Tue.May 08, 2018

article thumbnail

It’s Eleven O’Clock. Do You Know If Your Organizational Data Is Safe?

Thales Cloud Protection & Licensing

Data is increasingly amassed and harnessed to accelerate organizational transformation in the new digital economy. But because databases can hold sensitive details, protecting them is imperative. Unprotected data at rest is an attractive target for cybercriminals, and in today’s ever more distributed environment, not a week goes by without hearing of a new data breach.

article thumbnail

National Standard on Personal Information Security Goes into Effect in China

Hunton Privacy

On May 1, 2018, the Information Security Technology – Personal Information Security Specification (the “Specification”) went into effect in China. The Specification is not binding and cannot be used as a direct basis for enforcement. However, enforcement agencies in China can still use the Specification as a reference or guideline in their administration and enforcement activities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How organizations can move beyond big data to huge gains

Information Management Resources

Leading firms are leveraging artificial intelligence and machine learning to reimagine how they engage with customers, and the results are dramatic, says futurist Mike Walsh.

article thumbnail

Cryptocurrency Miners Exploit Widespread Drupal Flaw

Data Breach Today

Researcher: 400 Sites or More Fall Victim to Massive, Forced Monero Mining Operation A remote code execution vulnerability revealed in late March in the Drupal content management system is now being used on a large scale for mining the virtual currency monero, a researcher says. At least 400 websites have been infected, and the total number is likely far higher, security experts warn.

Mining 170
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Government faces possible defeat on press regulation votes

The Guardian Data Protection

Theresa May tells cabinet two amendments to data protection bill will undermine free press The government is facing two difficult votes, and potential defeats, over amendments to the data protection bill that are due to be debated in the Commons on Wednesday. The amendments would establish a “Leveson two” inquiry into the misuse of personal data by the media, and a measure that would impose punitive legal costs on English media organisations that refuse to sign-up to Impress, the officially reco

More Trending

article thumbnail

Ministers risk judicial review of plan to deny immigrants data access

The Guardian Data Protection

Campaign groups say clause preventing access to records will make EU citizens ‘second class’ The government is being warned that it will face judicial review proceedings in June unless it scraps a clause in the data protection bill that would prevent immigrants from accessing their Home Office records. The campaign groups the3million , a grassroots organisation representing EU citizens living in the UK, and the Open Rights Group argue that the exemption for data protection for immigrants is unla

Access 93
article thumbnail

Properly Framing the Cost of a Data Breach

Dark Reading

The expenses and actions typically associated with a cyberattack are not all created equal. Here's how to explain what's important to the C-suite and board.

article thumbnail

What is free Hadoop costing you?

IBM Big Data Hub

By 2025, there will be 180 trillion gigabytes of data in the world, compared to only 10 trillion gigabytes in 2015. Of this, 90 percent will be unstructured, which is why many organizations are adopting open source data lake technologies such as Apache Hadoop to handle this expanding volume and variety of data.

71
article thumbnail

New criminal hacking group targets healthcare organisations

IT Governance

Industry researchers have identified a new criminal hacking group targeting healthcare organisations in the US, EU (including the UK) and the Middle East. Dubbed ‘Orangeworm’, the group operates by targeting hospitals with Trojan malware to access medical equipment and devices, including MRI scanners and X-ray equipment. Reports suggest that Orangeworm was first identified in January 2015.

Risk 66
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The US Is Unprepared for Election-Related Hacking in 2018

Schneier on Security

This survey and report is not surprising: The survey of nearly forty Republican and Democratic campaign operatives, administered through November and December 2017, revealed that American political campaign staff -- primarily working at the state and congressional levels -- are not only unprepared for possible cyber attacks, but remain generally unconcerned about the threat.

article thumbnail

How to conduct an ISO 22301-compliant business impact analysis

IT Governance

If your organisation has adopted, or plans to adopt, ISO 22301 , you will need to conduct a business impact analysis (BIA). Getting this process right is essential, as its conclusions inform risk assessments, security strategies and other vital components of business continuity. Why you need a BIA. A BIA assesses the risks an organisation faces, how disruptive they will be and how long it will take to recover.

Risk 61
article thumbnail

Toshiba Enters Partnership with XMedius

Info Source

. LAKE FOREST, Calif. & SEATTLE, Wash. (May 8, 2018) — Toshiba America Business Solutions today announced it has entered into a partnership with XMedius Solutions, Inc. , a global leader in enterprise communications solutions, to provide Toshiba’s clients with a secure, reliable and efficient fax over IP solution. XMediusFAX ® enables delivery of a fax from most Toshiba multifunction printers and other devices, including iPhones ® , iPads ® or Android mobile devices, as well as email applic

article thumbnail

Report: More Breaches Despite Increasing Security Budgets

Dark Reading

Lack of security talent, low security awareness among employees, and too much data to analyze tops the list of cyberthreats in the 2018 Cyberthreat Defense Threat Report from CyberEdge group.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Why is UK press regulation back in the headlines?

