Wed.May 30, 2018

article thumbnail

The power of rights management

OpenText Information Management

Deciphering rights can be a complex nightmare even for the most digitally savvy organization! Companies that have invested in a digital asset management (DAM) platform to gain the ability to categorize, securely share, and organize assets in a very efficient matter, often fail to enforce proper governance on the assets’ usage and fail to maximize … The post The power of rights management appeared first on OpenText Blogs.

article thumbnail

What is eDiscovery?

OpenText Information Management

Electronic discovery (or “eDiscovery”) is the process of identifying, preserving, collecting, analyzing, reviewing, and producing electronically stored information (ESI). Structured and unstructured data analysis is at the core of eDiscovery. Even routine matters regularly involve hundreds of gigabytes of data that much be analyzed for relevancy and privilege.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Common Document Destruction Mistakes to Avoid

Archive Document Data Storage

In the fight against identity theft and business fraud, you can’t afford to let your guard down, even for a second. One error can lead to huge legal and financial consequences. Here are several common document destruction mistakes to avoid: Mistake 1: Throwing documents in the trash or recycling. Every day, within organisations large and small, confidential documents are carelessly discarded in waste and recycling bins.

Paper 49
article thumbnail

Yet Another Twist in Messy Aetna Privacy Breach Case

Data Breach Today

Health Insurer Sues Organizations That Represented HIV Patients in Earlier Privacy Dispute A messy legal case involving a 2017 privacy breach that has already cost Aetna about $20 million in settlements has taken yet another twist. The health insurer has filed a lawsuit against two organizations that represented plaintiffs in an earlier privacy-related dispute, attempting to recoup some costs.

Privacy 145
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Seeing Through the Haze to Leverage the Power of the Cloud

AIIM

If we were to believe everything we hear in the press, then all computing and data storage is moving to the cloud — and quickly! The reality, though, is more nuanced. Firstly, there is no singular cloud; instead, there are hundreds of clouds to choose from. Secondly, not everything is moving to the cloud, and even the stuff that is, is moving slowly.

Cloud 91

More Trending

article thumbnail

Attacks against machine learning — an overview

Elie

This blog post survey the attacks techniques that target AI (artificial intelligence) systems and how to protect against them. At a high level, attacks against classifiers can be broken down into three types: Adversarial inputs. , which are specially crafted inputs that have been developed with the aim of being reliably misclassified in order to evade detection.

Mining 107
article thumbnail

Women in Security: Assessing the Progress

Data Breach Today

Cybersecurity challenges and solutions have evolved greatly since 2002. And so has the Executive Women's Forum, which was founded that year to advance female leaders in the profession. Founder Joyce Brocaglia reflects on the forum's accomplishments and challenges.

Security 113
article thumbnail

Attacks against machine learning — an overview

Elie

This blog post survey the attacks techniques that target AI (artificial intelligence) systems and how to protect against them. At a high level, attacks against classifiers can be broken down into three types: Adversarial inputs. , which are specially crafted inputs that have been developed with the aim of being reliably misclassified in order to evade detection.

Mining 91
article thumbnail

Canadian Hacker Jailed for 5 Years Following Yahoo Breach

Data Breach Today

Hacker-for-Hire Karim Baratov Fed Stolen Passwords to Alleged Russian Officer Canadian citizen Karim Baratov has been sentenced to serve five years in U.S. federal prison after he admitted to hacking and identity theft charges connected to his working as "hacker for hire" for alleged Russian FSB officers, who have been tied to a massive 2014 breach of Yahoo.

Passwords 111
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Learn how to solve four common challenges in electronic records management

TAB OnRecord

Most organizations now generate large volumes of electronic records, but this doesn't mean that paper records collections are shrinking. Add storage and technological restraints to the mix and you are faced with a complex RM challenge. To help you successfully manage your electronic records, we've put together these 4 tips. Read More. The post Learn how to solve four common challenges in electronic records management appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Machine Learning, Artificial Intelligence & the Future of Cybersecurity

Dark Reading

The ability to learn gives security-focused AI and ML apps unrivaled speed and accuracy over their more basic, automated predecessors. But they are not a silver bullet. Yet.

article thumbnail

Papua New Guinea Wants to Ban Facebook. It Shouldn't

WIRED Threat Level

The island nation is considering blocking Facebook for one month in order to collect information on fake profiles, pornography, and more. But the impact could be severe.

