Mon.Apr 30, 2018

article thumbnail

The GDPR and the right to be forgotten

IT Governance

Something that’s drawn a lot of attention in the lead up to the General Data Protection Regulation (GDPR) compliance deadline is “the right to erasure”, also known as the “right to be forgotten”. The new data subject right allows, in certain circumstances, individuals to request that all information held about them is permanently erased. Although your organisation will not always have to comply with an erasure request, you must if: The personal data is no longer necessary for the purpose you ori

GDPR 70
article thumbnail

3 Ways to Maximize Security and Minimize Business Challenges

Dark Reading

The best strategy for choosing security tools and architecting networks is to focus on staffing and resources, risk tolerance, and business change.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Records Center is not an Archives: Transfer Forms!

The Schedule

[Note: This was a forum post to the Records Management Section list on SAA’s site that got a little out of hand. Rather than clog everyone’s mailbox, I decided to post it here. The fact that I can add Futurama GIFs to posts here, and not on SAA Connect, had absolutely nothing to do with this decision (he said, unconvincingly.). For your reference, the original question:].

article thumbnail

Public information

InfoGovNuggets

Can you get in trouble for disclosing public information? If you’re a naturalized American citizen of Chinese heritage, maybe. “Worker Wins Ruling in Spy Case,” The Wall Street Journal , April 30, 2018 A4. Court orders government to reinstate and pay back pay to a hydrologist at the Commerce Department fired two years ago for providing publicly-available data to a a former classmate who just happened to be a water-resources official in China.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hackers Target 3 Mexican Banks' Real-Time Transfers

Data Breach Today

Mexico's Central Bank Says No Client Money Lost, But Activates Contingency Plans Mexico's central bank says attackers attempted to hack its interbank electronic transfer system, but says no client money was lost. It's activated "contingency measures" at the targeted banks and says payment transfers could slow as a result.

IT 174

More Trending

article thumbnail

Cybercrime Se Habla Español: Inside the Underground

Data Breach Today

Flashpoint's Liv Rowley Traces Spanish Language Hacker Forums in Latin America Hacking is a global phenomenon, says Liv Rowley, an intelligence analyst at Flashpoint who's been tracking the rise, fall and mysterious reappearance of Cebolla Chan 3.0, the Latin American region's top Spanish language hacking forum.

160
160
article thumbnail

How worried should we be about politically motivated cyber attacks?

IT Governance

Governments on both sides of the Atlantic are concerned about an increase in cyber attacks targeting critical infrastructure, such as power supplies, technology service providers, and road and rail networks. Such attacks might be carried out for financial gain, but attacks on critical infrastructure are more likely to be politically motivated. There have already been numerous examples of cyber attacks that were most likely state-sponsored and intended to embarrass targets or damage their economy

article thumbnail

Twitter Sold Data to Cambridge University Psychologist

Data Breach Today

Same Researcher, Aleksandr Kogan, Sold Facebook Data to Cambridge Analytica Twitter is now caught up in the Cambridge Analytica scandal: The social network sold public Twitter data to Aleksandr Kogan, the same person who sold Facebook data to Cambridge Analytica. Twitter says Kogan obtained no private information on users.

157
157
article thumbnail

Changes Coming to NARA RM Training Program

National Archives Records Express

One of the major topics covered during our last BRIDG meeting was the continual evolution of the Records Management Training Program. Dr. Gary Rauchfuss, the director of our training program, presented upcoming changes and answered questions. You can view his presentation below. Gary discussed both the curriculum updates and the long-term evolution of the training program and how we anticipate changing the way we deliver training.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Addressing the Lack of Diversity in Cybersecurity

Data Breach Today

Accenture Security's Tammy Moskites Discusses Efforts to Attract More Women to the Field Tammy Moskites, managing director at Accenture Security, outlines initiatives to attract more women into the field of cybersecurity.

article thumbnail

Twitter Sold Data To Cambridge Analytica-Linked Company

Threatpost

Twitter is the latest company to face backlash for how it handles data privacy after disclosing that it sold data access to a Cambridge Analytica-linked researcher.

article thumbnail

Building Data Protections Into IoT Devices

Data Breach Today

Makers of internet of things devices - especially those that handle health information - must implement protections into their product development lifecycle to effectively safeguard consumers' data, says regulatory attorney Elliot Golding.

IoT 113
article thumbnail

USB Sticks Can Trigger BSOD – Even on a Locked Device

Threatpost

Thanks to auto-play, it’s possible to crash Windows systems by simply inserting the drive into the USB port, no further user interaction necessary.

