May, 2017

article thumbnail

Agile infrastructure is a prerequisite for digital transformation

CGI

Agile infrastructure is a prerequisite for digital transformation. harini.kottees…. Tue, 05/02/2017 - 06:00. Enterprises and governments are striving to become “digital” to revolutionize the customer and citizen experience and improve service delivery, operational efficiency and business outcomes. A foundational requirement to supporting such transformation is having a modern, agile IT infrastructure—a digital infrastructure platform.

article thumbnail

AES-GCM-SIV

Imperial Violet

AEADs combine encryption and authentication in a way that provides the properties that people generally expect when they “encrypt” something. This is great because, historically, handing people a block cipher and a hash function has resulted in a lot of bad and broken constructions. Standardising AEADs avoids this. Common AEADs have a sharp edge though: you must never encrypt two different messages with the same key and nonce.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Disambiguate “Zero-Day” Before Considering Countermeasures

Lenny Zeltser

“Zero-day” is the all-powerful boogieman of the information security industry. Too many of us invoke it when discussing scary threats against which we feel powerless. We need to define and disambiguate this term before attempting to determine whether we’ve accounted for the associated threats when designing security programs. Avoid Zero-Day Confusion.

Paper 68
article thumbnail

National Geographic Channel Tonight: Pwnie Express’s Jayson E. Street Breaks into Banks Designed To Keep Him Out

Outpost24

Not all hackers are bad guys. After all, a hacker is simply someone who figures how to repurpose a tool, a gadget, or a device to carry out a task the object wasn’t designed to do. Steve Wozniak was a hacker before he co-created Apple. Tesla, Turing, and DaVinci, are all hackers in their own right.

67
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cybersecurity or Information Governance Failure???

Getting Information Done

This past weekend the world was overwhelmed by the cyberattack that spread around the globe hitting businesses, hospitals, and government agencies in over 150 countries. The rapid spread of Ransomware based on WannaCry which exploits vulnerabilities in Microsoft’s Windows operating system has been characterized by Europol Director, Rob Wainwright, as “…something we haven’t seen before”.

More Trending

article thumbnail

A Website Security Framework Intro

PerezBox

A framework should provide the underlying structure we require to build on. Consider a home. Regardless of the type of home, they all have a similar framework. The framework keeps. Read More. The post A Website Security Framework Intro appeared first on PerezBox.

article thumbnail

The Internet Big Five Is Now The World’s Big Five

John Battelle's Searchblog

The post The Internet Big Five Is Now The World’s Big Five appeared first on John Battelle's Search Blog. Back in December of 2011, I wrote a piece I called “ The Internet Big Five ,” in which I noted what seemed a significant trend: Apple, Microsoft, Google, Amazon, and Facebook were becoming the most important companies not only in the technology world, but in the world at large.

article thumbnail

NIST Plans To Examine Internet of Things (IoT) For Its Cybersecurity Framework

Privacy and Cybersecurity Law

The National Institute of Standards and Technology (NIST) is holding a Cybersecurity Framework Workshop this week at its headquarters in Gaithersburg, Maryland. […].

article thumbnail

SMBv1 isn’t safe

Roger's Information Security

Long before WannaCry used a recently patched Microsoft vulnerability to exploit machines, the recommendation was to disable SMBv1. Disabling old protocols isn’t sexy. You’re breaking things, and not introducing new features. You’re fixing theoretical future attacks. Perhaps the willingness to take on this challenge is a good measure of the maturity level of a security program.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The impact of a cyber breach on public sector organisations

CGI

The impact of a cyber breach on public sector organisations. harini.kottees…. Wed, 05/31/2017 - 05:09. Recently CGI commissioned research from Oxford Economics to explore the link between a cyber incident and company value. Specifically, we wanted to develop an analytical methodology to examine share-price movements in companies that had experienced publicly disclosed cyber breaches.

Sales 40
article thumbnail

China Releases Revised Draft on Measures for Implementation of the New Cybersecurity Law

Hunton Privacy

On May 19, 2017, the Cyberspace Administration of China (“CAC”) issued a revised draft (the “Revised Draft”) of its Measures for the Security Assessment of Outbound Transmission of Personal Information and Critical Data. The original draft was issued in April 2017, and similar to the original draft, the Revised Draft does not have the impact of law; it does, however, provide an indication of how the CAC’s views on the Cybersecurity Law have evolved since the publication of the original draft.

article thumbnail

Information age delivers new space race

MIKE 2.0

At the height of the race for the moon, everyone imagined that by now we would be living in a space age. Instead we got the information age which has given us access to unparalleled global connections and almost the sum of human knowledge at our fingertips. Stanley Kubrick’s “2001: A Space Odyssey” assumed the information revolution would happen alongside the move into space, in fact it seems they had to be sequential.

article thumbnail

Is Humanity Obsolete?

John Battelle's Searchblog

The post Is Humanity Obsolete? appeared first on John Battelle's Search Blog. image. Upon finishing Yuval Harari’s Homo Deus , I found an unwelcome kink in my otherwise comfortably adjusted frame of reference. It brought with it the slight nausea of a hangover, a lingering whiff of jet exhaust from a hard night, possibly involving rough psychedelics.

Cloud 54
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New ABA Opinion – Attorneys Must Take Reasonable Cybersecurity Measures To Protect Client Data

Privacy and Cybersecurity Law

On May 11, 2017, the American Bar Association (ABA) issued Formal Opinion 477, making clear that a lawyer may transmit information […].

article thumbnail

Should You Be Worried About Apps Tracking Personal Data?