The Guardian Data Protection

Key details about the latest developments since the lengthy and expensive Leveson inquiry In 2011 the then prime minister, David Cameron, announced a public inquiry into press standards after the phone-hacking scandal which brought down the News of the World. Continue reading.

54
article thumbnail

The Data Breach Case Study & Protection Guide

Record Nations

Even the tiniest security gap can lead to a data breach. After a $5.5 million settlement, Nationwide Insurance’s breach serves as just one example of the growing number of data breaches each year—making it all the more important you have protections in place. What Happened Even the tiniest serious gap can pose serious risks. Recently […].

article thumbnail

We don’t need another inquiry into the press after Leveson | Letters

The Guardian Data Protection

David Newell , CEO of the News Media Association, rebuts Ed Miliband’s argument for Leveson 2 Ed Miliband’s piece ( The victims of the press need Leveson to be completed, 8 May ) only serves to illustrate the flaws in the argument that a further inquiry into the press is justified. The Leveson inquiry and resulting police investigations into the press cost taxpayers nearly £50m.

IT 48
article thumbnail

FBI: Cyber-Fraud Losses Rise to Reach $1.4B

Threatpost

Tech-support scams took off during the year, while whaling/business email compromise was the main threat, accounting for losses of more than $675 million.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

eDiscovery enhancements yield efficiency gains in new OpenText Axcelerate release

OpenText Information Management

In eDiscovery, review efficiency is about the (seemingly) little things. Resolving issues quickly, keeping reviewers consistent, assigning the right reviewers to the right batches, minimizing scrolling in tagging panels, and more – these all add up to an intuitive and efficient review experience. OpenText™ Axcelerate™ 5.14, part of OpenText Release 16, EP4, features incremental enhancements designed … The post eDiscovery enhancements yield efficiency gains in new OpenText Axcelerate releas

45
article thumbnail

Adobe Patches Critical Bugs In Flash Player, Creative Cloud

Threatpost

Adobe fixed critical vulnerabilities in Adobe Flash Player and Creative Cloud as part of its regularly scheduled May Security Bulletin, on Tuesday.

Cloud 47
article thumbnail

Breakout Time: A Critical Key Cyber Metric

Dark Reading

Why organizations need to detect an intrusion in under a minute, understand it in under 10 minutes, and eject the adversary in under an hour.

IT 48
article thumbnail

How artificial intelligence is reshaping jobs in banking

Information Management Resources

More than 1 million jobs will be lost to AI by 2030, according to one estimate. But new jobs are also being created. Are banks and their employees ready?

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Microsoft's Patch Tuesday Fixes Two CVEs Under Active Attack

Dark Reading

This month's updates addressed vulnerabilities in Windows, Office, Edge, Internet Explorer,Net Framework, Exchange Server, and other services.

46
article thumbnail

Defending a Data-Driven Business Model

Information Matters

I’m in the middle of a research project looking into how startups in the UK and US are building businesses which have data at the heart of their business models. There is a lot of talk about how “data is the new oil” 1) The Economist, 2017. The world’s most valuable resource is no longer oil, but data. The Economist. [online] 6 May.

article thumbnail

8.7B Identity Records on Surface, Deep, Dark Webs in 2017

Dark Reading

The 4iQ Identity Breach Report shows a 182% increase in raw identity records discovered by its team between 2016 and 2017.

IT 50
article thumbnail

Fujitsu and Kofax Partner to Improve Business Efficiency with RPA

Info Source

Irvine, CA, and Tokyo, Japan, May 8, 2018 – Fujitsu Limited and Kofax Japan have entered into a global sales partner agreement in Robotic Process Automation (RPA). This will enable the two companies to collaboratively conduct new market development activities. Fujitsu and Kofax are now offering RPA solutions in Japan, and will in the future steadily rollout globally.

Sales 40
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

St. Kitts and Nevis Pass the Data Protection Bill 2018

Hunton Privacy

On May 4, 2018, St. Kitts and Nevis’ legislators passed the Data Protection Bill 2018 (the “Bill”). The Bill was passed to promote the protection of personal data processed by public and private bodies. Attorney General the Honourable Vincent Byron explained that the Bill is largely derived from the Organization of Eastern Caribbean States model and “seeks to ensure that personal information in the custody or control of an organization, whether it be a public group like the government, or privat

article thumbnail

Axcelerate Collection Services powered by EnCase

OpenText Information Management

I consider myself a car enthusiast; I enjoy track days and turning a wrench, but there are certain projects that I would rather have a professional with experience complete. Changing your oil is one thing, replacing your rod bearings is another. Collecting electronically stored information (ESI) for eDiscovery, litigation, compliance and due diligence is a … The post Axcelerate Collection Services powered by EnCase appeared first on OpenText Blogs.

article thumbnail

Massachusetts Senate passes data protection bill targeting consumer credit agencies

Data Protection Report

On Thursday, April 26, 2018, the Massachusetts Senate unanimously passed a data breach protection bill that strengthens consumer protections after security breaches involving consumer credit reporting agencies. If passed, the proposed legislation would amend Massachusetts’s current breach notification law. The bill aims to help consumers protect their sensitive information before, during, and after a data breach.