October, 2017

article thumbnail

Briefing paper to Peers in advance of the Committee Stage of the Data Protection Bill in the House of Lords [30 October 2017]

Data Protector

Your Lordships This bill has been eagerly awaited by data protection professionals, whose careers depend on its successful passage. Please don’t worry too much that the bill is so very hard to understand. It's the Government’s way of ensuring that a select band of privacy professionals will be offered very significant salaries to decipher its contents and recommend ways of complying with the key provisions.

Paper 120
article thumbnail

Testing Security Keys

Imperial Violet

Last time I reviewed various security keys at a fairly superficial level: basic function, physical characteristics etc. This post considers lower-level behaviour. Security Keys implement the FIDO U2F spec , which borrows a lot from ISO 7816-4. Each possible transport (i.e. USB, NFC, or Bluetooth) has its own spec for how to encapsulate the U2F messages over that transport (e.g. here's the USB one ).

Security 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why we need a 21st-century Martin Luther to challenge the church of tech

The Guardian Data Protection

It’s 500 years since Martin Luther defied the authority of the Catholic church. It’s time for a similar revolt against the hypocrisy of the religion of technology A new power is loose in the world. It is nowhere and yet it’s everywhere. It knows everything about us – our movements, our thoughts, our desires, our fears, our secrets, who our friends are, our financial status, even how well we sleep at night.

IT 111
article thumbnail

What Would It Look Like If We Put Warnings on IoT Devices Like We Do Cigarette Packets?

Troy Hunt

A couple of years ago, I was heavily involved in analysing and reporting on the massive VTech hack , the one where millions of records were exposed including kids' names, genders, ages, photos and the relationship to parents' records which included their home address. Part of this data was collected via an IoT device called the InnoTab which is a wifi connected tablet designed for young kids; think Fisher Price designing an iPad. then totally screwing up the security.

IoT 111
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Guest Post - How important is digital document consistency?

AIIM

A repository containing documents that were digitized inconsistently or inaccurately presents a new set of problems for an organization, problems that can hinder the productivity gains they had hoped to achieve. Obviously digital document accuracy is particularly important for government and regulated industries. But any organization can benefit from a consistent and accurate document repository; it saves time and frustration for users when searching or retrieving documents.

More Trending

article thumbnail

CaboPress – A Business MasterMind (I Think)

PerezBox

For the past three years Chris Lema has invited me to join him at his event – CaboPress. For three years I have declined the request. I declined previously for. Read More. The post CaboPress – A Business MasterMind (I Think) appeared first on PerezBox.

89
article thumbnail

Can data governance create user satisfaction?

IBM Big Data Hub

Companies have a choice when it comes to their strategy for data governance. Aberdeen research shows that it can be onerous and bureaucratic, or it can be liberating and empowering.

article thumbnail

'All wifi networks' are vulnerable to hacking, security expert discovers

The Guardian Data Protection

WPA2 protocol used by vast majority of wifi connections has been broken by Belgian researchers, highlighting potential for internet traffic to be exposed The security protocol used to protect the vast majority of wifi connections has been broken, potentially exposing wireless internet traffic to malicious eavesdroppers and attacks, according to the researcher who discovered the weakness.

Security 112
article thumbnail

Disqus Demonstrates How to Do Breach Disclosure Right

Troy Hunt

We all jumped on "the Equifax dumpster fire bandwagon" recently and pointed to all the things that went fundamentally wrong with their disclosure process. But it's equally important that we acknowledge exemplary handling of data breaches when they occur because that's behaviour that should be encouraged. Last week, someone reached out and shared a number of data breaches with me.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Rethinking the Intersection of People, Process and Technology

AIIM

Organizations have long struggled with the magic “triad” of people, processes and technology. This struggle has remained constant through multiple generations of technology – from paper to microfilm to imaging to document management to enterprise content management. In order to understand what is coming next for content management, we need a clear understanding of where we’ve been.

ECM 83
article thumbnail

Project spotlight: Freeing up space at Banner Life Insurance Company

TAB OnRecord

If you could use your space to help generate revenue instead of storing files, would you? Of course you would. It’s often a space shortage that forces companies to take a hard look at how they store files—and most of them can realize significant efficiencies and free up square footage by rethinking that storage. Banner… Read More. The post Project spotlight: Freeing up space at Banner Life Insurance Company appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Profile of the Month: Derek Tumulak, Global Vice President of Product Management

Thales Cloud Protection & Licensing

Since the early days of his career as a software developer, Derek Tumulak has had a fascination with building things – a skill that has served him well throughout his career in the technology industry. He began his professional path at the tech giants of Microsoft and Netscape. He was a software developer, striving to find “elegant ways to solve complex problems,” he says.

article thumbnail

First-ever IBM Analytics University empowers data transformation

IBM Big Data Hub

If you’re holding an event for the very first time, what helps you gauge its success? At IBM Analytics University, we turned to social media analytics. Here’s a summary of what we learned from the experts and from Watson Analytics for Social Media.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Let’s take back control of our data – it’s too precious to leave to the tech giants | Ravi Naik

The Guardian Data Protection

Everything we do online leaves a trail. To hold power to account in the digital age, what is required is nothing less than a new civil rights movement “Your legal concepts of property, expression, identity, movement, and context do not apply to us.” Thus, in 1996, John Perry Barlow laid out his manifesto, the Declaration of the Independence of Cyberspace , in which he encapsulated a philosophy flowing through the heart of worldwide web.

