Wed.Dec 18, 2019

article thumbnail

4 questions to answer before the CCPA deadline 

Collibra

The January 1, 2020 deadline for implementing the California Consumer Privacy Act (CCPA) is looming. While enforcement of the new law won’t begin until July 1, 2020, many organizations are still only in the starting blocks. Correctly adhering to CCPA regulations requires attention to its details, a sound strategic approach, and the appropriate use of technology.

article thumbnail

5 Pieces of GDPR Advice for Teams Without Privacy Compliance Staff

Dark Reading

Are you an army of one tasked with compliance and data privacy? Try these tips to get you and your organization in alignment with regulators.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Recent Developments on Cookies – a Pan-European Overview

HL Chronicle of Data Protection

The legal requirements for the use of cookies have been subject to discussion over the last few years, with little to no enforcement and guidance from European data protection authorities (DPAs). That has changed recently. In the last few months, there have been interesting developments concerning the use of cookies. Upon investigating 175 websites, the Dutch DPA concluded that half of those websites did not comply with cookie requirements.

article thumbnail

Canadian Lab Pays Ransom to 'Retrieve' Data

Data Breach Today

Hackers Exfiltrated Data on 15 Million LifeLabs Clients A Canadian medical testing lab acknowledges that it paid a ransom to "retrieve" data stolen by hackers in an incident that apparently did not involve ransomware. Find out about the unusual details of this incident.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

The difference between DataOps and DevOps and other emerging technology practices.

IBM Big Data Hub

The expectation to achieve faster results continues to rise. Businesses everywhere are looking for ways to improve their operational efficiency and effectiveness to enable the best decision-making. The need to optimize typically comes to a head with the reality that there are many silos within any company.

101
101

More Trending

article thumbnail

bA Data-Centric Approach to DEFEND

Thales Cloud Protection & Licensing

Last month, I presented at the FCW Continuous Diagnostics Mitigation (CDM) Summit. The vision of the CDM program, created in 2012, is that all federal networks should be continuously scanned to identify and respond to threats and breaches. Consistent with the federal government’s deployment of Information Security Continuous Monitoring (ISCM), the CDM program is a dynamic approach to fortifying the cybersecurity of government networks and systems.

article thumbnail

Who Else Is in That Video Meeting? Maybe a Hacker

Data Breach Today

Forescout Finds Serious Flaws in DTEN Conferencing Systems Video conferencing and collaboration systems are must-have tools for global companies. But new research by Forescout illustrates that elementary security errors in one vendor's system could have allowed attackers to snoop on meetings and view sensitive documents.

Security 147
article thumbnail

How to Plan a Centralized File Collection – Part 2

TAB OnRecord

In last week’s blog post, we kicked off a three-part series on centralizing physical records. In part one, we learned that you need to have a clear understanding of existing practices before you can develop a standard filing system for the centralized records room. This week we focus on how storage and space planning can save money and make the most of the available space in your centralized file room.

article thumbnail

Ransomware Risk Management: 11 Essential Steps

Data Breach Today

Tips From a Cybersecurity Veteran on Winning the Battle In this in-depth blog, a long-time cybersecurity specialist who recently joined the staff of Information Security Media Group sizes up evolving ransomware risks and offers a list of 11 critical mitigation steps.

Risk 124
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

6 steps to start your DataOps practice

IBM Big Data Hub

DataOps is the orchestration of people, process, and technology to accelerate the quick delivery of high-quality data to data citizens. When done right, DataOps creates business value because users know what data they have, can trust the quality and its meaning, and use it without violating compliance or privacy laws.

article thumbnail

Cyber Ground Truth in the Financial Sector

Data Breach Today

Steganography Makes a Comeback

147
147
article thumbnail

Implementing DataOps across a banking enterprise

IBM Big Data Hub

Imagine a day in the life of Sarah, a hypothetical Chief Data Officer at a major bank in South Africa. There are many expectations on her shoulders. She struggles to deliver business-ready data to fuel her organization and support the decision makers within the bank. It is her job to put in place a team that will make sense of the myriad of data sources and different representations of data, multiple formats and technologies used to store and move that data.

IT 85
article thumbnail

Deploying AI and analytics to improve legal outcomes

OpenText Information Management

A series of massive jury awards have grabbed headlines lately, including an $8 billion punitive damages verdict against Johnson & Johnson. Large jury awards, especially these types of megaverdicts (defined as $10M and up), are magnifying the potential downside of going to trial, causing many companies to consider how to leverage artificial intelligence (AI) and … The post Deploying AI and analytics to improve legal outcomes appeared first on OpenText Blogs.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Creditors Seek to Exhume the Body of a Dead Crypto Executive 

WIRED Threat Level

Gerry Cotten took at least $137 million to the grave when he died without giving anyone the password to his encrypted laptop.

article thumbnail

Accelerate your business with integrations that matter

OpenText Information Management

As everything becomes more and more connected in the enterprise, people, devices, and software, so does the need for all your information to be integrated. It’s no longer “good enough” to just manage your business content, you need to more with it unlocking its hidden potential and make it available to the workforce on demand … The post Accelerate your business with integrations that matter appeared first on OpenText Blogs.

IT 78
article thumbnail

What is DataOps?

