June, 2017

article thumbnail

Governance is Always Never Having to Say You’re Sorry

Weissman's World

There’s a disturbing trend in the information governance profession that needs to stop now, namely the tendency to apologize for the work we’re doing. “Let me email that document to you.” – “I’m sorry, but please paste in the link to the digital document instead.” “I need to make a copy of this for my […]. The post Governance is <del>Always</del> Never Having to Say You’re Sorry appeared first on Holly Group.

article thumbnail

Washington Becomes Third State to Enact Biometric Privacy Law

Hunton Privacy

On May 16, 2017, the Governor of the State of Washington, Jay Inslee, signed into law House Bill 1493 (“H.B. 1493”), which sets forth requirements for businesses who collect and use biometric identifiers for commercial purposes. The law will become effective on July 23, 2017. With the enactment of H.B. 1493, Washington becomes the third state to pass legislation regulating the commercial use of biometric identifiers.

Privacy 87
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What You Need to Know About Voice Hacking

Productivity Bytes

As technology advances, more weaknesses and vulnerabilities appear that hackers can use to take advantage of their victims, like phishing, voice hacking and more. Identity theft is one of the most damaging forms of cybercrime, and voice hacking is a subset of that. This kind of attack involves collecting or stealing audio samples that can … + Read More.

article thumbnail

Password Management

PerezBox

The year is 2017 and we continue to give advice on the process of creating passwords. This must stop. The phrase “These are the tips to creating a secure password” Read More. The post Password Management appeared first on PerezBox.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

What do the Mirai botnet, the WannaCry ransomware blitz, and the EternalRocks worm have in common?

Outpost24

All of these attacks have similarities in terms of attack strategies, and a shift in focus to operational business disruption vs. data theft as the goal or leverage for monetizing the attack. First, the Mirai botnet, in late 2016, affected internet access for some hundreds of thousands of systems. The attack vector focused on home consumer devices, items that typically aren’t really configured securely, or administrated professionally.

More Trending

article thumbnail

5 Steps to Information Governance Success

Weissman's World

To hear some people tell it, the future of information governance is a complex, frightening place to ponder. The volume of information we have to deal with is exploding, the mix of technologies we need to keep track of is changing, and just what do we call all this, anyway?! Well, I have good news: […]. The post 5 Steps to Information Governance Success appeared first on Holly Group.

article thumbnail

Germany Issues Ethics Report on Automated and Connected Cars

Hunton Privacy

On June 20, 2017, the German Federal Ministry of Transport and Digital Infrastructure issued a report on the ethics of Automated and Connected Cars (the “Report”). The Report was developed by a multidisciplinary Ethics Commission established in September 2016 for the purpose of developing essential ethical guidelines for the use of automated and connected cars.

Privacy 66
article thumbnail

Uber Does Not Equal The Valley

John Battelle's Searchblog

The post Uber Does Not Equal The Valley appeared first on John Battelle's Search Blog. Now that the other shoe has dropped, and Uber’s CEO has been (somewhat) restrained, it’s time for the schadenfreude. Given Uber’s remarkable string of screwups and controversies, it’s coming in thick , in particular from the East coast. And while I believe Uber deserves the scrutiny — there are certainly critical lessons to be learned — the hot takes from many media outlets are starting to get lazy.

IT 55
article thumbnail

What’s It Like to Join a Startup’s Executive Team?

Lenny Zeltser

Startups are the innovation engine of the high-tech industry. Those who’ve participated in them have experienced the thrill and at times the disappointment of navigating uncharted territories of new ideas. Others have benefited from the fruits of these risk-takers’ labor by using the products they created. What’s it like to contribute at an early stage of a startup?

IT 53
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Establish a Personal Brand

PerezBox

It’s only recently that I have grown a deeper appreciation for personal brands. Prior to 2010, the idea of establishing a personal brand was a foreign concept to me. In. Read More. The post Establish a Personal Brand appeared first on PerezBox.

Sales 53
article thumbnail

Understanding the prevalence of web traffic interception

Elie

This post summarizes how prevalent encrypted web traffic interception is and how it negatively affects online security according to a study we published at NDSS 2017.

article thumbnail

If It Ain’t Broke, Fix it Anyway

Weissman's World

When speaking of technology and information governance, we often are told that “if it ain’t broke, don’t fix it” – or in other words, don’t go looking for trouble where there isn’t any. But when it comes to disaster recovery and, especially, continuity of operations, I vehemently disagree. These two disciplines exist specifically to ensure […].

IT 120
article thumbnail

CIPL Issues Recommendations for Implementing Transparency, Consent and Legitimate Interest under the GDPR

Hunton Privacy

Recently, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP issued a white paper on Recommendations for Implementing Transparency, Consent and Legitimate Interest under the GDPR (the “White Paper”). The White Paper sets forth guidance and recommendations on the key concepts of transparency, consent and legitimate interest under the EU General Data Protection Regulation (“GDPR”).

GDPR 63
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Considerations for ERM Implementations

JKevinParker

On 5/17/2017 I presented to the Northern Virginia Chapter of ARMA on "Considerations for ERM Implementations". I created this talk with all the highlights I would make if I had only one shot to provide some lessons learned on ERM solution projects. Records Management is an essential component of every organization's Information Management capabilities.

article thumbnail

Adopting instant payments doesn’t have to disrupt everything

CGI

Adopting instant payments doesn’t have to disrupt everything. shobana.lv@cgi.com. Fri, 06/30/2017 - 03:41. The world is moving to instant everything. In the payments arena, this means that the old world of multi-day or multi-intraday payment clearing is disappearing forever. This is great news for the consumer, but a major challenge for the bank, requiring expensive accommodation as part of an already crowded change agenda.

