How APIs can help prevent data warehouse hell
Information Management Resources
APRIL 25, 2018
One problem that frequently arises is when companies have a lot of data stored in remote databases - isolated data silos that offer only limited access.
Information Management Resources
APRIL 25, 2018
One problem that frequently arises is when companies have a lot of data stored in remote databases - isolated data silos that offer only limited access.
AIIM
APRIL 25, 2018
This is the third article in a series; the other two are: Surviving Disruption -- Strategies for the Era of AI and Machine Learning. Looking at Information Management Through a Different Lens. Digital Transformation effectiveness is imperiled by a rising tide of information chaos and confusion. AIIM believes that information is the currency that fuels an organization.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Thales Cloud Protection & Licensing
APRIL 25, 2018
Jim DeLorenzo, Solutions Marketing Manager, Thales eSecurity. By now, few businesses can be unaware that there is just one month to go until the EU General Data Protection Regulation, better known as the GDPR, comes into force. Perhaps the most comprehensive data privacy standard ever introduced, the GDPR will impact every individual and business that is either a ‘controller’ or ‘processor’ of EU citizens’ personal data.
Data Breach Today
APRIL 25, 2018
North Korea Suspected of Running 'GhostSecret' Attacks Against Banks, Others The Thai government has seized servers used to run the so-called GhostSecret cyber espionage campaign that targets organizations in the finance, healthcare and critical infrastructure sectors - and beyond. McAfee suspects the attacks are being launched by "Hidden Cobra" - a hacking group tied to North Korea.
Advertisement
Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.
The Guardian Data Protection
APRIL 25, 2018
Facebook-owned messaging service will demand users confirm they are old enough to use app after raising age limit from 13 WhatsApp is raising the minimum user age from 13 to 16, potentially locking out large numbers of teenagers as the messaging app looks to comply with the EU’s new data protection rules. The Facebook-owned messaging service that has more than 1.5 billion users will ask people in the 28 EU states to confirm they are 16 or older as part of a prompt to accept a new terms of servic
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
WIRED Threat Level
APRIL 25, 2018
Ray Ozzie thinks his Clear method for unlocking encrypted devices can attain the impossible: It satisfies both law enforcement and privacy purists.
Data Breach Today
APRIL 25, 2018
Regulator Accuses Yahoo - Now 'Altaba' - Of Taking Too Long To Notify Investors Yahoo, now known as Altaba, has agreed to a $35 million civil fine with the U.S. Securities and Exchange Commission to settle accusations that the search giant failed to promptly notify investors about a December 2014 data breach.
WIRED Threat Level
APRIL 25, 2018
Researchers didn't have to hack Amazon's Alexa voice assistant to use it for eavesdropping. They just took advantage of the system in place.
Data Breach Today
APRIL 25, 2018
CMS Proposes Major Overhaul of EHR Incentive Program, Emphasizing Interoperability Federal regulators are proposing an overhaul to the "meaningful use" electronic health record incentive program. But current program requirements for conducting a security risk analysis would stick.
Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage
Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.
WIRED Threat Level
APRIL 25, 2018
Researchers found—and helped fix—a flaw in Vingcard RFID locks that would let hackers break into any room in hotels around the world.
Data Breach Today
APRIL 25, 2018
Essential Internet Infrastructure - DNS, BGP - Remains Vulnerable, Experts Warn An attack spoofed internet routing information, resulting in anyone who visited MyEtherWallet.com - a free, open source web app for storing and sending ether-based tokens - instead being routed to an attacker-controlled site, leading to an estimated $320,000 in losses.
IBM Big Data Hub
APRIL 25, 2018
Most sales-driven organizations have needed a customer retention model at some point or another. The request is fairly straightforward: identify the customers that a business might lose. But the process can create a nightmare.
The Guardian Data Protection
APRIL 25, 2018
Researchers sign open letter saying privacy restrictions ‘likely to compound the real problem’ • Sign up to receive the top stories in Australia every day at noon A group of the world’s leading internet academics say Facebook’s decision to tighten access to user data in reaction to the Cambridge Analytica scandal will actually hamper genuine research and oversight of the platform.
Advertisement
Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.