IBM Big Data Hub

Most businesses collect data but are unable to use it to generate business value or deliver insights in a timely fashion. Data volume and data types continue to grow, as do the different types of data citizens—ranging from business users to data scientists. As a result, data management and delivery often become critical bottlenecks. Enter DataOps.

IT 75
article thumbnail

Meet Cliff Stoll, the Mad Scientist Who Invented the Art of Hunting Hackers

WIRED Threat Level

Thirty years ago, Cliff Stoll published The Cuckoo's Egg, a book about his cat-and-mouse game with a KGB-sponsored hacker. Today, the internet is a far darker place—and Stoll has become a cybersecurity icon.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Gangnam Industrial Style APT campaign targets industrial firms worldwide

Security Affairs

Experts discovered that at least 200 companies were the victims of a campaign, dubbed Gangnam Industrial Style, carried out by an advanced persistent threat (APT) group. Experts from the CyberX’s threat intelligence team Section 52 uncovered an ongoing cyberespionage campaign, tracked as Gangnam Industrial Style, that targeted industrial, engineering, and manufacturing organizations, most of them in South Korea (60%).

article thumbnail

CCPA 2.0 Moves to Next Critical Stage of Referendum Process

Data Matters

In the evening of December 17, 2019, Californians for Consumer Privacy , the consumer privacy rights organization led by Alastair Mactaggart that propelled California towards the U.S.’s first comprehensive privacy legislation , tweeted the Attorney General’s release of the title and summary for Initiative 19-0021. This Initiative would substantively amend and essentially replace the California Consumer Privacy Act (“CCPA”) with the proposed Consumer Privacy Rights Act of 2020—also known colloqu

Privacy 60
article thumbnail

Trend Micro observed notable malware activity associated with the Momentum Botnet

Security Affairs

Security experts recently found notable malware activity affecting devices running Linux that is associated with the Momentum Botnet. Malware researchers from Trend Micro recently observed notable malware activity affecting devices running Linux that is associated with the Momentum Botnet. Experts revealed details on the tools and techniques used by the botnet to compromise Linux devices and recruit them in launching distributed denial-of-service (DDoS) attacks.

article thumbnail

CCPA 2.0 Moves to Next Critical Stage of Referendum Process

Data Matters

In the evening of December 17, 2019, Californians for Consumer Privacy , the consumer privacy rights organization led by Alastair Mactaggart that propelled California towards the U.S.’s first comprehensive privacy legislation , tweeted the Attorney General’s release of the title and summary for Initiative 19-0021. This Initiative would substantively amend and essentially replace the California Consumer Privacy Act (“CCPA”) with the proposed Consumer Privacy Rights Act of 2020—also known colloqu

Privacy 60
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Lab test provider LifeLabs disclose a data breach that exposed personal info of 15M customers

Security Affairs

Lab test provider LifeLabs has disclosed a data breach that exposed personal information for up to 15 million Canadians. Lab test provider LifeLabs announced that personal information for up to 15 million Canadians have been exposed after an unauthorized user gained access to their systems. LifeLabs notified its customers via letter, exposed data includes names, contact information, health card numbers, and for approximately 85,000 customers their lab test results.

article thumbnail

Components of the DataOps toolchain and best practices to make it successful

IBM Big Data Hub

High-quality data is the core requirement for any successful, business-critical analytics project. It is the key to unlock and generate business value and deliver insights in a timely fashion. However, stakeholders across the board are responsible for data delivery, quickly evolving requirements, and processes. Their preference towards technology is deflating traditional methods of responding to inconsistent data and consequently disappointing users.

IT 58
article thumbnail

Flaws in Acer and ASUS pre-installed software could lead to arbitrary code execution

Security Affairs

Experts found several flaws in Acer and ASUS software preinstalled on most of their PCs that could lead to privilege escalation and arbitrary code execution. SafeBreach experts discovered several vulnerabilities in Acer and ASUS software that comes pre-installed on most PCs from these vendors. The flaws could be exploited by attackers for privilege escalation and to execute arbitrary payloads.

article thumbnail

Ring Plagued by Security Issues, Flood of Hacks

Threatpost

A Motherboard report found Ring lacking basic security measures for preventing hackers from hijacking the devices.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Emotet distributed with emails posing as German authorities, BSI warns

Security Affairs

BSI, Germany’s federal cybersecurity agency warns of an active malspam campaign that distributing the infamous Emotet banking Trojan. Germany’s federal cybersecurity agency BSI is warning of an active malspam campaign that aims at distributing the Emotet banking Trojan. The malicious messages camouflaged to look like messages delivered by German federal authorities.

article thumbnail

The Pentagon's AI Chief Prepares for Battle

WIRED Threat Level

Lt. Gen. Jack Shanahan doesn't want killer robots—but he does want artificial intelligence to occupy a central role in warfighting.

article thumbnail

Recent Developments on Cookies – a Pan-European Overview

HL Chronicle of Data Protection

The legal requirements for the use of cookies have been subject to discussion over the last few years, with little to no enforcement and guidance from European data protection authorities (DPAs). That has changed recently. In the last few months, there have been interesting developments concerning the use of cookies. Upon investigating 175 websites, the Dutch DPA concluded that half of those websites did not comply with cookie requirements.