Wed.Apr 25, 2018

article thumbnail

How APIs can help prevent data warehouse hell

Information Management Resources

One problem that frequently arises is when companies have a lot of data stored in remote databases - isolated data silos that offer only limited access.

Access 51
article thumbnail

Digital Transformation Threatened by a Rising Tide of Information Chaos

AIIM

This is the third article in a series; the other two are: Surviving Disruption -- Strategies for the Era of AI and Machine Learning. Looking at Information Management Through a Different Lens. Digital Transformation effectiveness is imperiled by a rising tide of information chaos and confusion. AIIM believes that information is the currency that fuels an organization.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GDPR: it’s the final countdown

Thales Cloud Protection & Licensing

Jim DeLorenzo, Solutions Marketing Manager, Thales eSecurity. By now, few businesses can be unaware that there is just one month to go until the EU General Data Protection Regulation, better known as the GDPR, comes into force. Perhaps the most comprehensive data privacy standard ever introduced, the GDPR will impact every individual and business that is either a ‘controller’ or ‘processor’ of EU citizens’ personal data.

GDPR 63
article thumbnail

Thailand Seizes 'Hidden Cobra' Command-and-Control Servers

Data Breach Today

North Korea Suspected of Running 'GhostSecret' Attacks Against Banks, Others The Thai government has seized servers used to run the so-called GhostSecret cyber espionage campaign that targets organizations in the finance, healthcare and critical infrastructure sectors - and beyond. McAfee suspects the attacks are being launched by "Hidden Cobra" - a hacking group tied to North Korea.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

WhatsApp raises minimum age to 16 for Europeans ahead of GDPR

The Guardian Data Protection

Facebook-owned messaging service will demand users confirm they are old enough to use app after raising age limit from 13 WhatsApp is raising the minimum user age from 13 to 16, potentially locking out large numbers of teenagers as the messaging app looks to comply with the EU’s new data protection rules. The Facebook-owned messaging service that has more than 1.5 billion users will ask people in the 28 EU states to confirm they are 16 or older as part of a prompt to accept a new terms of servic

GDPR 104

More Trending

article thumbnail

Can This System of Unlocking Phones Crack the Crypto War?

WIRED Threat Level

Ray Ozzie thinks his Clear method for unlocking encrypted devices can attain the impossible: It satisfies both law enforcement and privacy purists.

article thumbnail

SEC Fines Yahoo $35 Million Over 2014 Breach

Data Breach Today

Regulator Accuses Yahoo - Now 'Altaba' - Of Taking Too Long To Notify Investors Yahoo, now known as Altaba, has agreed to a $35 million civil fine with the U.S. Securities and Exchange Commission to settle accusations that the search giant failed to promptly notify investors about a December 2014 data breach.

article thumbnail

Turning an Amazon Echo Into a Spy Device Only Took Some Clever Coding

WIRED Threat Level

Researchers didn't have to hack Amazon's Alexa voice assistant to use it for eavesdropping. They just took advantage of the system in place.

IT 106
article thumbnail

Risk Analysis Requirement Survives 'Meaningful Use' Revamp

Data Breach Today

CMS Proposes Major Overhaul of EHR Incentive Program, Emphasizing Interoperability Federal regulators are proposing an overhaul to the "meaningful use" electronic health record incentive program. But current program requirements for conducting a security risk analysis would stick.

Risk 100
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

A One-Minute Attack Let Hackers Spoof Hotel Master Keys

WIRED Threat Level

Researchers found—and helped fix—a flaw in Vingcard RFID locks that would let hackers break into any room in hotels around the world.

Security 106
article thumbnail

Cryptocurrency Heist: BGP Leak Masks Ether Theft

Data Breach Today

Essential Internet Infrastructure - DNS, BGP - Remains Vulnerable, Experts Warn An attack spoofed internet routing information, resulting in anyone who visited MyEtherWallet.com - a free, open source web app for storing and sending ether-based tokens - instead being routed to an attacker-controlled site, leading to an estimated $320,000 in losses.

100
100
article thumbnail

Machine learning can't save your bad data

IBM Big Data Hub

Most sales-driven organizations have needed a customer retention model at some point or another. The request is fairly straightforward: identify the customers that a business might lose. But the process can create a nightmare.

Sales 76
article thumbnail

Facebook's data changes will hamper research and oversight, academics warn

The Guardian Data Protection

Researchers sign open letter saying privacy restrictions ‘likely to compound the real problem’ • Sign up to receive the top stories in Australia every day at noon A group of the world’s leading internet academics say Facebook’s decision to tighten access to user data in reaction to the Cambridge Analytica scandal will actually hamper genuine research and oversight of the platform.