IT 91
article thumbnail

The 6-Step "Happy Path" to HTTPS

Troy Hunt

It's finally time: it's time the pendulum swings further towards the "secure by default" end of the scale than what it ever has before. At least insofar as securing web traffic goes because as of this week's Chrome 62's launch, any website with an input box is now doing this when served over an insecure connection: It's not doing it immediately for everyone , but don't worry, it's coming very soon even if it hasn't yet arrived for you personally and it's going to take many people by surp

Security 102
article thumbnail

Gimmal Workplace Compliance Now Includes In-Place Policy Management

Gimmal

Today, we're excited to launch a new version of Gimmal Workplace Compliance ! Our flagship solution now includes new federated policy management features for high volumes of content – keeping information "in place" in the business system where it resides.

article thumbnail

How to manage inactive records collections

TAB OnRecord

Inactive records management is an important component of a complete RIM program. At some point, space limitations and growing record volumes force organizations to deal with documents that aren't used very often. The most common approach is to send inactive files to an offsite storage environment, which frees up room for business operations and for… Read More.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

When Encryption Meets Flash Arrays

Thales Cloud Protection & Licensing

Cyberattacks continue to grow more sophisticated and persistent. To combat threats and keep data safe, IT teams must employ robust encryption, key management, and access controls. This is especially true for information held in storage environments, which can contain an organization’s most vital assets. To secure storage, many organizations have been leveraging native encryption offerings from their storage vendors.

article thumbnail

Picking a data management solution just got easier

IBM Big Data Hub

Organizations are collecting terabytes of data, so it’s not surprising that organizations are scrambling to identify a data management solution that fits their unique environment. The freedom of choosing the right data source to fit an organization’s data storage strategy is the key to robust data management process.

71
article thumbnail

UK spy agencies may be circumventing data-sharing law, tribunal told

The Guardian Data Protection

Challenge brought by Privacy International alleges MI5 and MI6 data-sharing regimes and legal oversight system are illegal MI5 and MI6 may be circumventing legal safeguards when they share bulk datasets with foreign intelligence services and commercial partners, a court has been told. Most of the bulk personal datasets relate to UK citizens who are not of “legitimate intelligence interest”, the investigatory powers tribunal (IPT) heard.

article thumbnail

Article 29 Working Party Publishes Draft Guidelines on Notification of Personal Data Breaches Notification Under the GDPR

Data Matters

On October 3, 2017, the Article 29 Working Party (“ WP29 ”) adopted draft guidelines regarding notification of personal data breaches under the EU’s General Data Protection Regulation (“ GDPR ”) which will require breach notification within 72 hours of awareness of a breach. (“ Draft Guidelines ”) (The Draft Guidelines appear to have been released for public comment during the week of 16th October).

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

AI, IG and what it all means: Our Interview with Reid Smith

Gimmal

Recently, Gimmal interviewed Reid Smith, co-founder and CEO at i2k Connect. The mission of i2k Connect is to revolutionize information discovery using its novel artificial intelligence (AI) technology, informed by industry knowledge, to transform unstructured documents into structured data.

article thumbnail

Reader favorites October 2017: Our most popular RIM resources

TAB OnRecord

The most popular RIM resources this month cover several hot records management topics. Our free guide provides tips to save money with your records management program. Our popular white paper on records retention is a handy reference for every RIM professional designing a records management program. For records management environments that include paper and electronic… Read More.

article thumbnail

Irish High Court Refers Standard Contractual Clauses Challenge to CJEU

Hunton Privacy

On October 3, 2017, the Irish High Court referred a legal challenge to the validity of the EU Standard Contractual Clauses (“SCCs”) to the Court of Justice of the European Union (“CJEU”) for resolution. Max Schrems, who had previously successfully challenged the validity of the now defunct U.S.-EU Safe Harbor Program in the Schrems case, had brought a similar claim in relation to the SCCs, and had requested that the Irish Data Protection Commissioner (“DPC”) declare that the SCCs do not provide

article thumbnail

Three “must-have” capabilities to unify data governance

IBM Big Data Hub

Today’s most successful companies think differently about data governance. Recent Aberdeen research suggests that top-performing companies are those that create a more holistic approach to data governance, incorporating the right technologies, processes, skill sets and internal capabilities.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Kaspersky Lab denies involvement in Russian hack of NSA contractor

The Guardian Data Protection

Eugene Kaspersky, the founder of the Moscow-based cybersecurity firm, called allegations of role in government hack ‘like the script of a C movie’ Moscow-based cybersecurity firm Kaspersky Lab has hit back at a report in the Wall Street Journal which accused it of being involved in a Russian government hack of an NSA contractor in 2015. The paper reported on Thursday that the NSA contractor, a Vietnamese national who was working to create replacements for the hacking tools leaked by Edward Snowd

Paper 81
article thumbnail

When And How Cos. Should Address Cyber Legal Compliance

Data Matters

*This post originally appeared in Law 360 on October 24, 2017. We’ve seen it happen time and again. When a company experiences a major data breach or hacking incident, media attention turns to speculation or allegations about the company’s past history of underinvesting in cyber defenses, its supposed culture of cyber complacency, or its history of unaddressed (but, in retrospect, allegedly clear) vulnerabilities.

article thumbnail

To Bucket or Not to Bucket…?

The Texas Record

There is a term in records management circles you might have heard of called “big buckets.” Have you ever stopped and thought, “What is this? Should I be doing this? Am I missing out on something?” (Coincidentally, there’s the pop culture acronym F.O.M.O. which stands for “fear of missing out” that comes to mind.