Tue.Jun 26, 2018

article thumbnail

10 emerging roles for HIM pros in a digital era

Information Management Resources

The ACA, EHRs and data security have raised the visibility of health information management.

article thumbnail

How to Stop DDoS Attacks: 6 Tips for Fighting DDoS Attacks

eSecurity Planet

Stopping a DDoS attack quickly is critical for the survival of your business. Here are six ways you can stop a DDoS attack.

108
108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to identify key security gaps in data protection strategies

Information Management Resources

Healthcare organizations stand alone because insiders pose the biggest risk for breaches, and paper-based records remain as a rarely recognized weakness.

Paper 37
article thumbnail

How to Avoid Card Skimmers at the Pump

Krebs on Security

Previous stories here on the proliferation of card-skimming devices hidden inside fuel pumps have offered a multitude of security tips for readers looking to minimize their chances of becoming the next victim, such as favoring filling stations that use security cameras and tamper-evident tape on their pumps. But according to police in San Antonio, Texas, there are far more reliable ways to avoid getting skimmed at a fuel station.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Mozilla and 1Password Integrate 'Have I Been Pwned' Feature

Data Breach Today

Expanded Audience For Breach Notification Tool Should Improve Web Security Helping victims know their passwords have been exposed in a data breach is half the battle in the fight to improve password security. To help, Mozilla and 1Password are integrating into their products a feature from the popular "Have I Been Pwned" breach notification service.

Passwords 140

More Trending

article thumbnail

EU Mass Surveillance Alive and Well, Privacy Groups Warn

Data Breach Today

Campaigners Seek Court Sanctions to End Blanket Communications Data Retention Privacy rights groups are calling on the Court of Justice of the European Union to clamp down on at least 17 EU governments that require domestic telecommunications firms to store all communications data, despite the court having ruled that such mass surveillance practices are illegal.

Privacy 138
article thumbnail

The New Satellite Arms Race Threatening to Explode in Space

WIRED Threat Level

Trump’s call for a “Space Force” escalates a quiet, dangerous contest between the US, China, and Russia—one whose consequences no one really understands.

Security 107
article thumbnail

A CIO on Carrying the Burden of Medical Device Cybersecurity

Data Breach Today

A lack of standards spelling out to manufacturers their responsibilities for addressing the cybersecurity of their medical devices - especially legacy products - has left a big burden on the healthcare entities that use these devices, says Cletis Earle, CIO at Kaleida Health.

article thumbnail

Q&A: Saadia Muzaffar talks responsible innovation, diversity, and the OpenText Women in Technology Summit

OpenText Information Management

If you don’t already know her, it’s time you met Saadia Muzaffar. Saadia is an incredible tech entrepreneur, author, and passionate advocate of responsible innovation. In addition, Saadia is driving forward the agenda of decent work for everyone, prosperity of immigrant talent in STEM careers, and diversity and inclusion in the Canadian technology industry.

89
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Identity Protection: Overcoming Hurdles

Data Breach Today

Consumers are more concerned than ever about their identities being compromised, yet they're failing to connect the dots between fear and preventive measures, according to recent research conducted by IDology. John Dancu, the company's CEO, explains the implications for businesses.

100
100
article thumbnail

European regulators report sharp rise in complaints after GDPR

The Guardian Data Protection

Watchdogs reveal more data protection complaints and increase in breach notifications The first month of GDPR has seen a sharp increase in the number of complaints to regulators across Europe, showing strong public interest in the new rules. The UK’s Information Commissioner’s Office (ICO) told the Guardian it has seen a rise in breach notifications from organisations, as well as more data protection complaints following the activation of the law.

GDPR 82
article thumbnail

Behavioral Analytics and the Insider Threat

Data Breach Today

Behavioral analytics have taken the fast lane from emerging tech to mature practice. And Mark McGovern of CA Technologies says the technology is being deployed in innovative ways to help detect insider threats.

Analytics 100
article thumbnail

How Data Science Experience improves accuracy for the insurance industry

IBM Big Data Hub

In this Q&A, IBM financial services solution architect Irina Saburova discusses an insurance use case with IBM Data Science Marketing Lead Rosie Pongracz. In this scenario common to the insurance industry, an organization needs to adjust its operations based on upcoming weather event and multiple weather indicators can improve forecast accuracy.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Securing Serverless Apps: 3 Critical Tasks in 3 Days

Dark Reading

Serverless workloads in the cloud can be as secure as traditional applications with the right processes and tools. The key: start small, scale as your application scales, and involve everyone.

