nov 29, 2017

article thumbnail

A decade of content management change

AIIM

As Jerry Garcia might say, “What a long strange trip it’s been.”. Think about the incredible changes going on in the content management space: A decade of Content Management change. Content Management 2007. Content Management 2017. Driven by IT and specialists. Driven by end users and the business. Departments at large companies. Any size company. Usability & mobility an afterthought.

article thumbnail

Supreme Court Must Understand That Cell Phones Aren’t Voluntary

WIRED Threat Level

Opinion: The US argues that police can access cell phone records freely because customers volunteer that data. But cell phones are no longer optional.

Access 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What are the best books on information security?

IT Governance

There are few resources that can match the in-depth, comprehensive detail of a good book. As Charles William Eliot, the famed president of Harvard University, once said, “Books are the quietest and most constant of friends; they are the most accessible and wisest of counselors, and the most patient of teachers.”. Books also serve as valuable resources for IT professionals looking to broaden their knowledge.

article thumbnail

Here's What I'm Telling US Congress about Data Breaches

Troy Hunt

Last week I wrote about my upcoming congressional testimony and wow - you guys are awesome! Seriously, the feedback there was absolutely sensational and it's helped shape what I'll be saying to the US Congress, including lifting specific wording and phrases provided by some of you. Thank you! As I explained in that first blog post, I'm required to submit a written testimony 48 hours in advance of the event.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The FCC's Net Neutrality Comments Included Millions of Fake Emails and More

WIRED Threat Level

A new analysis of the FCC's net neutrality comment period shows millions of fake or duplicate email addresses and other alarming absurdities.

More Trending

article thumbnail

Former National Security Council Legal Adviser Christopher Fonzone Joins Sidley in Washington, D.C.

Data Matters

Washington, D.C. – Sidley Austin LLP is pleased to announce that Christopher Fonzone, former National Security Council (NSC) legal adviser and deputy assistant and counsel to President Obama, has joined the firm as a partner in its Washington, D.C. office. He will be a member of Sidley’s global Privacy and Cybersecurity practice. Mr. Fonzone has years of experience advising high-level government officials on some of the most pressing national security issues of our time.

article thumbnail

Expensify’s Use of Amazon Mechanical Turk Reveals Privacy Risks Behind AI

WIRED Threat Level

As a recent flare-up around Expensify shows, behind every AI that analyzes your data, teams of human workers pick up the slack.

Risk 91
article thumbnail

List of data breaches and cyber attacks in November 2017 – 59 million records leaked

IT Governance

This month’s list is a little thin compared with other months this year. Is that a good sign? Maybe. What’s certainly not a good sign, however, is the number of data breaches caused by organisations’ own employees. Month after month, I find myself reporting more on organisational mistakes than on the efforts of cyber criminals. Basic information security practices – and I really do mean basic – are ignored over and over again, and for what?

article thumbnail

Deliver even more effective multichannel communications with Exstream 16.3

OpenText Information Management

As much as I love living and working in a digital world, there are still certain things I like to receive on paper, and it seems I’m not alone in that. Many people, of all ages, still like to get printed bills as a visual reminder to pay their various accounts, or to keep as … The post Deliver even more effective multichannel communications with Exstream 16.3 appeared first on OpenText Blogs.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

PCI DSS compliance: a range of encryption approaches available to secure your data

Thales Cloud Protection & Licensing

In the month of October, I wrote about reducing scope for PCI DSS. In this blog, I take it a step further with a discussion about the options available for securing data. Not all types of encryption give you the coverage and flexibility you need. There’s no one-size-fits-all solution for protecting account data; every organization is different, faces different threats and has different security objectives that (ideally) go beyond PCI DSS compliance.

article thumbnail

Warrant Protections against Police Searches of Our Data

Schneier on Security

The cell phones we carry with us constantly are the most perfect surveillance device ever invented, and our laws haven't caught up to that reality. That might change soon. This week, the Supreme Court will hear a case with profound implications on your security and privacy in the coming years. The Fourth Amendment's prohibition of unlawful search and seizure is a vital right that protects us all from police overreach, and the way the courts interpret it is increasingly nonsensical in our compute

Privacy 65
article thumbnail

First US Federal CISO Shares Security Lessons Learned

Dark Reading

Greg Touhill's advice for security leaders includes knowing the value of information, hardening their workforce, and prioritizing security by design.

article thumbnail

Firms face growing data threats, cybersecurity talent shortage

Information Management Resources

Most organizations are ill-prepared to defend against a breach, or even know if one has happened, while the ranks of security pros needs to double to meet current demand.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Apple Announces Emergency Patch to Fix High Sierra Login Bug

Threatpost

Apple said on Wednesday that it will rush an emergency patch to users that fixes an embarrassing login bug in its High Sierra operating system.

