September, 2017

article thumbnail

The case for delaying the date the GDPR applies for a couple more years

Data Protector

A huge percentage of the organisations I’ve recently come into contact with have little chance of becoming “GDPR compliant” by May 2018. To be fair, a good proportion of these organisations have spent the past decade or so ignoring the professional advice that's available on how to better comply with the requirements of the existing data protection legislation.

GDPR 149
article thumbnail

Is Your Information Governance Mostly Sound and Fury?

Weissman's World

“It is a tale told by an idiot, full of sound and fury, signifying nothing.” Shakespeare penned these words as a metaphor for life (Macbeth, Act V, Scene V), but they relate equally well to information governance in that organizations often spend more time arguing over the particulars than actually doing much about them. This […]. The post Is Your Information Governance Mostly Sound and Fury?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Exposing the inner-workings of the ransomware economy

Elie

This blog post shed light on the inner workings of the ransomsphere economics and exposes which cybercriminal groups are the biggest earners. This is the second blog post in my series about ransomware economics. The first post. is dedicated to the methodology and techniques needed to trace ransomware payments end-to-end. As this post builds on that methodology, I encourage you to read through the first post if you haven’t done so.

article thumbnail

Four space planning mistakes (and how to avoid them)

TAB OnRecord

How do we make the most effective use of space? This is a continual challenge for records managers, who are often under pressure to accommodate more documents in a fixed or shrinking storage footprint. When space becomes an issue, it is often the result of decisions or mistakes made a lot earlier. To help you… Read More. The post Four space planning mistakes (and how to avoid them) appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Tips for Reverse-Engineering Malicious Code

Lenny Zeltser

This cheat sheet outlines tips for reversing malicious Windows executables via static and dynamic code analysis with the help of a debugger and a disassembler. To print it, use the one-page PDF version; you can also edit the Word version to customize it for you own needs. Overview of the Code Analysis Process. Examine static properties of the Windows executable for initial assessment and triage.

Access 111

More Trending

article thumbnail

The future for “free” Subject Access Requests

Data Protector

Parliamentarians will soon be debating the merits of the Data Protection Bill, and I’m wondering whether much consideration will be given to the implications of the proposal to gift citizens with “free” Subject Access Requests. What parliamentarian might oppose such a measure? After all, what’s not to like about “free” stuff? But hang on a minute. This stuff is not “free”.

Access 120
article thumbnail

The Time is ‘Before’ to Cope with Hurricane-Related Storms of Forms

Weissman's World

Even though the physical storms are now largely scary, soggy memories, hurricanes Harvey and Irma will swamp many information professionals for months to come as a torrent of claim forms pours across their desks. Those who deal in paper will find themselves especially hard-pressed to keep up, not only because of the high volume of […]. The post The Time is ‘Before’ to Cope with Hurricane-Related Storms of Forms appeared first on Holly Group.

Paper 120
article thumbnail

When faster data science moves the world

IBM Big Data Hub

Learn how the IBM Integrated Analytics System, a unified data platform built on the IBM Common SQL Engine, helps do data science faster with high performance, embedded machine learning capabilities and built-in tools for data scientists to deliver analytics critical to increasing your organization’s competitiveness.

article thumbnail

How to reduce costs during a corporate file move

TAB OnRecord

Along with mergers and acquisitions, corporate moves are one of the biggest challenges a records management team can face. The thought of organizing, packing, and re-shelving entire record collections is one that sends a chill down the spine of most records managers. It's a good thing corporate moves don't come around that often! The silver… Read More.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

FAQ: Are text messages records? (redux)

The Texas Record

It’s been almost 6 years since we addressed this question originally. In that time, the popularity of text messaging (“texting”) has skyrocketed while awareness that text messages (“texts”) are potentially government records has increased very little. Here we go again! The definition of a government record in Texas is media neutral. A record is defined by its content, not what it’s recorded on.

article thumbnail

It’s one rule for big data, another for its victims | John Naughton

The Guardian Data Protection

The massive – and avoidable – data breach at credit agency Equifax has left millions of consumers at risk, but don’t expect anyone to be held to account Last week, much of the tech world was temporarily unhinged by a circus in Cupertino , where a group of ageing hipster billionaires unveiled some impressive technology while miming the argot of teenage fandom (incredible, amazing, awesome, etc) and pretending that they were changing the world.

article thumbnail

How many audit controls does an organisation need to establish to show that it takes data protection seriously?

Data Protector

Whenever I visit a clinic for a health check, I’m asked a slightly different set of questions. Each clinic is very professionally run, and, until recently I haven’t been unduly concerned that the same questions aren’t always asked. I’ve generally been healthy, so I guess there was never any real need for the medical profession to probe too deeply. So, why should I be worried about different questions being asked about data protection?

