August, 2017

article thumbnail

Missing the GDPR deadline of May 2018: And then what?

Data Protector

As May 2018 looms, I’m aware of a growing number of companies that are seeking help with their GDPR compliance obligations. For most of them, it's a huge wake-up call. Many (me included) have been sent a stream of emails from self-styled “GDPR experts” containing dire warnings of ginormous fines for non-compliance. Many (me included) have been offered the opportunity to spend money on worthless qualifications from institutions I had never heard of to obtain some certificate of GDPR proficiency,

GDPR 120
article thumbnail

Security Keys

Imperial Violet

Security Keys are (generally) USB-connected hardware fobs that are capable of key generation and oracle signing. Websites can “enroll” a security key by asking it to generate a public key bound to an “appId” (which is limited by the browser based on the site's origin). Later, when a user wants to log in, the website can send a challenge to the security key, which signs it to prove possession of the corresponding private key.

Security 114
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Join us and discover essential survival tips for modern records managers

TAB OnRecord

For our colleagues in Boston, Minneapolis and Chicago, we invite you to join us at an intimate learning opportunity. TAB’s Kurt Thies will be speaking at a series of AIIM Lunch-and-Learns titled, Redefining the Modern Records Manager. In a brief talk, Kurt will share TAB’s industry experience and several customer examples to show you how… Read More.

article thumbnail

Big Data at NASA

IBM Big Data Hub

Data already is the new currency and is at the heart of everything digital. I like to repeat the adage, “Data becomes Information, becomes Knowledge, becomes Wisdom”. And “It’s all about the data”. So why do we send up probes, sensors or satellites — for the data?

Big data 103
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Understanding the Mirai Botnet

Elie

The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by storm in late 2016 when it overwhelmed several high-profile targets with massive distributed denial-of-service (DDoS) attacks. In this paper, we provide a seven-month retrospective analysis of Mirai’s growth to a peak of 600k infections and a history of its DDoS victims.

IoT 86

More Trending

article thumbnail

Automattic’s Push into Managed WordPress and It’s Potential Impacts to the Hosting Ecosystem

PerezBox

The Managed WordPress ecosystem welcomes a new entrant – Automattic. Today they officially announced that WordPress.com Business now supports plugins and third-party themes. I am fascinated by the move because. Read More. The post Automattic’s Push into Managed WordPress and It’s Potential Impacts to the Hosting Ecosystem appeared first on PerezBox.

IT 78
article thumbnail

No. Social Terrorists Will Not Win

John Battelle's Searchblog

The post No. Social Terrorists Will Not Win appeared first on John Battelle's Search Blog. A small group of social terrorists have hijacked the rational discourse led by society’s most accomplished, intelligent, and promising organizations. (cross posted from NewCo Shift ). Let’s start with this: Google is not a perfect company. It’s easy to cast it as an omniscient and evil villain, the leader of a millennium-spanning illuminati hellbent on world subjugation.

article thumbnail

Mergers and acquisitions: How to evaluate the target company’s RIM program

TAB OnRecord

In any merger or acquisition, you must have an accurate picture of what you are getting as part of the deal. For records and information management teams, this means having a clear understanding of the target company’s RIM program and records collections. In a two-part blog post we share a set of assessment questions that… Read More. The post Mergers and acquisitions: How to evaluate the target company’s RIM program appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Protect your customer data with relevant test data

IBM Big Data Hub

At a time when data breaches and personalized, sensitive data leaks are receiving great focus, individuals and governments alike are pushing hard on the business community to do more to protect citizens' rights and the sensitive customer data these companies maintain.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

People Aren't Necessarily Librarians

Gimmal

I learned the Dewy Decimal system in fourth grade, but I'm not sure they teach that any longer! With modern software, card catalogs and manual sorting are a thing of the past in libraries, and that ease of access should flow through to the digital workplace.

article thumbnail

UK seeks early deal with EU on post-Brexit data sharing

The Guardian Data Protection

Britain to argue that there should be no substantial regulatory changes as a result of leaving the EU The government is seeking to negotiate a deal over data sharing with Europe in which there are no substantial regulatory changes as a result of Brexit. The ambitious strategy emerged on Thursday in the last of a series of summer policy papers published by the Department for Exiting the European Union ahead of the next round of talks in Brussels on Monday.

Paper 79
article thumbnail

Google Begins Campaign Warning Forms Not Using HTTPS Protocol

PerezBox

August 2014, Google released an article sharing their thoughts on how they planned to focus on their “HTTPS everywhere” campaign (originally initiated at their Google I/O event). The premise of. Read More. The post Google Begins Campaign Warning Forms Not Using HTTPS Protocol appeared first on PerezBox.

article thumbnail

First Enforcement Actions Brought Pursuant to China’s Cybersecurity Law

Hunton Privacy

In the wake of China’s Cybersecurity Law going into effect on June 1, 2017, local authorities in Shantou and Chongqing have brought enforcement actions against information technology companies for violations of the Cybersecurity Law. These are, reportedly, the first enforcement actions brought pursuant to the Cybersecurity Law. Recently, Chongqing’s municipal Public Security Bureau’s cybersecurity team identified a violation of the Cybersecurity Law during a routine inspection.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Reader Favorites August 2017: Our Most Popular RIM Resources

