Thu.Jan 18, 2018

article thumbnail

Intel Confirms Fresh Spectre, Meltdown Patch Problems

Data Breach Today

Latest CPUs Also Suffer From Frequent Rebooting Problem Intel says firmware updates it developed to help protect users against the Meltdown and Spectre vulnerabilities have been causing not just older chipsets but also its newest CPUs - in both client devices and data center servers - to reboot much more frequently than they should.

IT 160
article thumbnail

What are vital records, and how do you protect them?

TAB OnRecord

When vital records are not protected, there is a major risk involved if the unthinkable happens. We’ve created this resource to help your organization mitigate that risk by following these five steps. Read More. The post What are vital records, and how do you protect them? appeared first on TAB Records Management Blog | TAB OnRecord.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bitcoin-Amassing AlphaBay Drug Barons Get US Prison Time

Data Breach Today

'Caliconnect' Earned $1.4 Million on Silk Road Before Its Demise Two men have been sentenced to serve at about six years each in U.S. federal prison after selling drugs such as marijuana and cocaine via darknet markets, including AlphaBay. The separate arrests of both defendants predate law enforcement seizing control of AlphaBay.

Marketing 153
article thumbnail

Guest Post -- 10 Mindset Tips for Project Managers

AIIM

Project management often involves working in high stress environments with tight deadlines and multiple competing priorities. The most successful Project Managers learn how to navigate these environments and often have a strong understanding of their own shortcomings and the strengths of their team. To create this success orientated mindset there are a number of tips and strategies that Project Managers can look to adopt. 1 -- Spend Time To Understand Your Own Management Style.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Aadhaar Getting Additional Security Layer

Data Breach Today

Will the New Steps Prove Effective? Security Experts Weigh In To address growing concerns about Aadhaar, the Unique Identification Authority of India, which administers the ID program, is taking two key steps to add a layer of security. But some observers are already questioning whether the move will prove effective.

Security 113

More Trending

article thumbnail

Framework Aims to Improve Patient Data Matching

Data Breach Today

A new framework aims to improve patient safety and data integrity by helping healthcare entities to more consistently and accurately match patients with all their information, developers Kirk Botula and Melanie Mecca explain in this in-depth interview.

100
100
article thumbnail

What is the Best Way to Manage Records and Documents?

Record Nations

Most people use the terms “Records” and “Documents” interchangeably. However, there are some important, yet different, aspects of each. Where records aren’t used regularly, they are used to provide evidence of events. Documents are active files that need to be available for people to access and edit. Now what? You have records that you are […].

Access 75
article thumbnail

Triton Malware Details Show the Dangers of Industrial System Sabotage

WIRED Threat Level

New details about Triton malware should put industrial systems and critical infrastructure on notice.

Security 101
article thumbnail

Is it time to put blockchain in your supply chain?

OpenText Information Management

In the OpenText™ Business Network – top ten supply chain predictions for 2018 blog post, prediction number 3 was Blockchain starts to be embraced across the supply chain. The full prediction stated: Today, companies are looking for ways to apply blockchain technology to the supply chain. As with any new technology, the first step is to … The post Is it time to put blockchain in your supply chain?

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

A New Way to Track Down Bugs Could Help Save IoT

WIRED Threat Level

New research advances techniques for finding and exploiting known vulnerabilities in IoT devices automatically.

IoT 92
article thumbnail

Weekly podcast: Meltdown and Spectre SCADA problems, Apple text bomb and WEF cyber risks

IT Governance

This week, we discuss further problems caused by patches for the Meltdown and Spectre vulnerabilities, a text bomb that crashes Apple devices and the World Economic Forum’s Global Risks Report 2018. Hello and welcome to the IT Governance podcast for Friday, 19 January 2018. Here are this week’s stories. As I touched upon last week , fixes for the Meltdown and Spectre CPU vulnerabilities seem to be causing as many problems as they’re addressing.

Risk 66
article thumbnail

OpenText Elite: 2017 year in review

OpenText Information Management

We are now more than halfway through the first month of 2018, but I still find myself reflecting on the past year. For me personally, it was a big year – my first leading OpenText Customer Marketing – and I am immensely grateful for the opportunity each and every day. I am lucky to work … The post OpenText Elite: 2017 year in review appeared first on OpenText Blogs.

article thumbnail

Belgium Adopts Law Reforming the Belgian Privacy Commission

Hunton Privacy

On January 10, 2018, the Law of 3 December 2017 creating the Data Protection Authority (the “Law”) was published in the Belgian Official Gazette (available in French and Dutch ). The Law was submitted in the Chamber of Representatives on August 23, 2017, and was approved by the Parliament in plenary meeting on November 16, 2017. The EU General Data Protection Regulation (“GDPR”) provides national data protection authorities with a strengthened enforcement role.

Privacy 55
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Brexit – How do you prepare for the unknown?