IT 82
article thumbnail

European Data Protection Board Releases Statement on the Revision of the ePrivacy Regulation

Data Matters

On 28 May 2018, the European Data Protection Board (the “ EDPB ”) released a statement on the revision of the ePrivacy Regulation (the “ proposed Regulation ”) and its impact on the protection of individuals in relation to the privacy and confidentiality of their communications. It is the first statement of substance by the EDPB since it was established by the EU General Data Protection Regulation on 25 May 2018.

GDPR 68
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The DHS Cybersecurity Strategy: Five Pillars of Cybersecurity Goals

Thales Cloud Protection & Licensing

The recent DHS Cybersecurity Strategy was released at a crucial time when today’s cyberspace has become a new frontier for warfare for both nation states and criminal hackers. And as we continue to move into an era of digital transformation and interconnectedness, there is increasing concern among organizations and average citizens around the security of sensitive data.

article thumbnail

3 ways IBM Cloud Private for Data can accelerate your AI and machine learning journey

IBM Big Data Hub

It seems like CEOs all over the world are realizing that to be competitive, they have to embrace technologies like private cloud and artificial intelligence (AI). IBM Cloud Private for Data empowers organizations to be AI-ready with an integrated analytics platform.

article thumbnail

How to implement an ISMS aligned with ISO 27001

IT Governance

With cyber attacks and data breaches on the rise, cyber security is fast becoming organisations’ top priority. Many have chosen to mitigate the risk by implementing an information security management system (ISMS). An ISMS is a system of processes, documents, technology and people that helps organisations manage, monitor and improve their information security in one place.

article thumbnail

Data Protection Officers: The Unsung Heroes of the GDPR

Hunton Privacy

On May 29, 2018, Bojana Bellamy published a letter on the importance and value of data protection officers (“DPOs”) on the International Association of Privacy Professionals’ Privacy Perspectives blog, entitled A Letter to the Unsung Hero of the GDPR (the “Letter”). The Letter acknowledges the herculean efforts and boundless commitment DPOs and those in a similar role have demonstrated in preparing their organizations for the GDPR.

GDPR 67
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Why Russian Journalist Arkady Babchenko Faked His Own Murder—And What Happens Now

WIRED Threat Level

Russian war correspondent Arkady Babchenko was reported dead Tuesday. On Wednesday, he showed up at a press conference, very much alive.

article thumbnail

Attacks against machine learning — an overview

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

The Bleak State of Federal Government Cybersecurity

WIRED Threat Level

Nearly three out of four federal agencies is unprepared for a cyberattack, and there's no system in place to fix it.

article thumbnail

Infographic: Are you cyber resilient?

IT Governance

An organisation’s cyber resilience is a critical survival trait as cyber criminals adapt to the rapidly changing world faster than solutions can be developed to defend against them. Targeted attacks by skilled, persistent cyber criminals are now a worrying business reality. In 2017, 68% of large businesses in the UK said they had identified at least one cyber security breach or attack that year, and the average business identified 998 breaches.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Google Patches 34 Browser Bugs in Chrome 67, Adds Spectre Fixes

Threatpost

Google has rolled out its newest browser version (Chrome 67.0.3396.62) for Windows, Mac and Linux this week with new security fixes and biometric features.

article thumbnail

A guide to the GDPR for insurance companies

IT Governance

The EU General Data Protection Regulation (GDPR) is designed to harmonise data protection laws across the EU, but certain industries will have to respond differently in order to achieve compliance. A report published by research and consultancy company Celent highlights the challenges that the GDPR presents to insurers. All organisations that offer good and services to, or monitor the behaviour of EU residents are subject to the GDPR.

article thumbnail

Getting Revolutionary (Not Evolutionary) about Cybersecurity

Dark Reading

Being a security revolutionary isn't purely about new, ground-breaking ideas. It's about anticipating, outpacing, and influencing your world, both internally and externally. Here are five keys to success.

article thumbnail

Hidden Cobra Strikes Again with Custom RAT, SMB Malware

Threatpost

The North Korean-sponsored actors are targeting sensitive and proprietary information, and the malware could disrupt regular operations and disable systems and files.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Windows 'Double Kill' Attack Code Found in RIG Exploit Kit

Dark Reading

Microsoft issued a fix for the remote code execution zero-day vulnerability in May, but research shows businesses have slowed their patching processes post-Meltdown.

48
article thumbnail

Bug In Git Opens Developer Systems Up to Attack

Threatpost

A serious vulnerability was patched by developers behind Git that closes the door on a flaw that could lead to arbitrary code execution on a developer's system.

article thumbnail

Dozens of Vulnerabilities Discovered in DoD's Enterprise Travel System

Dark Reading

In less than one month, security researchers participating in the Pentagon's Hack the Defense Travel System program found 65 vulnerabilities.