Fri.Dec 08, 2017

article thumbnail

Streamline and Automate: The Records Manager's Rally Cry

AIIM

Every business is in the business of the business. In other words, every organization - public sector or private, small or gigantic, and regardless of structure or geographic location, has a mission and organizational goals and objectives upon which it focuses. Similarly, every organization and every department, office, and function within an organization creates or captures records that document the business of the business.

article thumbnail

Tough code of practice for websites will aim to protect children online

The Guardian Data Protection

Facing potential Lords defeat, government announces it will back data protection bill amendment to safeguard children’s privacy Websites and apps will be subject to a tough new code of practice to protect children’s privacy online following a cross-party campaign in the House of Lords to prevent young people’s internet activity being monitored. Facing a potential defeat by peers, the government has announced it will back a new amendment to the data protection bill, derived from one authored by t

Privacy 78
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Much Does an Association Management System Really Cost?

IT Governance

If your organization is in the market for a new Association Management System (AMS), or if you’re comparing different membership software systems, the first question you’re asking is, “ How much does it cost? ”. There’s not a lot of information out there about this; I’m sure you’ve noticed that most vendors will want to set up a call with you before they give you any substantial information.

article thumbnail

Megabreaches Happen. Here's How to Protect Yourself When They Do

WIRED Threat Level

The next megabreach is coming. Here's how you can cope if and when your info gets swept up.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Improve your information security with risk assessment software

IT Governance

A risk assessment is one of the first tasks an organisation should complete when preparing its cyber security policy and programme. It’s the only way to make sure that the controls you choose are appropriate to the risks your organisation faces. Without a risk assessment, you could ignore threats or waste time, effort and resources defending against events that are unlikely to occur or won’t have a significant impact.

More Trending

article thumbnail

Top 10 tips to stay safe online

IT Governance

Cyberspace, the Internet, computer networks, the digital world – call it what you will – is always developing and so are the threats and risks of being online. The festive period is an ideal time for cyber criminals to strike. It will come as no surprise that Christmas is by far the busiest period for online shopping , with online sales accounting for £25 billion during Christmas 2016 (IMRG Capgemini e-Retail Sales Index, January 2017).

Sales 63
article thumbnail

What’s in store for next-generation BI platforms?

Information Management Resources

Major business intelligence providers are building tools designed to introduce more employees to data analytics, with a focus on three key areas: accessibility, collaboration and consumability.

article thumbnail

CIPL Submits Comments to Article 29 WP’s Proposed Guidelines on ADM and Profiling

Hunton Privacy

On December 1, 2017, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP submitted formal comments to the Article 29 Working Party (the “Working Party”) on its Guidelines on Automated Individual Decision-Making and Profiling (the “Guidelines”). The Guidelines were adopted by the Working Party on October 3, 2017, for public consultation.

GDPR 45
article thumbnail

Apple Fixes Flaw Impacting HomeKit Devices

Threatpost

Apple said it has fixed an undisclosed vulnerability in its HomeKit framework that could have allowed unauthorized remote control of HomeKit devices such as smart locks and connected garage door openers.

IT 43
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Article 29 Working Party Meeting Sets Out State of Play on Privacy Initiatives

Hunton Privacy

Recently, the EU’s Article 29 Working Party (”Working Party”) held a plenary meeting to discuss, among other things, the implementation of the EU General Data Protection Regulation (“GDPR”) and the EU-U.S. Privacy Shield. As well as adopting its first Joint Annual Review Report on the Privacy Shield, the Working Party has been working on a number of documents that offer review and/or guidance on the GDPR, including: guidelines on (1) consent and transparency, (2) data protection certifications,

Privacy 45
article thumbnail

Microsoft Issues Emergency Patch for 'Critical' Flaw in Windows Security

Dark Reading

Remote code execution vulnerability in Microsoft Malware Protection Engine was found by UK spy agency's National Cyber Security Centre (NCSC).

article thumbnail

4 Steps to a Possible Archiving of Classroom Management Records

The Schedule

In my previous blog postings, I have identified that discovery programs (maker space) that librarians and library media specialists create require busying the hands of young children when working in elementary schools that cover grades Pre-K to 6 th. The same could be said when dealing with fellow co-workers during online conferences conducted for office staff.

article thumbnail

WP29: (draft) GUIDANCE ON BCR’s and ANNUAL REVIEW OF PRIVACY SHIELD

DLA Piper Privacy Matters

This week, the Article 29 Working Party (“WP29”) published their joint annual review of Privacy Shield and their long awaited (draft) guidance on Binding Corporate Rules (“BCR’s”). Privacy Shield : The WP29 have identified a number of important unresolved issues and warn that if no remedy is brought within the next year, they will bring the Privacy Shield adequacy decision to the national courts for them to refer it to the ECJ for a preliminary ruling.