OpenText Information Management

Brexit. It hasn’t even happened yet but it’s already creating countless questions — and more than a few headaches — for governments, companies and citizens in the United Kingdom (UK), across the European Union (EU), and outside the EU as well. With potential disruptions to one of the biggest markets in the world and much … The post Brexit – How do you prepare for the unknown?

article thumbnail

Sprawling Mobile Espionage Campaign Targets Android Devices

Threatpost

A massive mobile espionage campaign has been collecting troves of sensitive personal information since 2012, according to a new report from the Electronic Frontier Foundation and security firm Lookout.

article thumbnail

Infonomics by Douglas B. Laney – Book Review

Information Matters

Title: Infonomics. Author: Douglas B. Laney. Genre: Business intelligence. Release Date: August 31, 2017. Pages: 322. Summary: An excellent guide for anyone wanting to better understand how to monetize information assets. Laney defines Infonomics as, “the theory, study and discipline of asserting economic significance to information.” (page 9). In this sense, his book provides a practical set of questions for business professionals to ask when trying to work out if there is hidden “gold” in thei

article thumbnail

Epson Wins Two Awards in the Seventh Annual 2017 Best in Biz North America Awards

Info Source

LONG BEACH, Calif. – Jan 16, 2018 – Epson, a leading provider of innovative business solutions, today announced it received two awards in the seventh annual Best in Biz North America Awards , the only independent business awards program judged each year by prominent editors and reporters from top-tier publications in North America. The Epson WorkForce ® Enterprise WF-C20590 A3 multifunction printer (MFP) was awarded silver in the “Best New Product of the Year – SMB” category.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Moving Office? Top Records Management Tips Revealed

Archive Document Data Storage

Are you planning an office relocation in 2018? Throughout the moving process, businesses risk leaving behind or mislaying sensitive data, which can result in privacy breaches and devastating fines. In this blog, we outline the steps businesses should take to protect their paper documents and IT/media throughout the moving process. Carry Out An Information Audit.

article thumbnail

Hyland Expands its International Leadership Team

Info Source

CLEVELAND – January 16, 2018 – Hyland , a leader in providing software solutions for managing content, processes and cases, has appointed two new executives to lead its international business and sales efforts within Latin America and EMEA & APAC. Edgar Novoa has been promoted to Associate Vice President, Latin America at Hyland. For the past eight years, Edgar successfully led Hyland’s Latin American sales group, expanding Hyland’s recognition as an established, in-region vendor and helped

article thumbnail

Man Admits to Directing DDoS Attacks Across the US

Dark Reading

New Mexico man pleads guilty to directing cyberattacks against his prior employers, business competitors, and law enforcement agencies.

46
article thumbnail

Kofax Kicks Off Year of the Robot with $1.8M Kapow Software License Sale

Info Source

. . Irvine, CA, January 18, 2018 – Kofax ® , a leading provider of software to simplify and transform the First Mile™ of business, today announced that a long term Kofax reseller has placed an order for $1.8M of Kofax Kapow™ to meet rapidly growing demand for robotic process automation (RPA) solutions from its end user customers, reinforcing Kofax’s declaration of 2018 as the Year of the Robot.

Sales 40
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

BEC Attacks to Exceed $9B in 2018: Trend Micro

Dark Reading

Business email compromise is projected to skyrocket as attackers adopt sophisticated techniques to dupe their victims.

49
article thumbnail

World economic leaders fear increase in cyberattacks, ransomware

Information Management Resources

Cyber crime and terrorism has jumped to the top of the global elite’s list of concerns, the World Economic Forum said ahead of its annual meeting in Davos, Switzerland.

article thumbnail

Schneider Electric: TRITON/TRISIS Attack Used 0-Day Flaw in its Safety Controller System, and a RAT

Dark Reading

ICS/SCADA vendor discloses in-depth analysis of a recent targeted attack against one of its customers.

IT 53
article thumbnail

Understanding eDiscovery in Criminal Cases, Part Three: eDiscovery Best Practices

eDiscovery Daily

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. He has also been a great addition to our webinar program, participating with me on several recent webinars, including our webinar last Thursday ( Important eDiscovery Case Law Decisions of 2017 and Their Impact on 2018 ), which was great.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Tax Reform, Cybersecurity-Style

Dark Reading

How the security industry can be more effective and efficient by recognizing four hidden "taxes" in the buying and selling process.

article thumbnail

The Measure of a Screen: Motion Picture Aspect Ratios in the Archives

Unwritten Record

Take a look at the two movie screens in the photos below. Notice anything different? The screen in the color image , photographed in 1998, is much wider than that in the 1946 black-and-white image. Each screen has a different aspect ratio. Merriam-Webster defines motion picture aspect ratio as “the ratio of the width of a television or motion-picture image to its height.

article thumbnail

Intel Says Firmware Fixes for Spectre and Meltdown Affecting Newer Chips

Threatpost

Intel says its firmware updates for Meltdown and Spectre are causing additional reboots and hits to performance.

IT 48