Wed.May 16, 2018

article thumbnail

How information management leaders can prepare for Industry 5.0

Information Management Resources

Increased collaboration among smart systems, robotics and human allies are the foundation of this advanced technology.

30
article thumbnail

FRANCE: New Data Protection Law has been Adopted

DLA Piper Privacy Matters

By Denise Lebeau-Marianna and Caroline Chancé. Despite a lack of agreement between the Senate and the National Assembly, France has finally passed its new data protection law , 11 days prior to the entry into application of the EU General Data Protection Regulation (GDPR) on May 25. In addition to several provisions strengthening the powers of the French Data Protection Authority (CNIL), you will find here an overview of some of the main deviations from GDPR: Territorial scope.

GDPR 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IT Pros Worried About IoT But Not Prepared to Secure It

Dark Reading

Few organizations have a security policy in place for Internet of Things devices, new survey shows.

IoT 50
article thumbnail

DHS Issues More Medical Device Cybersecurity Alerts

Data Breach Today

Why Are Such Warnings Becoming More Common? The Department of Homeland Security has yet again issued a warning about cybersecurity vulnerabilities in medical devices. These warnings have come after independent researchers, or the companies themselves, have reported the problems.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

How to solve four common challenges when outsourcing records to the cloud Part 1

TAB OnRecord

In some ways, moving to an outsourced cloud provider is a bit like outsourcing the storage of your physical files – whether to an active records center or to a box storage provider. In both cases, the files themselves now reside within facilities owned and managed by the outsourcing provider. In both cases you are relying on another party to help ensure the privacy and security of your records.

Cloud 99

More Trending

article thumbnail

What are all these GDPR emails filling up your inbox?

The Guardian Data Protection

Websites are desperately trying to maintain their links to users before the 24 May deadline, when consumers rather than companies will be in charge of personal data ‘Hey there Field Left Blank. So listen, budski, my man, my main man. I know we’ve been sending you spammy emails about cheap holiday deals five days a week. For the last five years. Yeah, maybe we took a few liberties with that.

GDPR 78
article thumbnail

OnDemand Webinar | Ponemon Report: The Cost of Credential Stuffing

Data Breach Today

Credential stuffing attacks are on the rise and pose a serious threat to your business. Credential stuffing attacks are on the rise and pose a serious threat to your business.

70
article thumbnail

Senators Grill Cambridge Analytica Whistleblower Christopher Wylie

WIRED Threat Level

Christopher Wylie testified before the Senate Judiciary Committee Wednesday that Cambridge Analytica specialized in "disinformation, spreading rumors, *kompromat*, and propaganda.".

article thumbnail

Business Continuity Awareness Week (BCAW) – Free BCM resources

IT Governance

Business continuity management (BCM) involves managing risks to ensure that critical business functions continue in the event of a disruption. The best approach to BCM is by developing and implementing a business continuity management system (BCMS) aligned to its international standard ISO 22301. It’s Business Continuity Awareness Week (14-18 May 2018); here are a few of IT Governance’s free BCM resources that offer a comprehensive introduction to BCM, as well as tools to build your knowledge.

Paper 67
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Jigsaw's Project Shield Will Protect Campaigns From Online Attacks

WIRED Threat Level

Project Shield already defends journalists and human rights groups from DDoS attacks. Now, Jigsaw will help political campaigns out as well.

article thumbnail

7 Tools for Stronger IoT Security, Visibility

Dark Reading

If you don't know what's on your IoT network, you don't know what to protect -- or protect from. These tools provide visibility into your network so you can be safe with (and from) what you see.

IoT 60
article thumbnail

Inside the Takedown of Scan4You, a Notorious Malware Clearinghouse

WIRED Threat Level

How security researchers caught the creators of counter antivirus services Scan4You.

article thumbnail

Critical Linux Flaw Opens the Door to Full Root Access

Threatpost

The vulnerability allows an attacker to execute a malware or other payloads on a client machine by sending malicious messages from the DHCP server.

Access 63
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Accessing Cell Phone Location Information

Schneier on Security

The New York Times is reporting about a company called Securus Technologies that gives police the ability to track cell phone locations without a warrant: The service can find the whereabouts of almost any cellphone in the country within seconds. It does this by going through a system typically used by marketers and other companies to get location data from major cellphone carriers, including AT&T, Sprint, T-Mobile and Verizon, documents show.