Privacy 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New Functional Schedule for North Carolina State Agencies

The Schedule

A years-long project at the State Archives of North Carolina has culminated with the publication of the first Functional Schedule for North Carolina State Agencies. Where state agencies have previously relied in a General Schedule for State Agency Records and hundreds of program-specific schedules, now all state agency officials have one 16-part retention and disposition schedule to guide them in the management of their public records.

article thumbnail

Data Breach Legislation: What’s Happening in Washington

Rippleshot

While most attention at the moment in Washington, D.C., is on the heavily debated tax bill, there’s another proposed bill that could have major implications for businesses hit by a data breach. A re-introduced bill, the Data Security and Breach Notification Act, proposes harsher sentences for company executives who fail to notify consumers of a breach.

article thumbnail

Gartner: IT Security Spending to Reach $96 Billion in 2018

Dark Reading

Identity access management and security services to drive worldwide spending growth.

article thumbnail

Android Flaw Poisons Signed Apps with Malicious Code

Threatpost

An Android vulnerability called Janus allows attackers to inject malicious code into signed Android apps.

Privacy 49
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

What Slugs in a Garden Can Teach Us About Security

Dark Reading

Design principles observed in nature serve as a valuable model to improve organizations' security approaches.

article thumbnail

Cryptocurrencies in the Crosshairs: NiceHash Breach Results in Theft of $83 Million

eSecurity Planet

The 4,736 Bitcoin stolen from NiceHash have surged in value over the past few days.

50
article thumbnail

More executive firings

InfoGovNuggets

“Security Shake-Up At Uber,” The Wall Street Journal , December 4, 2017 B4. Three members of Uber’s security team resigned. Voluntarily. And another is on extended medical leave. This after Uber recently disclosed a data breach a year ago that exposed 57 million user accounts. And after reports of a team established to access competitors’ technology.

article thumbnail

New Artists’ Books

Archives Blogs

Today I am highlighting some of our newest artists’ book additions to our collection. Earth Clock by Ginger R. Burrell. First up, we have two new acquisitions from book artist Ginger R. Burrell. Earth Clock by Ginger R. Burrell. Earth Clock , Burrell’s limited edition 2017 creation, is an investigation into the history of climate change. “Earth Clock is meant as both an educational tool and a call to action.

Paper 22
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Why listen to the court?

InfoGovNuggets

“Battle at CFPB Rages On,” The Wall Street Journal , December 4, 2017 B9. The person who lost in her attempt to seize control of the CFPB despite the appointment of Mick Mulvaney as the head of the agency asks the court to do “a more complete legal assessment of her claims.” I guess if you don’t like the first decision, you might as well ask again, right?

article thumbnail

Friday Squid Blogging: Squid Embryos Coming to Life

Schneier on Security

Beautiful video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.

article thumbnail

Cybersecurity

InfoGovNuggets

Cybersecurity involves protecting the enterprise from internal or external attack and responding after the enterprise has been attacked. How do you ensure your business continues to operate if its cybersecurity is breached? It’s not just sending notices to affected customers and paying for credit watches. “Banks Create Cyber Doomsday System,” The Wall Street Journal , December 4, 2017 B1.

article thumbnail

Pursuing Civic Literacy

Archives Blogs

As the nation’s record keeper, the National Archives is responsible for making the records of the U.S. Government available to the public. These records—some famous but others quite ordinary—tell the nation’s story, document the actions of government officials over the years, and confirm the rights guaranteed to individuals. They are records that deserve preservation not simply for reference purposes but for use by all interested Americans to participate in the civic process.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Wells Fargo, continued, again

InfoGovNuggets

“Wells Fargo Bankers, Chasing Bonuses, Overcharged Clients,” The Wall Street Journal , November 28, 2017 A1. Only 35 of 300 companies had been charged only what they had agreed to. Four foreign-exchange bankers fired. Who is surprised? The culture at the company was potentially fatally defective. Why hasn’t the Board been held liable?

article thumbnail

Was your ride late?

InfoGovNuggets

“Chicago Sues Uber For Lag in Reporting Data Hack,” The Wall Street Journal, November 28, 2017 B4. Following the disclosure of the year-old breach of 57 million accounts, Uber is sued for consumer fraud and deceptive business practices, among other things. There is the breach. And then your response to the breach. And then the regulators’ and the customers’ and the shareholders’ response to the breach.

article thumbnail

Cyberattacks

InfoGovNuggets

“Three From China Indicted in Cyberattacks,” The Wall Street Journal , November 28, 2017 B4. Allegedly hacked into the email account of an economist at Moody’s and gained access to gigabytes of confidential data of Siemens beginning in 2011. Who has access to your data? Is the email account of a third-party vendor a potential source of a major leak?

Access 28