Mon.Mar 05, 2018

article thumbnail

InfoGov Expectations Can Be Problematic

Weissman's World

There is very little doubt that infogov technology can do all sorts of amazing things: it can help us find information that otherwise would be lost to us, it can alert us to process inefficiencies that we otherwise would be unaware of, and it can speed communication between us as never before. The problem, though, […]. The post InfoGov Expectations Can Be Problematic appeared first on Holly Group.

article thumbnail

Breach Alert Service: UK, Australian Governments Plug In

Data Breach Today

Both Governments' Domains Now Centrally Monitored via 'Have I Been Pwned' The U.K.'s National Cyber Security Center and Australian Cyber Security Center are using the "Have I Been Pwned" breach-monitoring service to centrally monitor for email addresses registered to government domains that appear in data breaches.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Post - Digital Transformation: Adapt Your Business Environment

AIIM

“Digital Transformation is a game changer,” and “leaders embrace digital transformation”—but is it really a game changer and have we actually embraced it? We’ve all heard plenty of talk about digital transformation. And there is no shortage of articles and research that attempt to define it: From a CIO Magazine : "Digital Transformation is the application of digital capabilities to processes, products, and assets to improve efficiency, enhance customer value, manage risk and uncover new monetiza

article thumbnail

HIMSS Speaker Dill on Underutilized Security Technologies

Data Breach Today

User behavior analytics and data loss prevention tools are among the most promising yet underutilized or improperly implemented security technologies in healthcare, says security consultant Mark Dill, formerly of the Cleveland Clinic, a featured speaker at the HIMSS18 conference.

Security 100
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

New eBook - on modern content problems need modern solutions

AIIM

A new eBook that might be of interest. Modern Problems Require Modern Solutions. A new generation of problems requires new approaches. There is a quote usually attributed to Albert Einstein that states, “The definition of insanity is doing the same thing over and over again, but expecting different results.”. In the content management business, I might rephrase that to be, “The content management tools we embraced in an earlier era to deal with a specific set of problems are not equipped to deal

Cloud 89

More Trending

article thumbnail

How to Prepare for the Future of Healthcare Digital Security

Thales Cloud Protection & Licensing

Healthcare’s IT evolution has brought numerous security challenges including regulations, the use of digitally transformative technologies that have created huge amounts of data to store and protect, and the extraordinary value of electronic personal health information (ePHI) to cybercriminals. In this blog post, I’ll discuss how healthcare enterprises can not only meet these challenges, but go beyond compliance to best practice to secure their data and their reputations.

article thumbnail

Pennsylvania Sues Uber Over Data Breach Disclosure

WIRED Threat Level

Pennsylvania’s attorney general filed a lawsuit against the ride-hailing giant Monday for failing to disclose a massive hack for over a year—and may not be the last.

article thumbnail

Weekly discussion podcast: Critical Information Infrastructure, Part 6

IT Governance

This week’s extract is taken from Toomas Viira’s book Lessons Learned – Critical Information Infrastructure Protection , which is a vital source of information and thought-provoking insights into potential issues within critical information infrastructure (CII). Episode 6 – Protection System Supporting Activities: “Organising joint events, such as training, seminars and information days, helps maintain good relations and promotes information exchange.

article thumbnail

Extracting Secrets from Machine Learning Systems

Schneier on Security

This is fascinating research about how the underlying training data for a machine-learning system can be inadvertently exposed. Basically, if a machine-learning system trains on a dataset that contains secret information, in some cases an attacker can query the system to extract that secret information. My guess is that there is a lot more research to be done here.

58
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The evolution of malware

IT Governance

The Cisco 2018 Annual Cybersecurity Report revealed that the evolution of malware was one of the most important developments in the attack landscape in 2017. Attackers are taking malware to new levels of sophistication and impact, with increasing variety. Malware can be used for financial gain or, in some cases, for the sole purpose of destroying systems and data.

article thumbnail

6 Questions to Ask Your Cloud Provider Right Now

Dark Reading

Experts share the security-focused issues all businesses should explore when researching and using cloud services.

Cloud 70
article thumbnail

Intimate Partner Threat

Schneier on Security

Princeton's Karen Levy has a good article computer security and the intimate partner threat: When you learn that your privacy has been compromised, the common advice is to prevent additional access -- delete your insecure account, open a new one, change your password. This advice is such standard protocol for personal security that it's almost a no-brainer.

article thumbnail

Choosing Records Storage: Questions to Ask Your Provider

Record Nations

In the never-ending quest to optimize the way you run your business, managing your paperwork is one of the most important yet frustrating tasks. While records storage services can help offload most of your storage needs, you may find yourself not knowing where to start when looking for a provider that can meet your business’ […]. The post Choosing Records Storage: Questions to Ask Your Provider appeared first on Record Nations.