IT 47
article thumbnail

SHARP ANNOUNCES U.S. VETERANS HIRING INITIATIVE FOR DEALERS

Info Source

Montvale, NJ, November 29, 2017 – Sharp Imaging and Information Company of America (SIICA), a division of Sharp Electronics Corporation (SEC), has announced an initiative aimed at helping its authorized dealerships across the United States hire the best and brightest America has to offer, our veterans of the Armed Forces. “As our industry becomes more complex, it is increasingly difficult to hire the right people who are technically trained, highly motivated and great team players.

Sales 40
article thumbnail

Amazon Wants to Secure Things from the Cloud with IoT Device Defender

eSecurity Planet

Amazon doesn't want a repeat of the Mirai botnet, so it has launched a new service to help monitor and protect against IoT device risks.

IoT 46
article thumbnail

No Dismissal of Claim Against Defendant Accused of Transferring Company Info to Dropbox Account: eDiscovery Case Law

eDiscovery Daily

In Abbott Labs. v. Finkel, No. 17-cv-00894-CMA (D. Colo. Nov. 17, 2017) , Colorado District Judge Christine M. Arguello denied the defendant-movant’s motion to dismiss the plaintiff-respondent’s conversion claim that the defendant disclosed the plaintiff’s confidential information and trade secrets to a third party and transferred that information to his personal online cloud storage Dropbox account.

Cloud 40
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Samsung's Mobile Device Bug Bounty Program Gets a Boost

Dark Reading

Samsung Electronics partners with Bugcrowd to deliver timely payments for its Mobile Security Rewards Program.

article thumbnail

Cloud Security Fail: Classified U.S. Military Data Exposed in Amazon S3 Bucket

eSecurity Planet

The exposed data includes information on the Army's Distributed Common Ground System and its cloud component, Red Disk.

Cloud 41
article thumbnail

Why Security Depends on Usability -- and How to Achieve Both

Dark Reading

Any initiative that reduces usability will have consequences that make security less effective.

article thumbnail

Majority of Internet traffic now controlled by bots

Information Management Resources

More than half of firms do not inspect the traffic they transfer to-and-from APIs, and 56 percent do not have the ability to track data once it leaves the company.

IT 35
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Dark Web Intelligence Startup Terbium Labs Raises $6 Million

eSecurity Planet

The startup uses AI to monitor the dark web, helping businesses detect breaches and fraud.

40
article thumbnail

How financial companies handle angry customers

Information Management Resources

The industry has long opposed one of the CFPB's most notable innovations: a public database that registers and tracks complaints about services such as mortgages and credit reporting.

article thumbnail

Big Apple Flaw Allows Root Access to Macs without Password

Dark Reading

Vulnerability affects machines running High Sierra operating system.

article thumbnail

Algorithm outperforms radiologists in diagnosing pneumonia

Information Management Resources

Stanford researchers developed neural network and trained it on the largest public chest X-ray dataset.

IT 43
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Apple Patches Massive Security Flaw in MacOS High Sierra

eSecurity Planet

The vulnerability was disclosed publicly yesterday on Twitter.

article thumbnail

Bitcoin eclipses $10,000 level as bubble warnings multiply

Information Management Resources

While the actual volume of transactions conducted in cryptocurrencies is relatively small, the optimism surrounding the technology continues to drive it to new highs.

IT 30
article thumbnail

SHARP HOSTS NATIONAL DEALER MEETING IN PHOENIX, AZ

Info Source

Montvale, NJ, November 29, 2017 – Sharp Imaging and Information Company of America (SIICA), a division of Sharp Electronics Corporation (SEC), is hosting its National Dealer Meeting from November 28 to December 1, 2017 at the JW Marriott Desert Ridge Resort in Phoenix, AZ. At its flagship dealer event, themed “Pulse 2017,” Sharp will demonstrate how the company is uniquely positioned to maximize today’s office environment, as well as develop systems for the office of the future by having its fin