article thumbnail

Cyber resilience for Scotland: Holyrood’s flagship public sector ICT event

IT Governance

With the Cyber Resilience Strategy for the Scottish public sector well and truly underway, organisations within scope need to take a different approach to the way they treat cyber threats. The Public Sector Action Plan , published by the Scottish Government in November 2017, outlines a “ baseline of good cyber resilience practice ” that all public sector organisations must comply with by the October 2018 deadline.

article thumbnail

'Have I Been Pwned' Now Built into Firefox, 1Password

Dark Reading

Users can search breach data in a new tool called Firefox Monitor and check if passwords have been exposed in 1Password on the Web.

article thumbnail

The battle between privacy and law enforcement isn't going away | Deanna Paul

The Guardian Data Protection

Police are tapping the surveillance power of everyday devices like cellphones. But the US supreme court has pushed back Every time we interact with computers, smart devices or electronics, we leave detailed trails of our daily experiences. Law enforcement agencies are beginning to grasp the wealth of information new technologies provide, and courts have already made use of data from Fitbits and pacemakers.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How not to respond to cyber threats

IT Governance

We recently discussed the steps you should take when handling cyber threats , but now we turn our attention to things you definitely shouldn’t do. Based on recent history, it’s a lesson organisations desperately need. It’s hard to imagine things getting any more embarrassing after disclosing a data breach, but news stories of bungles, cover-ups, denials and dismissals prove that things really can go from bad to worse.

article thumbnail

First Women-Led Cybersecurity Venture Capital Firm Launches

Dark Reading

Chenxi Wang, former Forrester VP of research and Twistlock executive, heads up Rain Capital, with the intent to also help build new startups.

article thumbnail

Takeaways from Cisco Live!™ 2018

Daymark

I recently returned from this year’s Cisco Live ! in Orlando. It was a busy week jam packed with great speakers, engaging sessions, demos and product announcements. There was so much going on at any given moment it was hard to get to every session of interest. Now that I’m back I’ve had some time to digest all I learned and thought I would share my key product takeaways for network security.

article thumbnail

How to Prevent DDoS Attacks: 6 Tips to Keep Your Website Safe

eSecurity Planet

A DDoS attack can be costly for your business, so it's best not to give the bad guys a chance. Here are 6 ways you can prevent DDoS attacks.

IT 66
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Black Hat Survey: Enterprise Tech, US Government Unprepared for Cyberattacks

Dark Reading

The 2018 Black Hat Attendee survey reveals worries over the effectiveness of enterprise security technology, and threat to US infrastructure.

article thumbnail

Bypassing Passcodes in iOS

Schneier on Security

Last week, a story was going around explaining how to brute-force an iOS password. Basically, the trick was to plug the phone into an external keyboard and trying every PIN at once: We reported Friday on Hickey's findings, which claimed to be able to send all combinations of a user's possible passcode in one go, by enumerating each code from 0000 to 9999, and concatenating the results in one string with no spaces.

article thumbnail

Insider Dangers Are Hiding in Collaboration Tools

Dark Reading

The casual sharing of sensitive data, such as passwords, is opening the door to malicious insiders.

article thumbnail

Db2 for z/OS PBG Table Spaces: The Ins and Outs of Partition Addition

Robert's Db2

In an entry posted to this blog about three years ago, I advocated for putting some thought into the PBG versus PBR decision (partition-by-growth versus partition-by-range) for larger tables (for smaller tables, PBG is often the sensible choice, especially when the associated table space is likely to have only one partition). I pointed out in the aforementioned blog entry several advantages pertaining to PBR table spaces in a large-table context, but acknowledged as well the attractiveness of PB

IT 48
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Five Predictions for GDPR

Thales Cloud Protection & Licensing

#1 Over half of companies are still not ready for GDPR. To be honest, this number might even be higher. Anecdotal evidence from technology industry analysts and surveys of business leaders support this estimate too. I wouldn’t be surprised if a fair percentage of those who believe that they comply are actually not there yet, but are somewhere on the road to becoming compliant.

GDPR 48
article thumbnail

Tomorrow: 'Why Cybercriminals Attack,' A Dark Reading Virtual Event

Dark Reading

Wednesday, June 27, this all-day event will help you decide who and what you really need to defend against, and how to do it more effectively.

IT 59
article thumbnail

A Tribute to Kevin Bridges

Role Model Software

True Mentors pass the light to the next generation. Mentoring is a way of life at RoleModel. We try hard to find team members who truly desire to mentor others. Unfortunately, many people in the Software Industry don’t have a vision for mentoring. They are more interested in advancing their own careers than pouring themselves into others. When I find a person who is an exception to that rule, I take special note of them.

IT 40