Tue.May 15, 2018

article thumbnail

Personalizing the experience: One size doesn’t fit all

OpenText Information Management

Personalization is radically changing the face of retail, both online and in store. In a previous blog, I wrote about the importance of personalizing the customer experience. To date, a good deal of focus has been on customer experience but personalization can make a major impact in both increased revenue and customer loyalty. Personalized products … The post Personalizing the experience: One size doesn’t fit all appeared first on OpenText Blogs.

article thumbnail

Data, data, everywhere – Oh to be a central banker

Information Management Resources

I do sit, marvel and wonder at the sheer scale and impact of decisions taken by titans of industry and folks like central bankers. It is hugely impressive and thought provoking.

IT 32
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Report: Facebook App Exposed 3 Million More Users' Data

Data Breach Today

Revenge of the Personality Test, Take Two Researchers at the University of Cambridge, via a myPersonality test on Facebook, reportedly used data from 3 million users to power a spin-off company that delivered targeted advertising services. Facebook says the app is one of 200 that it's suspended for suspicious data handling practices.

IT 185
article thumbnail

The Untold Story of Robert Mueller's Time in the Vietnam War

WIRED Threat Level

Special Counsel Robert Mueller’s job is to make sense of how Russia hacked the 2016 election. But to make sense of Mueller, you have to revisit some of the bloodiest battles of Vietnam.

Security 112
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Mexico Investigates Suspected Cyberattacks Against 5 Banks

Data Breach Today

$20 Million in Potential Losses After Real-Time Payment Connections Compromised Mexican officials are investigating a series of technical glitches that may have been a prelude to a large cyberattack affecting at least five banks, according to news reports. While the full scope of the incidents remains unclear, up to $20 million may have been stolen.

140
140

More Trending

article thumbnail

OCR Plans Do-Over for 'Accounting of Disclosures' Proposal

Data Breach Today

Agency Will Ditch Previous HIPAA Privacy Rule Revamp Plan, Seek New Ideas Federal regulators plan to craft a new proposal for revamping a HIPAA Privacy Rule provision for "accounting of disclosures" of electronic patient records. Updating that rule was mandated under the HITECH Act, but the modification has been in limbo since 2011.

Privacy 100
article thumbnail

DFAR Cybersecurity FAQs Provide Practical Guidance Highlighting Expansive Scope of Contractor Requirements

Data Matters

For defense contractors, January 1, 2018 brought with it not only a new year, but also a new era – an era in which contractors must comply with the entire set of more detailed cybersecurity requirements under Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012. As we have flagged before on Data Matters , this DFRAS provision applies to all Department of Defense (DOD) contracts (except for those involving commercial, off-the-shelf items) and places a number of substantial obli

article thumbnail

OnDemand Webinar | State of the Internet Security Report

Data Breach Today

State of the Internet | Security Report: Q4 2017 Findings

Security 100
article thumbnail

PCI DSS dissected: Reducing your cardholder data environment

IT Governance

A version of this blog was originally published on 26 November 2012. The requirements of the Payment Card Industry Data Security Standard (PCI DSS) should be considered the starting point of security. The Standard doesn’t cover everything that organisations can do to protect payment card data, but it does cover everything that they should do, such as put in place the appropriate procedures, policies and work practices.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Mark Zuckerberg has ‘no plans’ to go to UK to give evidence to MPs

The Guardian Data Protection

MPs inquiring into Cambridge Analytica breach urge Facebook CEO to appear via video link Facebook has said Mark Zuckerberg has no plans to come to the UK to give evidence to parliament despite the threat of a formal summons, prompting frustrated MPs inquiring into the Cambridge Analytica data breach to ask if he would appear via video link instead. Related: Zuckerberg's refusal to testify before UK MPs 'absolutely astonishing' Continue reading.

article thumbnail

The NIS Regulations for the healthcare sector

IT Governance

9 May 2018 marked the deadline for EU member states to transpose the Directive on security of network and information systems (NIS Directive) into national law; in the UK, the Directive was transposed as the Network and Information Security Regulations 2018 (NIS Regulations). However, while many organisations are prioritising the EU General Data Protection Regulation (GDPR) , there is little commotion about the NIS Regulations.

GDPR 63
article thumbnail

Sending Inaudible Commands to Voice Assistants

Schneier on Security

Researchers have demonstrated the ability to send inaudible commands to voice assistants like Alexa, Siri, and Google Assistant. Over the last two years, researchers in China and the United States have begun demonstrating that they can send hidden commands that are undetectable to the human ear to Apple's Siri, Amazon's Alexa and Google's Assistant.

article thumbnail

Upcoming webinar: Take the first steps towards GDPR compliance

IT Governance

Over the past year, IT Governance’s data protection and information security experts have shared – and continue to share – their understanding of the new General Data Protection Regulation (GDPR) through green papers, training courses, blogs and webinars in order to encourage organisations to start preparing for compliance with the Regulation, due to come into effect on 25 May 2018.