TAB OnRecord

The most popular RIM resources of the past month cover both electronic records and paper records. To start, we have a white paper to help you choose the right metrics to measure ROI for your EDRMS system. Our mobile shelving buyer's guide provides an overview of key factors think about when purchasing a system. For… Read More. The post Reader Favorites August 2017: Our Most Popular RIM Resources appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Begin your cognitive enterprise journey at DataWorks Summit Sydney

IBM Big Data Hub

The power of machine learning, data science and big data is no longer considered a hype or fad. It’s a reality and it’s impacting the bottom lines of businesses.

article thumbnail

Black Hat 2017: Inside the NOC

Outpost24

With the thump of techno all around us and traces of network traffic on giant screens providing the only light, the Pwnie Express team spent the tail end of July in the Black Hat Network Operations Center (NOC). Before continuing to read this post, put your headphones on and blast The Prodigy's Voodoo People with your lights off and you'll start to feel the vibe.

IoT 63
article thumbnail

Why Office 365 Is the Ideal SAP Archiving Platform

Gimmal

As HANA adoption continues to mount , archiving is becoming an increasingly more essential component to any SAP content management strategy. One major reason for planning is that HANA doesn’t scale like traditional systems.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Phishing and Ransomware Leads Security Concerns for Organizations

PerezBox

The SANS Institute recently released their 2017 Threat Landscape Survey: User on the Front Line in which they interviewed 263 IT and security professional on the things that keep them. Read More. The post Phishing and Ransomware Leads Security Concerns for Organizations appeared first on PerezBox.

article thumbnail

Colombia Designates U.S. as “Adequate” Data Transfer Nation

Hunton Privacy

On August 14, 2017, the Colombian Superintendence of Industry and Commerce (“SIC”) announced that it was adding the United States to its list of nations that provide an adequate level of protection for the transfer of personal information, according to a report from Bloomberg BNA. The SIC, along with the Superintendence of Finance, is Colombia’s data protection authority, and is responsible for enforcing Colombia’s data protection law.

IT 64
article thumbnail

Db2 12 for z/OS SQL Enhancements: Advanced Triggers

Robert's Db2

In this, the fourth of a set of four entries covering SQL enhancements introduced with Db2 12 for z/OS, I will describe new trigger capabilities delivered by way of what are called "advanced triggers" (the kind of trigger that you could define prior to Db2 12 -- and which you can still create in a Db2 12 system -- is now referred to as a "basic trigger").

IT 48
article thumbnail

Experts answer your top data science and machine learning questions

IBM Big Data Hub

There’s no doubt data science and machine learning are main areas of focus for enterprises to better their business. However, talking about data science and machine learning isn’t the same as making it a reality.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

The first collision for full SHA-1

Elie

SHA-1 is a widely used 1995 NIST cryptographic hash function standard that was officially deprecated by NIST in 2011 due to fundamental security weaknesses demonstrated in various analyses and theoretical attacks. Despite its deprecation, SHA-1 remains widely used in 2017 for document and TLS certificate signatures, and also in many software such as the GIT versioning system for integrity and backup purposes.

Paper 48
article thumbnail

3 Necessary Information Governance Capabilities That Don’t Come Out of the Box

Gimmal

SharePoint and Office 365 are the ideal platform for enterprise collaboration, and offer some enterprise-grade information governance features. The Microsoft platform provides excellent value on its own, but can easily be extended with third-party software to enable IG and records management features that provide industry leading compliance from within a system users can already understand.

article thumbnail

Data processors under the GDPR

Privacy and Cybersecurity Law

In our monthly GDPR Updates we discuss various key issues of the General Data Protection Regulation, (EU) 2016/679 (the GDPR), […].

GDPR 52
article thumbnail

UK Government Expected to Present Data Protection Bill in September 2017

Hunton Privacy

Media sources have reported that the UK Department for Culture, Media & Sport has confirmed its plans to present its Data Protection Bill to Parliament when MPs return to Parliament in early September. The Bill follows commitments made in the Queen’s Speech in June, and will effectively copy the EU General Data Protection Regulation (“GDPR”) into the UK statute book.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

One Way to Innovate

Getting Information Done

This was a guest blog post at Leaders Press On: I had dinner this summer with someone I respect as a thought leader and innovator. We had a great conversation and discussion about a new project I am working on to disrupt the traditional model for IT and Information Governance consulting. As we talked and bounced ideas off each other, an innovative creative synergy emerged that resulted in some new and novel ideas.

article thumbnail

Companies that share data can’t ignore governance

IBM Big Data Hub

Some people think of master data management (MDM) purely as a platform for organizing and mobilizing enterprise information. While this is true, leading companies view MDM more as a philosophy or a set of best practices, not just a suite of software tools.

MDM 72
article thumbnail

How to trace ransomware payments end-to-end - an overview

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.