Access 45
article thumbnail

Petya Ransomware: What You Need to Know and Do

Andrew Hay

By: Andrew Hay. Unless you’ve been away from the Internet earlier this week, you’ve no doubt heard by now about the global ransomware outbreak that started in Ukraine and subsequently spread West across Western Europe, North America, and Australia yesterday. With similarities reminiscent to its predecessor WannaCry, this ransomware attack shut down organizations ranging from the Danish shipping conglomerate Maersk Line to a Tasmanian-based Cadbury chocolate factory.

article thumbnail

Records Management Outreach to Elementary Schools and Colleges

The Schedule

It all started in the beginning of the year. My school sent out a call to parents and guardians to see who would be interested in coming to our school’s career day. Guest speakers were sought to provide students with meaningful experiences that motivate and promote career/college readiness. There had already been curiosity centering on the media center.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Relevancy – the killer app

Attensa

In his book The New Know: Innovation Powered by Analytics, Thornton May explores the consequences of living and and business in the era of information abundance. His perspective is summarized in pdf of of the first chapter. I have written and spoken about the impact of information abundance for many years. By itself, info abundance is simply a positive spin on information overload.

article thumbnail

European Commission Pushes for Greater EU Role in Cybersecurity

Hunton Privacy

On June 7, 2017, the European Commission published a paper signalling the EU’s intention to increase its role in directing cybersecurity policy and responses across its member states. The increasing threat posed by cyber attacks is highlighted in the EU Commission’s Reflection Paper on the Future of European Defence , which builds its case for closer union in respect of defense efforts.

article thumbnail

Delta’s RFID baggage initiative wins industry award

RFID Global Solution, Inc.

By Ashton Morrow, Delta Airlines, June 6, 2017. Delta was honored with the Best Radio Frequency Identification Technology (RFID) Implementation award from RFID Journal in May. This award recognizes the airline’s industry-leading baggage handling strategy. It uses RFID chips embedded in individual bag tags to gather information throughout the bag’s journey, giving customers more transparency and reducing the number of mishandled bags. “It’s an incredible honor that Delta&

IT 45
article thumbnail

CASL Private Right of Action Delayed (Indefinitely)

Privacy and Cybersecurity Law

The Government of Canada has repealed the coming into force of the private right of action for violations of Canada’s Anti-Spam Legislation (CASL). The Government has listened to concerns raised by businesses, charities and the not-for-profit sector about the implementation of CASL, which would have permitted individuals to sue for violations of the law.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

How to set up your multi-source integrator (MSI) for success

CGI

How to set up your multi-source integrator (MSI) for success. shobana.lv@cgi.com. Wed, 06/28/2017 - 02:53. As IT delivery evolves from an on-premises model to a hybrid model combining cloud and traditional IT, organizations are using a variety of sourcing approaches, from full outsourcing to multisourcing to brokerage. In my previous blog— Four things to look for in a multi-source services integrator (MSI) —I shared essential criteria to use when choosing an integrator for a multi-source IT serv

article thumbnail

Why ForAllSecure Is On MIT Technology Review's 2017 List Of Smartest Companies

ForAllSecure

I am honored to share that ForAllSecure has been named to MIT Technology Review’s 2017 list of 50 Smartest Companies. According to the MIT Tech Review team, to make the list, a company must exhibit technological leadership and business acumen, which set them apart from competitors. Nanette Byrnes, senior editor for MIT Tech Review business shared: “Public and private, large and small, based in countries around the globe, this group of companies is creating new opportunities and pounc

article thumbnail

Digital preservation high on the agenda at recent Information Governance and Records Management conferences

Preservica

How to protect and ensure the availability of long-term digital business information was a hot topic of conversation at three events Preservica attended in May. This theme is a clear reflection of the IGI 2017 Benchmark research, which revealed that 80% of companies aim to realize direct business value from their long-term digital information. The research validated that nearly all (90%) organizations must preserve and protect their vital information to meet with legal, statutory and regulatory

article thumbnail

Ransomware Health Data Breach Affects 500,000 Patients

Hunton Privacy

On June 26, 2017, Airway Oxygen, a provider of oxygen therapy and home medical equipment, reported that it was the subject of a ransomware attack affecting 500,000 patients’ protected health information. The attack is the second largest health data breach recorded by the Office for Civil Rights (“OCR”) this year, and the largest ransomware incident recorded by OCR since it began tracking incidents in 2009.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Improving the Travel Experience

RFID Global Solution, Inc.

By Diana Hage Delta’s announcement of its rollout of RFID for passenger baggage handling is aimed squarely at improving the customer experience of its travelers. Delta aims to reliably deliver every bag on every flight. By providing customers with improved real-time tracking of luggage throughout the travel experience, it will provide peace of mind, convenience, … Improving the Travel Experience Read More ».

article thumbnail

More but not better jobs

MIKE 2.0

The future of work is the topic on everyone’s lips. We’ve gone from worrying about whether our children will have jobs to worrying about our own place in the workforce. The rise of artificial intelligence and robotics has been at the upper end of twenty first century predictions. Everyone wants to know whether automation will trigger a massive cut in jobs.

article thumbnail

New CGI-sponsored research covers key trends and issues in adopting instant payments

CGI

New CGI-sponsored research covers key trends and issues in adopting instant payments. harini.kottees…. Fri, 06/23/2017 - 07:27. Every year at CGI, we conduct research on the services banks offer their customers—whether consumers or corporates—comparing the customer’s perspective with that of the bank. This year, we sponsored additional research focused specifically on payments.