Tue.Mar 13, 2018

article thumbnail

Will Tight Budget Impede OCR's HIPAA Mission?

Data Breach Today

While the director of the HHS Office for Civil Rights says HIPAA enforcement remains a top priority for the agency, obtaining enough resources to carry out its mission is an ongoing battle, says former OCR official Deven McGraw.

IT 173
article thumbnail

The Pushmi-Pullyu Impact of Technology Innovation on Information Preservation

AIIM

It’s bad enough that those of us in the technology space use three letter acronyms as if we’re being paid per usage. So here's a quick definition of terms for those mystified by the title of this post. If you are not conversant in Dr. Doolittle (even the Eddie Murphy version), Pushmi-Pullyu is a "gazelle-unicorn cross that has two heads (one of each) at opposite ends of its body.".

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Federal Judge: Yahoo Breach Victims Can Sue

Data Breach Today

Plaintiffs Claim Spam and Card Fraud Resulted From Breach of 3 Billion Accounts A federal judge has largely rejected a motion by Verizon to dismiss a class-action suit filed by victims of three data breaches that compromised Yahoo, which is now part of Verizon. The Yahoo breaches appeared to have compromised nearly every Yahoo user's personal details at least once.

article thumbnail

YouTube Will Link Directly to Wikipedia to Fight Conspiracy Theories

WIRED Threat Level

After a series of scandals related to misinformation, YouTube CEO Susan Wojcicki announced the company would begin directing users to sources like Wikipedia.

Security 110
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Is All Encryption Equal?

Thales Cloud Protection & Licensing

Data encryption has been around almost since the age of computers. In truth, anyone with minimal experience can write a simple script that uses default services built into virtually every OS to encrypt data. In Linux, for instance, it takes four openSSL commands to generate an encryption key and encrypt data. However, simply encrypting data is not a sufficient control when storing data in the cloud.

More Trending

article thumbnail

Email Security for Your Business

eSecurity Planet

Every business uses email, yet many are unaware of email security threats. Here's a look at the threats - and how to secure your business email.

article thumbnail

The Future of Records Management and Documentum

Gimmal

Documentum has been an industry-leading content management solution for many companies since the early 1990s. Its core capabilities include document management, content capture, archiving, business process automation, records management, and content publishing. Historically, most Documentum customers did not implement their certified records management software.

article thumbnail

Introducing OpenText Life Sciences Express – it’s simple

OpenText Information Management

Simplicity. That’s what every Life Sciences professional working with regulated business processes needs today. That’s exactly what they’re getting with the intuitive user experience and efficient cloud-based access of our new OpenText™ Life Sciences Express. Here’s why simplicity is so important. When thinking about quality assurance, numerous employees and partners must access and read standard … The post Introducing OpenText Life Sciences Express – it’s simple appeared first on OpenText

Cloud 65
article thumbnail

Failing to patch vulnerabilities now will lead to punishment under the GDPR

IT Governance

The Information Commissioner’s Office (ICO) has warned that organisations could be punished for existing vulnerabilities when the EU General Data Protection Regulation (GDPR) is enforced. Although the GDPR won’t take effect until 25 May 2018, organisations that fail to identify and patch vulnerabilities before this date face strict disciplinary measures.

GDPR 65
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Records Management Programs: How to Create a Solution to Poor Record Keeping

Record Nations

Defining Records Management Programs Records management is an organizational function devoted to the management of records throughout their life cycles, including from the time of creation to their eventual disposal. This type of program gives you a road map to ensuring all records are easily accessible, filed appropriately, returned to the right place, and […].

article thumbnail

Researchers Point to an AMD Backdoor—And Face Their Own Backlash

WIRED Threat Level

As an Israeli security firm outlines real flaws in AMD's chips, the security community questions its motivations.

article thumbnail

Webinar Recording Available on SEC Cybersecurity Guidance

Hunton Privacy

On March 7, 2018, Hunton & Williams LLP hosted a webinar with partners Lisa Sotto , Aaron Simpson and Scott Kimpel , and senior associate Brittany Bacon on the Securities and Exchange Commission’s (“SEC’s”) recently released cybersecurity guidance. For the first time since its last major staff pronouncement on cybersecurity in 2011, the SEC has released new interpretive guidance for public companies that will change the way issuers approach cybersecurity risk.