Access 55
article thumbnail

Want Your Daughter to Succeed in Cyber? Call Her John

Dark Reading

It's time to "do the right thing" when it comes to gender in the hiring and promotion of women in cybersecurity. Four women (and a man named John) offer practical solutions for shifting the balance.

article thumbnail

New Pluralsight Course: OWASP Top 10, 2017

Troy Hunt

Just a tad over 5 years ago, I released my first ever Pluralsight course - OWASP Top 10 Web Application Security Risks for ASP.NET. More than 32k people have listened to more than 78k hours of content in this course making it not just the most popular course I've ever released, but also keeping it as my most popular in the library even today by a long way.

article thumbnail

Event oriented customer experience

OpenText Information Management

In my previous blog, I took a look at some of the major areas Financial Services needs to address to deliver the experience their customers demand. This time round I’m going to focus on the most fundamental change that you need to make to fully benefit from your customer experience investments: the move from a … The post Event oriented customer experience appeared first on OpenText Blogs.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How Facilities Bundle Storage and Shredding

Record Nations

You’ve made the decision to store your records in a facility. You’ve been able to access files when necessary, but now some of your records have reached their expiry date. What should you do? Shred Outdated Documents Most record storage facilities offer a plan for records at the end of their retention period. They partner […]. The post How Facilities Bundle Storage and Shredding appeared first on Record Nations.

Access 45
article thumbnail

Frequency & Costs of DNS-Based Attacks Soar

Dark Reading

The average cost of a DNS attack in the US has climbed 57% over the last year to $654,000 in 2018, a survey from EfficientIP shows.

50
article thumbnail

RIG EK Still Makes Waves, This Time with a Stealthy Backdoor

Threatpost

The main purpose of Grobios malware is to help attacker establish a strong, persistent foothold in a victim's system, in order to drop additional payloads later.

44
article thumbnail

Preservica launches cloud hosted digital preservation in Australia

Preservica

Boston, MA, and Oxford, UK | 16 May 2018 | Preservica has today announced that its market-leading range of cloud hosted (SaaS) active digital preservation and access solutions are now available on the AWS Asia Pacific (Sydney) region. Preservica’s SaaS active digital preservation portfolio is already used by a large community of businesses, archives, libraries and government institutions across the US, Europe and Canada, and now provides Australian organizations with an affordable and secure way

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Doing digital right for consumer healthcare products

CGI

Doing digital right for consumer healthcare products. pallavi.m@cgi.com. Wed, 05/16/2018 - 05:35. Digital connectedness dominates the customer experience. As digital customers, we use devices, functioning in a myriad of ways to research, shop and purchase basic necessities, including consumer healthcare products like sunscreen, vitamins and toothpaste.

article thumbnail

Forget C-I-A, Availability Is King

The Falcon's View

In the traditional parlance of infosec, we've been taught repeatedly that the C-I-A triad (confidentiality, integrity, availability) must be balanced in accordance with the needs of the business. This concept is foundational to all of infosec, ensconced in standards and certification exams and policies. Yet, today, it's essentially wrong, and moreover isn't a helpful starting point for a security discussion.

Risk 40
article thumbnail

Not your granddad’s government data sharing: learning from user-centric design

CGI

Not your granddad’s government data sharing: learning from user-centric design. shobana.lv@cgi.com. Thu, 05/17/2018 - 01:14. Government agencies collect, analyze and disseminate a large volume of data. While much attention has been paid in the past few years to how they collect and analyze data, less attention has been paid to how they disseminate and share (non-sensitive) data with the public.

article thumbnail

Newly Discovered Malware Targets Telegram Desktop

Dark Reading

Russian-speaking attacker behind new malware capable of lifting credentials, cookies, desktop cache, and key files.

51
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

New Cryptominer Distributes XMRig in Aggressive Attacks

Threatpost

Cryptominer WinstarNssmMiner is an aggressive malware strain that has launched 500,000 attacks in the past three days earning criminals $28,000.

43
article thumbnail

FIDO Alliance Appoints Facebook to Board of Directors

Dark Reading

Facebook joins Google, Microsoft, Amazon, and Intel, all among major influential tech companies backing FIDO authentication.

article thumbnail

Where Does SIEM Fit in an Enterprise?

eSecurity Planet

VIDEO: Fortinet CISO Philip Quade details his firm's strategic approach and explains SIEM's core security role.