10 emerging roles for HIM pros in a digital era
Information Management Resources
JUNE 26, 2018
The ACA, EHRs and data security have raised the visibility of health information management.
Information Management Resources
JUNE 26, 2018
The ACA, EHRs and data security have raised the visibility of health information management.
eSecurity Planet
JUNE 26, 2018
Stopping a DDoS attack quickly is critical for the survival of your business. Here are six ways you can stop a DDoS attack.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Information Management Resources
JUNE 26, 2018
Healthcare organizations stand alone because insiders pose the biggest risk for breaches, and paper-based records remain as a rarely recognized weakness.
Krebs on Security
JUNE 26, 2018
Previous stories here on the proliferation of card-skimming devices hidden inside fuel pumps have offered a multitude of security tips for readers looking to minimize their chances of becoming the next victim, such as favoring filling stations that use security cameras and tamper-evident tape on their pumps. But according to police in San Antonio, Texas, there are far more reliable ways to avoid getting skimmed at a fuel station.
Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage
Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.
Data Breach Today
JUNE 26, 2018
Expanded Audience For Breach Notification Tool Should Improve Web Security Helping victims know their passwords have been exposed in a data breach is half the battle in the fight to improve password security. To help, Mozilla and 1Password are integrating into their products a feature from the popular "Have I Been Pwned" breach notification service.
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Data Breach Today
JUNE 26, 2018
Campaigners Seek Court Sanctions to End Blanket Communications Data Retention Privacy rights groups are calling on the Court of Justice of the European Union to clamp down on at least 17 EU governments that require domestic telecommunications firms to store all communications data, despite the court having ruled that such mass surveillance practices are illegal.
WIRED Threat Level
JUNE 26, 2018
Trump’s call for a “Space Force” escalates a quiet, dangerous contest between the US, China, and Russia—one whose consequences no one really understands.
Data Breach Today
JUNE 26, 2018
A lack of standards spelling out to manufacturers their responsibilities for addressing the cybersecurity of their medical devices - especially legacy products - has left a big burden on the healthcare entities that use these devices, says Cletis Earle, CIO at Kaleida Health.
OpenText Information Management
JUNE 26, 2018
If you don’t already know her, it’s time you met Saadia Muzaffar. Saadia is an incredible tech entrepreneur, author, and passionate advocate of responsible innovation. In addition, Saadia is driving forward the agenda of decent work for everyone, prosperity of immigrant talent in STEM careers, and diversity and inclusion in the Canadian technology industry.
Advertisement
Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.
Data Breach Today
JUNE 26, 2018
Consumers are more concerned than ever about their identities being compromised, yet they're failing to connect the dots between fear and preventive measures, according to recent research conducted by IDology. John Dancu, the company's CEO, explains the implications for businesses.
The Guardian Data Protection
JUNE 26, 2018
Watchdogs reveal more data protection complaints and increase in breach notifications The first month of GDPR has seen a sharp increase in the number of complaints to regulators across Europe, showing strong public interest in the new rules. The UK’s Information Commissioner’s Office (ICO) told the Guardian it has seen a rise in breach notifications from organisations, as well as more data protection complaints following the activation of the law.
Data Breach Today
JUNE 26, 2018
Behavioral analytics have taken the fast lane from emerging tech to mature practice. And Mark McGovern of CA Technologies says the technology is being deployed in innovative ways to help detect insider threats.
IBM Big Data Hub
JUNE 26, 2018
In this Q&A, IBM financial services solution architect Irina Saburova discusses an insurance use case with IBM Data Science Marketing Lead Rosie Pongracz. In this scenario common to the insurance industry, an organization needs to adjust its operations based on upcoming weather event and multiple weather indicators can improve forecast accuracy.
Advertisement
Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.
Dark Reading
JUNE 26, 2018
Serverless workloads in the cloud can be as secure as traditional applications with the right processes and tools. The key: start small, scale as your application scales, and involve everyone.