The Texas Record
APRIL 25, 2018
Emoji Records Retention Schedule. At some point in the introduction to records management training courses for both local governments and state agencies we discuss what the different retention codes on the retention schedules mean. Normally it looks and goes something like this: Local Government Retention Codes. State Agency Retention Codes. We say it’s time for a little update.
Data Matters
APRIL 25, 2018
*This Article Recently appeared in the IAPP’s The Privacy Advisor on April 24th, 2018. The IAPP’s Privacy Advisor recently published the below article on the ABA’s Privacy Law Specialist designation, describing how to apply and receive the designation, and highlighting how Sidley Austin is the first law firm to embrace the accreditation broadly. Read the full article written by the IAPP’s Molly Hulefeld here.
IT Governance
APRIL 25, 2018
There are many reasons to adopt ISO 27001 , the international standard that describes best practice for an information security management system (ISMS). It helps organisations improve their security, comply with cyber security regulations, and protect and enhance their reputation. But implementing the Standard takes a lot of time and effort. That should be obvious, at least if you believe the phrase ‘nothing worth having comes easy’.
Threatpost
APRIL 25, 2018
Researchers discovered a flaw in Amazon’s Alexa virtual assistant that enabled them to eavesdrop on consumers with smart devices – and automatically transcribe every word said.
Advertisement
Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.
The Guardian Data Protection
APRIL 25, 2018
Canadian marketing chiefs deny refusing to cooperate fully with information commissioner about data usage during Brexit vote The information commissioner is considering taking legal action against a Canadian marketing firm with alleged links to Cambridge Analytica, after the firm refused to cooperate with her inquiry into the use of personal data during the Brexit referendum.
Schneier on Security
APRIL 25, 2018
The ISO has rejected two symmetric encryption algorithms: SIMON and SPECK. These algorithms were both designed by the NSA and made public in 2013. They are optimized for small and low-cost processors like IoT devices. The risk of using NSA-designed ciphers, of course, is that they include NSA-designed backdoors. Personally, I doubt that they're backdoored.
OpenText Information Management
APRIL 25, 2018
On April 17, SC Magazine named OpenText™ EnCase™ Endpoint Investigator and OpenText EnCase Forensic as the Best Computer Forensic Solutions for the eighth consecutive year. Congratulations to everyone on our EnCase team for this exceptional accomplishment, and thank you to SC Media for recognizing OpenText and EnCase as a leader in digital forensic investigations.
Threatpost
APRIL 25, 2018
Webstresser[.]org, a DDoS-for-hire market believed to be behind at least 4 million cyberattacks around the world, has served up its last internet-paralyzing traffic tsunami.
Advertisement
“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.
Dark Reading
APRIL 25, 2018
To fight information integrity attacks like the ones recently perpetrated by bots on the FCC's website, we need to change our stance and look for the adversaries hiding in plain sight.
Threatpost
APRIL 25, 2018
Default configuration of WD’s My Cloud storage device keeps port open for unprivileged data exfiltration within a network.
Dark Reading
APRIL 25, 2018
Unrealistic entry-level job requirements, black-hoodie hacker image problems are among the 'uncomfortable conversations' needed to remedy cybersecurity's diversity gap.
Information Management Resources
APRIL 25, 2018
The goal is to have all relevant content and data from across the enterprise intelligently and securely processed into information that is contextual to the task at hand and aligned with the user’s goals.
Advertisement
If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.
Dark Reading
APRIL 25, 2018
Shadow IT is rampant at many organizations that rely upon cloud-delivered tools and services to enable remote work, according to a new study. Here's what security teams need to do about it.
CGI
APRIL 25, 2018
Time for a new definition of the "composite" insurer? p.butler@cgi.com. Wed, 04/25/2018 - 09:26. Composite insurer table. Much has been written about the need for insurers to embrace the opportunities that the wave of technology innovation has made possible over the past few years and to address the accompanying globalisation of ideas and propositions that make local markets increasingly less distinctive.
Dark Reading
APRIL 25, 2018
A recent survey reveals a troubling degree of security inertia lurking among scores of organizations. But there are a few bright spots.
Let's personalize your content