article thumbnail

What CISOs Should Know About Quantum Computing

Dark Reading

As quantum computing approaches real-world viability, it also poses a huge threat to today's encryption measures.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

E-Mailing Private HTTPS Keys

Schneier on Security

I don't know what to make of this story : The email was sent on Tuesday by the CEO of Trustico, a UK-based reseller of TLS certificates issued by the browser-trusted certificate authorities Comodo and, until recently, Symantec. It was sent to Jeremy Rowley, an executive vice president at DigiCert, a certificate authority that acquired Symantec's certificate issuance business after Symantec was caught flouting binding industry rules , prompting Google to distrust Symantec certificates in its Chro

article thumbnail

What's the C-Suite Doing About Mobile Security?

Dark Reading

While most companies have security infrastructure for on-premises servers, networks, and endpoints, too many are ignoring mobile security. They'd better get moving.

article thumbnail

AMD Investigating Reports of 13 Critical Vulnerabilities Found in Ryzen, EPYC Chips

Threatpost

Researchers on Tuesday disclosed over a dozen critical security vulnerabilities in several AMD chips, opening them up for attackers who want to steal sensitive data and install malware on AMD servers, workstations and laptops.

article thumbnail

Microsoft Remote Access Protocol Flaw Affects All Windows Machines

Dark Reading

Attackers can exploit newly discovered critical crypto bug in CredSSP via a man-in-the-middle attack and then move laterally within a victim network.

Access 60
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The 1918 Influenza Pandemic (Photos)

Unwritten Record

This post was written in collaboration with Kevin Quinn, Sarah Lepianka, and Katherine Stinson – Archives Technicians in the Still Photos Branch. . The 1918 Influenza Pandemic, also known as the Spanish Flu, was one of the deadliest events in human history. While fighting between the Allied Powers and the Central Powers raged on in Europe, the disease knew no borders.

article thumbnail

Google 'Distrust Dates' Are Coming Fast

Dark Reading

All the tools are in place for the migration of SSL digital certificates on a scale that is unprecedented for the certificate authority industry. Are you ready?

47
article thumbnail

Samba Patches Two Critical Vulnerabilities in Server Software

Threatpost

Samba released fixes for its networking software to address two critical vulnerabilities that allowed attackers to change admin password or launch DoS attacks.

article thumbnail

Benefits of Shredding Services

Armstrong Archives

Whether you’re a business or an individual, you likely have sensitive paperwork. Vital records such as passports, bank statements, credit card bills and other documents, in the wrong hands, can make anyone vulnerable to identify theft. Businesses often want to know their options for secure document destruction when it comes to employee records and client contact lists that contain sensitive information.

Paper 40
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Microsoft Patches 15 Critical Bugs in March Patch Tuesday Update

Threatpost

Products receiving the most patches included Microsoft browsers and browser-related technologies such as the company’s JavaScript engine Chakra.

article thumbnail

Malware 'Cocktails' Raise Attack Risk

Dark Reading

Malware mash-ups hiding in encrypted traffic are boosting attack numbers and increasing the danger to data, according to recent reports.

Risk 46
article thumbnail

6 disruptive models that can create the data-centric enterprise

Information Management Resources

Imperfect market conditions open the door to disruption. Data is the secret weapon that can change the dynamics of competition and spur digital growth.

article thumbnail

Microsoft Report Details Different Forms of Cryptominers

Dark Reading

A new report explores different ways legitimate and malicious coin miners are appearing in the enterprise.

48
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Tom O’Connor of the Gulf Coast Legal Technology Center: eDiscovery Trends 2018

eDiscovery Daily

This is the first of the 2018 Legaltech New York (LTNY) Thought Leader Interview series. eDiscovery Daily interviewed several thought leaders at LTNY this year (and some afterward) to get their observations regarding trends at the show and generally within the eDiscovery industry. Today’s thought leader is Tom O’Connor. Tom is a nationally known consultant, speaker and writer in the area of computerized litigation support systems.

GDPR 39
article thumbnail

China-Linked APT15 Used Myriad of New Tools To Hack UK Government Contractor

Threatpost

Cyber espionage group APT15 is back, this time stealing sensitive data from a UK government contractor.

article thumbnail

Microsoft Patch Tuesday: Prioritize Browser Updates

Dark Reading

All of the critical vulnerabilities Microsoft patched on March 13 were within, and related to, browsers.

42