GDPR 61
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Issuance support for a wide range of payment instruments

Thales Cloud Protection & Licensing

Making payments even in a face-to-face environment is no longer just about using magnetic stripe or chip cards where the security, operating rules, and risks have been long established and well understood by all the actors involved. We are now living in a world where fundamentally different types of devices are being used to initiate payment transactions.

IoT 54
article thumbnail

CIPL Publishes Study on How the ePrivacy Regulation will Affect the Design of Digital Services

Hunton Privacy

On May 14, 2018, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP published a study on how the ePrivacy Regulation will affect the design and user experiences of digital services (the “Study”). The Study was prepared by Normally, a data product and service design studio, whom CIPL had asked for an independent expert opinion on user experience design.

Privacy 53
article thumbnail

Holistic security: Augmenting endpoint protection with intelligent automation

OpenText Information Management

With hackers, hostile bots, data misuse, leaks, and privacy invasions so much in the news these days, it’s not surprising that data security has finally become a concern of top executives, not just “the geeks in IT.” In cybersecurity, the statistics get worse every year. Look at 2017. According to a recent report that names … The post Holistic security: Augmenting endpoint protection with intelligent automation appeared first on OpenText Blogs.

article thumbnail

25% of Businesses Targeted with Cryptojacking in the Cloud

Dark Reading

New public cloud security report detects a spike in cryptojacking, mismanaged cloud storage, account takeover, and major patches getting overlooked.

Cloud 51
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Mexico’s Banking System Sees $18M Siphoned Off in Phantom Transactions

Threatpost

Sources said the funds were diverted to fraudulent accounts in a coordinated heist that involved hundreds of wire transfers and on-the-ground accomplices.

article thumbnail

25% of Businesses Targeted with Cryptojacking

Dark Reading

New public cloud security report detects a spike in cryptojacking, mismanaged cloud storage, account takeover, and major patches getting overlooked.

Cloud 47
article thumbnail

Treating cybersecurity like workplace safety

CGI

Treating cybersecurity like workplace safety. pallavi.m@cgi.com. Tue, 05/15/2018 - 04:16. Taking measures to protect employees from workplace accidents seems like an obvious need today, but that was not always the case. Less than half a century ago, there was no Occupational Safety and Health Administration (OSHA). Workers’ compensation laws were passed state by state during the first half of the twentieth century, but before the 1970 law that created OSHA, workers had little recourse to prevent

article thumbnail

Upcoming Webinar: Worried about the GDPR? Don’t Panic!

HL Chronicle of Data Protection

With the GDPR about to come into effect, join our experts for a live webinar on May 23 to learn what you should be focusing on now. The GDPR becomes applicable on 25 May and will affect organisations worldwide. It is a complex and strict law with dozens of obligations which will be fiercely enforced. Getting it right will be essential for business success in the digital economy.

GDPR 40
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Six big takeaways for financial institutions from CBA LIVE

CGI

Six big takeaways for financial institutions from CBA LIVE. pallavi.m@cgi.com. Tue, 05/15/2018 - 05:24. As a consulting executive, I help clients in the banking industry on everything from their vision for digital transformation, to the nitty-gritty of implementation and execution. While it’s good to have this level of focus with individual clients, I also appreciate the chance to step back and see what else is going on in this dynamic sector.

article thumbnail

Don't Roll the Dice When Prioritizing Vulnerability Fixes

Dark Reading

CVSS scores alone are ineffective risk predictors - modeling for likelihood of exploitation also needs to be taken into account.

Risk 48
article thumbnail

The time for government blockchain proofs of concept is now

CGI

The time for government blockchain proofs of concept is now. pallavi.m@cgi.com. Tue, 05/15/2018 - 06:29. For the past two years, CGI has seen an exponential uptick in commercial sector interest in blockchain beyond just the financial services industry. Many government agencies also have been wading deeper into the blockchain waters. For example, the U.S.

article thumbnail

Rail Europe Notifies Riders of Three-Month Data Breach

Dark Reading

Rail Europe North America alerts customers to a security incident in which hackers planted card-skimming malware on its website.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Capital markets: Top five technology trends

CGI

Capital markets: Top five technology trends. shobana.lv@cgi.com. Wed, 05/16/2018 - 01:31. Capital market firms always have been more mature in their use of data and technology than their retail and corporate banking cousins, and the results of the CGI Client Global Insights demonstrate that the pace of change within capital markets continues to accelerate.

article thumbnail

Phishing Spy Campaign Targets Top Mideast Officials

Threatpost

Researchers have discovered a set of custom surveillanceware tools being deployed against Android and iOS devices primarily in the Middle East.

article thumbnail

Why big salaries alone won’t close the analytics talent gap

Information Management Resources

Recent research predicts a workforce shift away from IT workers to more data analysts, but organizations will only be able to keep up if they attract more young students to data science careers today.