Privacy 75
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

RIM Month Fun: Emoji Records Management

The Texas Record

Emoji Records Retention Schedule. At some point in the introduction to records management training courses for both local governments and state agencies we discuss what the different retention codes on the retention schedules mean. Normally it looks and goes something like this: Local Government Retention Codes. State Agency Retention Codes. We say it’s time for a little update.

article thumbnail

Sidley Austin Embraces ABA Privacy Law Specialist Accreditation Opportunity; You Can, Too

Data Matters

*This Article Recently appeared in the IAPP’s The Privacy Advisor on April 24th, 2018. The IAPP’s Privacy Advisor recently published the below article on the ABA’s Privacy Law Specialist designation, describing how to apply and receive the designation, and highlighting how Sidley Austin is the first law firm to embrace the accreditation broadly. Read the full article written by the IAPP’s Molly Hulefeld here.

Privacy 60
article thumbnail

9 steps to implementing ISO 27001

IT Governance

There are many reasons to adopt ISO 27001 , the international standard that describes best practice for an information security management system (ISMS). It helps organisations improve their security, comply with cyber security regulations, and protect and enhance their reputation. But implementing the Standard takes a lot of time and effort. That should be obvious, at least if you believe the phrase ‘nothing worth having comes easy’.

Risk 68
article thumbnail

Researchers Hacked Amazon’s Alexa to Spy On Users, Again

Threatpost

Researchers discovered a flaw in Amazon’s Alexa virtual assistant that enabled them to eavesdrop on consumers with smart devices – and automatically transcribe every word said.

IoT 66
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

AIQ firm could face legal action over personal data inquiry

The Guardian Data Protection

Canadian marketing chiefs deny refusing to cooperate fully with information commissioner about data usage during Brexit vote The information commissioner is considering taking legal action against a Canadian marketing firm with alleged links to Cambridge Analytica, after the firm refused to cooperate with her inquiry into the use of personal data during the Brexit referendum.

article thumbnail

Two NSA Algorithms Rejected by the ISO

Schneier on Security

The ISO has rejected two symmetric encryption algorithms: SIMON and SPECK. These algorithms were both designed by the NSA and made public in 2013. They are optimized for small and low-cost processors like IoT devices. The risk of using NSA-designed ciphers, of course, is that they include NSA-designed backdoors. Personally, I doubt that they're backdoored.

IoT 64
article thumbnail

OpenText EnCase wins top forensic award

OpenText Information Management

On April 17, SC Magazine named OpenText™ EnCase™ Endpoint Investigator and OpenText EnCase Forensic as the Best Computer Forensic Solutions for the eighth consecutive year. Congratulations to everyone on our EnCase team for this exceptional accomplishment, and thank you to SC Media for recognizing OpenText and EnCase as a leader in digital forensic investigations.

53
article thumbnail

Europol Smacks Down World’s Largest DDoS-for-Hire Market

Threatpost

Webstresser[.]org, a DDoS-for-hire market believed to be behind at least 4 million cyberattacks around the world, has served up its last internet-paralyzing traffic tsunami.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why Information Integrity Attacks Pose New Security Challenges

Dark Reading

To fight information integrity attacks like the ones recently perpetrated by bots on the FCC's website, we need to change our stance and look for the adversaries hiding in plain sight.

article thumbnail

Western Digital My Cloud EX2 NAS Device Leaks Files

Threatpost

Default configuration of WD’s My Cloud storage device keeps port open for unprivileged data exfiltration within a network.

Cloud 54
article thumbnail

Diversity: It's About Inclusion

Dark Reading

Unrealistic entry-level job requirements, black-hoodie hacker image problems are among the 'uncomfortable conversations' needed to remedy cybersecurity's diversity gap.

IT 46
article thumbnail

How organizations can evolve from data-driven to information-driven

Information Management Resources

The goal is to have all relevant content and data from across the enterprise intelligently and securely processed into information that is contextual to the task at hand and aligned with the user’s goals.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cloud Misconceptions Are Pervasive Across Enterprises

Dark Reading

Shadow IT is rampant at many organizations that rely upon cloud-delivered tools and services to enable remote work, according to a new study. Here's what security teams need to do about it.

Cloud 43
article thumbnail

Time for a new definition of the "composite" insurer?

CGI

Time for a new definition of the "composite" insurer? p.butler@cgi.com. Wed, 04/25/2018 - 09:26. Composite insurer table. Much has been written about the need for insurers to embrace the opportunities that the wave of technology innovation has made possible over the past few years and to address the accompanying globalisation of ideas and propositions that make local markets increasingly less distinctive.

article thumbnail

Despite Risks, Nearly Half of IT Execs Don't Rethink Cybersecurity after an Attack

Dark Reading

A recent survey reveals a troubling degree of security inertia lurking among scores of organizations. But there are a few bright spots.

Risk 52