Productivity Bytes

For years now, maybe even decades, we’ve been living in a digital age. Anything and everything we do is quantified as data. The products we buy and prefer. The websites, apps, and media we consume. The places we go. All this information and more is being parsed into digital files, and it gets fed back … + Read More. The post Should You Be Worried About Apps Tracking Personal Data?

article thumbnail

Resourceful Records Managers

The Schedule

Her is our second post in the Resourceful Records Managers series! If you are interested in sharing your journey as a Records Manager please contact me at jgd1(at)williams(dot)edu. Name: . Fred Grevin. Institution and Job Title: . New York City Economic Development Corporation (NYCEDC). Vice-President, Records Management. 1. What led you to choose your current career in Records Management?

article thumbnail

Bavarian DPA Tests GDPR Implementation of 150 Companies

Hunton Privacy

On May 24, 2017, the Bavarian Data Protection Authority (“DPA”) published a questionnaire to help companies assess their level of implementation of the EU General Data Protection Regulation (“GDPR”). . The DPA announced that it has sent the questionnaire to 150 randomly selected Bavarian companies. The questionnaire examines the following topics: procedures relating to the GDPR and the Data Protection Officer’s responsibilities; data processing activities, inventories and privacy by design; onb

GDPR 56
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Comment le numérique rebat les cartes du secteur énergétique

CGI

Digital disruption is in the cards for the energy sector. harini.kottees…. Mon, 05/08/2017 - 02:42. The pace at which digitalization is accelerating poses a major challenge for organizations in the energy sector. The momentum is unsurprising, given that 81% of the utilities executives interviewed for the 2016 CGI Global 1000 outlook revealed that transforming to become a digital enterprise is a top strategic priority.

article thumbnail

CMSWire Article: How Information Architecture Improves Customer Experience

JKevinParker

My latest CMSWire article is " How Information Architecture Improves Customer Experience ": Have you ever had a problem finding information on a website or app? If so, you were experiencing a poor information architecture (IA). Conversely, a great experience with a site or application is only possible with solid IA under the surface. While information architecture doesn't get the headlines that personalization or chat bots receive, when built on a unified information strategy, IA can improve the

article thumbnail

NIST Plans To Examine Internet of Things (IoT) For Its Cybersecurity Framework

Privacy and Cybersecurity Law

The National Institute of Standards and Technology (NIST) is holding a Cybersecurity Framework Workshop this week at its headquarters in Gaithersburg, Maryland. The purpose of the workshop is to discuss issues related to its widely used Cybersecurity Framework. Sessions at the workshop are being livestreamed , and are exploring the extraterritorial application of the NIST framework, sector-specific requirements, and uses for small businesses.

IoT 40
article thumbnail

Ads. Grrr.

John Battelle's Searchblog

The post Ads. Grrr. appeared first on John Battelle's Search Blog. (Cross posted on Medium ). I honestly didn’t want to say this, but. I did have other things to do tonight than write about advertising. Again. But g’damn, folks. Can we get our s**t together? I know Google thinks it is doing something about it. But that Chrome feature you call ad blocking?

IT 40
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Making it Stick: Records Management Training Approaches

The Schedule

Several weeks ago the University Archivist and I conducted our bi-annual University Archives and Records Management training session, part of our Office of Human Resources Faculty and Staff Development Program. This got me thinking about the various strategies, methods, and approaches records managers employ when conducting training and outreach. I reached out to my peers via SAA’s records management and ARMA’s EDU listservs to get a sense of just that, and hopefully learn some new tips and tric

article thumbnail

New York AG Settles with Wireless Lock Maker Over Security Flaws

Hunton Privacy

On May 22, 2017, New York Attorney General Eric T. Schneiderman announced that the AG’s office has reached a settlement (the “Settlement”) with Safetech Products LLC (“Safetech”) regarding the company’s sale of insecure Bluetooth-enabled wireless doors and padlocks. In a press release, Schneiderman indicated that this “marks the first time an attorneys general’s office has taken legal action against a wireless security company for failing to protect their [customers’] personal and private inform

article thumbnail

Diving into the Issues: Observations from SOURCE and AtlSecCon

Andrew Hay

Last week I had the pleasure of presenting three times, at two conferences, in two different countries: SOURCE in Boston, MA and at the Atlantic Security Conference (AtlSecCon) in Halifax, NS, Canada. The first event of my week was SOURCE Boston. This year marked the tenth anniversary of SOURCE Conference and it continues to pride itself on being one of the only venues that brings business, technology and security professionals together under one roof to focus on real-world, practical security s

article thumbnail

A New Adventure with Tahzoo

JKevinParker

I recently started a brand new adventure in my career. I am now Senior VP/Managing Director of marketing technology labs with Tahzoo , a data-driven customer experience agency based in Washington, D.C. I have been fortunate to work for some great companies and mostly for great bosses. I even had a good long run with my own Web design, hosting, and content management services business.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

RFID Global announces Visi-Trac Analytics

RFID Global Solution, Inc.

RFID Global Solution, Inc., is pleased to announce Visi-Trac Analytics, providing a new level of real-time operational intelligence that empowers companies to forecast future outcomes, prevent operational disruptions, and improve supply chain performance. The post RFID Global announces Visi-Trac Analytics appeared first on RFID Global Solution.

article thumbnail

US Government Accountability Office Releases New Report On The Internet of Things (IoT)

Privacy and Cybersecurity Law

On May 15, 2017, the US Government Accountability Office (GAO) released a new report entitled “Internet of Things: Status and implications of an […].

article thumbnail

Preparing for GDPR – Is the Way You Process Information Compliant with Data Protection Laws?

Managing Your Information

I attended a seminar last year where an organisation presented a new database that they had been developing. In my view, it was great. Genuine issues recognised by both the organisation and the sector involved would be addressed and the tool, without doubt, would facilitate better management of those issues. As the presentation went on, however, it became clear that nobody seemed to have considered compliance with data protection legislation.

GDPR 31