62
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Want to succeed as a CDO? 6 articles to read this week

IBM Big Data Hub

Learn more about the right way to approach your data governance governance strategy in 2018 by checking out our top performing articles.

article thumbnail

Insider Threat Seriously Undermining Healthcare Cybersecurity

Dark Reading

Two separate reports suggest insiders - of the malicious and careless variety - pose more of a problem in healthcare than any other sector.

article thumbnail

Understanding the difference between machine learning and predictive analytics

Information Management Resources

The two are closely related and both are centered on efficient data processing to enhance accurate predictions for increased productivity, but there are also many differences between them.

article thumbnail

Ninth Circuit Decision Bolsters FTC Authority Over Internet Service Providers

Hunton Privacy

On February 26, 2018, the United States Court of Appeals for the Ninth Circuit ruled in an en banc decision that the “common carrier” exception in the Federal Trade Commission Act is “activity-based,” and therefore applies only to the extent a common carrier is engaging in common carrier services. The decision has implications for FTC authority over Internet service providers, indicating that the FTC has authority to bring consumer protection actions against such providers to the extent they are

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Self-service analytics and BI outpacing the output of data scientists

Information Management Resources

Business users can more easily learn to use and benefit from modern analytics and business intelligence tools, enabling them to take the lead role in this area by 2019, says Gartner.

article thumbnail

Facebook Upgrades Link Security with HSTS Preloading

Dark Reading

Facebook and Instagram links will automatically update from HTTP to HTTPS for eligible websites, increasing both speed and security, the social media giant said.

article thumbnail

Nuance Communications Announces Healthcare Workflows

Info Source

BURLINGTON, Mass. – March 5, 2018 – Nuance Communications, Inc. today announced a suite of workflows designed to increase productivity, enhance organizational efficiency and drive document security to aid in the management of information for healthcare organizations. Utilizing these workflows, healthcare organizations can drive better patient care, increase billing accuracy and timeliness, enhance EHR documentation accuracy, increase referrals and drive compliance with HIPAA and other regulation

article thumbnail

Working party publishes draft of GDPR guidelines for Article 49 (export derogations)

Data Protection Report

On February 12, 2018, the Article 29 Working Party (WP29) published guidance regarding Article 49 of the General Data Protection Regulation (GDPR) for public comment. The deadline for submitting comments on the draft is March 26, 2018, and responses should be emailed to JUST-ARTICLE29WP-SEC@ec.europa.eu. Like the current EU Data Protection Directive, the GDPR prohibits the onward transfer of Personal Data to: (1) a country that has not been deemed to provide an adequate level of protection (e.g

GDPR 40
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cryptomining Gold Rush: One Gang Rakes In $7M Over 6 Months

Threatpost

Report outlines lucrative rise of nefarious cyrptoming groups and their complex new business models.

Cloud 52
article thumbnail

German DPAs publish templates and guidance on records of processing activities pursuant to Art. 30 GDPR

Data Protection Report

The German Data Protection Authorities (DPAs, acting as the German Data Privacy Conference, Konferenz der unabhängigen Datenschutzbehörden des Bundes und der Länder ) recently published templates for the records of processing activities for controllers (Art. 30 para. 1 GDPR) and processors (Art. 30 para. 2 GDPR) together with a corresponding guidance document.

GDPR 40
article thumbnail

Hacking Back & the Digital Wild West

Dark Reading

Far from helping organizations defend themselves, hacking back will escalate an already chaotic situation.

49
article thumbnail

ArcSight vs Splunk: Top SIEM Solutions Compared

eSecurity Planet

We compare ArcSight and Splunk, two top SIEM solutions rated highly by users and analysts.

52
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

More Security Vendors Putting 'Skin in the Game'

Dark Reading

Secure messaging and collaboration provider Wickr now publicly shares security testing details of its software.

article thumbnail

According to the IGI, Information Governance Continues To Gain Traction: Information Governance Trends

eDiscovery Daily

Last week, the Information Governance Initiative (IGI) released Volume III of their State of Information Governance Report – the third (annual) edition of the Report, which is based on “extensive” surveying of Information Governance (IG) practitioners and providers. So, is Information Governance gaining traction in organizations? (Well, duh, I gave the answer away in the title of this post, didn’t I?

article thumbnail

CERT.org Goes Away, Panic Ensues

Dark Reading

Turns out the Carnegie Mellon CERT just moved to a newly revamped CMU Software Engineering Institute website.

43