Sun.Jul 01, 2018

article thumbnail

Warm words for the UK's intelligence privacy practices from the UN

Data Protector

I t’s not often that the UK is praised for the manner in which its intelligence agencies adopt appropriate data protection standards. So let's give due acknowledgement to Joe Cannataci, the UN’s Special Rapporteur on the right to privacy, who has recently used some very warm words to comment on these privacy practices. Of the Investigatory Powers Act, he proclaimed: "I am satisfied that the UK systematically employs multiple safeguards which go to great lengths to ensure that unauthorised survei

Privacy 120
article thumbnail

Google's new policy boss will tackle everything from AI anxiety to antitrust

Information Management Resources

The first for Karan Bhatia will be dealing with a regulatory backlash that includes antitrust investigations and new digital-privacy rules.

Privacy 34
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bug Bounty Programs Turn Attention to Data Abuse

Threatpost

More companies – particularly social media firms – may follow Facebook’s footsteps in turning to bug bounty programs to scout out any data privacy abuse on their platforms, experts say.

article thumbnail

At Long Last, Apple v. Samsung is Finally Over: eDiscovery Trends

eDiscovery Daily

Without a doubt, the case that has generated more eDiscovery Daily blog posts than any other over our nearly eight years of existence has been the Apple v. Samsung case. We published at least fifteen posts regarding the case since 2012 (click here to search our blog for “Samsung” and the first fifteen posts are about the case) and could have easily published more – if there were more notable eDiscovery issues to discuss.

Paper 34
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Bug Bounty Programs Turn Attention to Data Abuse

Threatpost

More companies – particularly social media firms – may follow Facebook’s footsteps in turning to bug bounty programs to scout out any data privacy abuse on their platforms, experts say.

More Trending

article thumbnail

MacOS Malware Targets Cryptocurrency Community on Slack, Discord

Threatpost

New macOS malware targets crypto community via chat networks Slack and Discord.

52
article thumbnail

Adidas says millions of U.S. customers being alerted of breach

Information Management Resources

A preliminary investigation found the leaked data includes contact information, usernames and encrypted passwords, the company said in a statement.

article thumbnail

MacOS Malware Targets Cryptocurrency Community on Slack, Discord

Threatpost

New macOS malware targets crypto community via chat networks Slack and Discord.

42
article thumbnail

Resuming the blog

Data Protector

Time to start blogging again.

24
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.