IT Governance
JUNE 26, 2018
With the Cyber Resilience Strategy for the Scottish public sector well and truly underway, organisations within scope need to take a different approach to the way they treat cyber threats. The Public Sector Action Plan , published by the Scottish Government in November 2017, outlines a “ baseline of good cyber resilience practice ” that all public sector organisations must comply with by the October 2018 deadline.
Dark Reading
JUNE 26, 2018
Users can search breach data in a new tool called Firefox Monitor and check if passwords have been exposed in 1Password on the Web.
The Guardian Data Protection
JUNE 26, 2018
Police are tapping the surveillance power of everyday devices like cellphones. But the US supreme court has pushed back Every time we interact with computers, smart devices or electronics, we leave detailed trails of our daily experiences. Law enforcement agencies are beginning to grasp the wealth of information new technologies provide, and courts have already made use of data from Fitbits and pacemakers.
Advertisement
“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.
IT Governance
JUNE 26, 2018
We recently discussed the steps you should take when handling cyber threats , but now we turn our attention to things you definitely shouldn’t do. Based on recent history, it’s a lesson organisations desperately need. It’s hard to imagine things getting any more embarrassing after disclosing a data breach, but news stories of bungles, cover-ups, denials and dismissals prove that things really can go from bad to worse.
Dark Reading
JUNE 26, 2018
Chenxi Wang, former Forrester VP of research and Twistlock executive, heads up Rain Capital, with the intent to also help build new startups.
Daymark
JUNE 26, 2018
I recently returned from this year’s Cisco Live ! in Orlando. It was a busy week jam packed with great speakers, engaging sessions, demos and product announcements. There was so much going on at any given moment it was hard to get to every session of interest. Now that I’m back I’ve had some time to digest all I learned and thought I would share my key product takeaways for network security.
eSecurity Planet
JUNE 26, 2018
A DDoS attack can be costly for your business, so it's best not to give the bad guys a chance. Here are 6 ways you can prevent DDoS attacks.
Advertisement
If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.
Dark Reading
JUNE 26, 2018
The 2018 Black Hat Attendee survey reveals worries over the effectiveness of enterprise security technology, and threat to US infrastructure.
Schneier on Security
JUNE 26, 2018
Last week, a story was going around explaining how to brute-force an iOS password. Basically, the trick was to plug the phone into an external keyboard and trying every PIN at once: We reported Friday on Hickey's findings, which claimed to be able to send all combinations of a user's possible passcode in one go, by enumerating each code from 0000 to 9999, and concatenating the results in one string with no spaces.
Dark Reading
JUNE 26, 2018
The casual sharing of sensitive data, such as passwords, is opening the door to malicious insiders.
Robert's Db2
JUNE 26, 2018
In an entry posted to this blog about three years ago, I advocated for putting some thought into the PBG versus PBR decision (partition-by-growth versus partition-by-range) for larger tables (for smaller tables, PBG is often the sensible choice, especially when the associated table space is likely to have only one partition). I pointed out in the aforementioned blog entry several advantages pertaining to PBR table spaces in a large-table context, but acknowledged as well the attractiveness of PB
Advertisement
Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.
Thales Cloud Protection & Licensing
JUNE 26, 2018
#1 Over half of companies are still not ready for GDPR. To be honest, this number might even be higher. Anecdotal evidence from technology industry analysts and surveys of business leaders support this estimate too. I wouldn’t be surprised if a fair percentage of those who believe that they comply are actually not there yet, but are somewhere on the road to becoming compliant.
Dark Reading
JUNE 26, 2018
Wednesday, June 27, this all-day event will help you decide who and what you really need to defend against, and how to do it more effectively.
Role Model Software
JUNE 26, 2018
True Mentors pass the light to the next generation. Mentoring is a way of life at RoleModel. We try hard to find team members who truly desire to mentor others. Unfortunately, many people in the Software Industry don’t have a vision for mentoring. They are more interested in advancing their own careers than pouring themselves into others. When I find a person who is an exception to that rule, I take special note of them.
Let's personalize your content