59
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Battling 'Cyber Fatigue'

Data Breach Today

Forcepoint's Richard Ford Discusses Dynamic Data Protection and Reducing Mistakes "Cyber fatigue," the result of being constantly under attack, leads to security mistakes, says Richard Ford of Forcepoint, who discusses what can be done to address the issue.

Security 100
article thumbnail

Db2 for z/OS Buffer Pools - Time to Give AUTOSIZE(YES) a Try?

Robert's Db2

Db2 9 for z/OS became generally available back in 2007. In the years since, most of the features introduced with Db2 9 have been broadly put to use. An interesting exception is the auto-sizing of buffer pools, implemented via the AUTOSIZE(YES) option of the -ALTER BUFFERPOOL command. Based on my experience, it seems that few Db2 for z/OS sites have gone with buffer pool auto-sizing.

IT 48
article thumbnail

Cryptomining: Threat and Opportunity?

Data Breach Today

Hacker House's Hickey and Arcuri Outline the Evolving Landscape Cryptomining is in its infancy, but it could evolve to be a valuable revenue stream for digital content. Hacker House's Matthew Hickey and Jennifer Arcuri outline its potential.

IT 100
article thumbnail

How VMware Organizes Its Security Products

eSecurity Planet

VIDEO: Tom Corn, Senior Vice President and GM of Security Products at VMware, details the core pillars of cybersecurity at his company.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

DNS Threat Mitigation

Data Breach Today

Andrew Wertkin of BlueCat Networks Outlines What Enterprises Need to Do Now DNS is not well understood as a signal and control point in cybersecurity, says Andrew Wertkin of BlueCat Networks, who discusses key steps to change this perception.

article thumbnail

The GDPR: Get a crucial cyber security qualification in one day

IT Governance

There are currently more than 3,000 job vacancies in the UK requiring ISO 27001 qualifications, with an average salary of £41,000 a year. ISO 27001 describes best practices for implementing an information security management system (ISMS), which is crucial knowledge for those looking to understand and comply with the EU General Data Protection Regulation (GDPR).

GDPR 49
article thumbnail

Real-World Application Security: Top 10 Threats

Data Breach Today

Intuit's Threat Hunting Lead, Shannon Lietz, on Building a Better Red Team As the head of DevSecOps at Intuit, Shannon Lietz tracks the real-world tactics, techniques and procedures hackers use against her organization. She's cataloged the top 10 application security attack techniques being used against Intuit, which differ markedly from the OWASP top 10.

Security 100
article thumbnail

NIST Updates Cybersecurity Framework to Tackle Supply Chain Threats, Vulnerability Disclosure and More

Threatpost

Version 1.1 includes updates on authentication and identity, self-assessment, supply-chain security and vulnerability disclosure, among other changes.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

GDPR: Understanding the Complexities

Data Breach Today

What are some of the complexities of the EU's General Data Protection Regulation, which will be enforced beginning May 25? Gerald Beuchelt, CISO at LogMeIn, offers compliance insights in an in-depth interview.

GDPR 100
article thumbnail

Steps for Reducing Paper Waste

Archive Document Data Storage

Every year, millions of tonnes of paper is wasted in the UK, and businesses are the biggest culprits. Even in the Digital Age, office documents are printed, copied and tossed in the rubbish. In addition to wasting resources, paper waste also negatively impacts your company’s productivity and bottom line. Follow these steps to reduce paper waste in your business. 1.

Paper 40
article thumbnail

KRACK Vulnerability Puts Medical Devices At Risk

Threatpost

A slew of products from medical dispensing company BD are susceptible to the KRACK vulnerability disclosed last fall.

Risk 51
article thumbnail

Old Worm, New Tricks: FacexWorm Targets Crypto Platforms

Dark Reading

Malicious Chrome extension FacexWorm has reappeared with new capabilities, targeting cryptocurrency platforms and lifting user data.

46
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Updated GravityRAT Malware Adds Advanced AV Detection

Threatpost

Researchers warn that the code behind this remote access trojan has been tweaked in an attempt to decrease antivirus detection.

Access 47
article thumbnail

What Meltdown and Spectre Mean for Mobile Device Security

Dark Reading

Here are four tips to keep your mobile users safe from similar attacks.

article thumbnail

Amerisure using advanced analytics to reinvent the insurance process

Information Management Resources

The firm has improved claims processing, premium production, fraud management and other crucial operations, and strengthened relationships with agencies and policyholders, says Doug Pontious.