GDPR 120
article thumbnail

UK Government Introduces Draft Data Protection Bill to Parliament

Hunton Privacy

On September 14, 2017, the UK Government introduced a new Data Protection Bill (the “Bill”) to Parliament. The Bill is intended to replace the UK’s existing Data Protection Act 1998 and enshrine the EU General Data Protection Regulation (the “GDPR”) into UK law once the UK has left the European Union. The GDPR allows EU Member States to enact, via national law, exemptions from the various provisions of the GDPR, which the Bill also seeks to implement.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How to succeed in the multi-cloud era

IBM Big Data Hub

In a time when data is perhaps a business’s most valuable resource, the ability to access, protect and analyze information plays a critical role in an organization’s overall multi-cloud strategy. Here's how to succeed.

Cloud 101
article thumbnail

Mergers and acquisitions: How to take inventory of the target company’s records collections

TAB OnRecord

In last week’s blog post, we looked at a set of questions to help you evaluate the state of the RIM program in the target company involved in a merger or acquisition. The questions focused on assessing the current state of the program as well as any gaps or risks that might jeopardize the success… Read More. The post Mergers and acquisitions: How to take inventory of the target company’s records collections appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Court Imposes Adverse Inference for Failure to Preserve Non-Party’s Text Messages within Defendants’ “Control”

eDiscovery Law

Ronnie Van Zant, Inc. v. Pyle, No. 17 Civ. 3360 (RWS), 2017 WL 3721777 (S.D.N.Y. Aug. 28, 2017). In this case, the court imposed an adverse inference against certain defendants for their failure to preserve text messages in the possession of a non-party, where the court found that the defendants had control of the non-party’s text messages, citing the non-party’s close working relationship with the defendants, his prior participation in the litigation ( e.g. , by providing documents, etc.), and

article thumbnail

Getting your data out of Tinder is hard. It shouldn't be | Paul-Olivier Dehaye

The Guardian Data Protection

If you’re not a journalist or a privacy advocate, convincing big tech to release your data is almost impossible. But hope is coming with the EU’s General Data Protection Regulation I asked Tinder for my data. It sent me 800 pages of my deepest, darkest secrets When a journalist approached me to help her get a copy of her personal data from Tinder, I knew this would be a good story.

IT 87
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Scrutinising the Data Protection Bill: The case for a Keeling Schedule

Data Protector

Parliamentarians who are tasked with scrutinising the Data Protection Bill have an inenviable job. Can there be a less desirable appointment than siting on a Parliamentary Committee, scrutinising text that many seasoned data protection professionals have thrown their arms up in the air in despair over? Given that the Bill is intended to last a generation, (the current Act will have lasted 20 years by the time of its repeal) , surely we deserve something we can more readily understand.

article thumbnail

2016 Annual RM Report Released

National Archives Records Express

We are pleased to announce the publication of the National Archives and Records Administration’s Federal Agency Records Management Annual Report, 2016. . In 2016, we required Federal agencies to submit three reports: The annual Senior Agency Official for Records Management (SAORM) Report, the annual Records Management Self-Assessment (RMSA), and a supplemental Federal Email Management Report.

article thumbnail

Learning Machine Learning? Six articles you don’t want to miss

IBM Big Data Hub

Digital disruption has revolutionized the way we live and do business — and machine learning is the latest wave of that revolution.

111
111
article thumbnail

Reader favorites September 2017: Our most popular RIM resources

TAB OnRecord

The most popular RIM resources this month will help your efforts to go digital. Our buyer's guide helps you choose the best RIM software to capture and store your digital images. To help you plan the project, we have two helpful resources. The first is a comprehensive document imaging planning guide; the second is a… Read More. The post Reader favorites September 2017: Our most popular RIM resources appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Court: Production of Hard Copy Versions of Documents Also Kept As ESI Does Not “Run Afoul” of Rule 34

eDiscovery Law

Ortega v. Mgmt. & Training Corp., NO. 16-cv-0665 MV/SMV, 2017 WL 3588818 (D.N.M. Jan. 1, 2017). In this case, Plaintiff sought to compel native/electronic production of documents previously produced in hard copy. Defendant claimed that the documents in question were “ordinarily kept by Defendant both electronically and in hard copy” and produced only the hard copy format.

IT 58
article thumbnail

Charities need help to get to grips with data protection changes | Daniel Fluskey

The Guardian Data Protection

A fifth of charities haven’t yet started to think about the biggest change in years to data protection. We want the government to step in A worrying number of UK charities are yet to take any steps to prepare for the new UK law on data protection. Our survey of more than 300 UK charities shows that most are taking action to prepare for the new general data protection regulation (GDPR), which comes into effect in May 2018, with major new requirements for how organisations process personal data.

GDPR 79
article thumbnail

BMC Remedy vulnerabilities identified

Outpost24

BMC Remedy vulnerabilities identified. 19.Oct.2017. sdfsdfsdfsdfs. Thu, 09/07/2017 - 04:53. Simon Rawet and Kristian Varnai. Application security. Teaser. Security researchers from the Outpost24 SWAT team, Simon Rawet and Kristian Varnai, have identified and reported numerous vulnerabilities in BMC Remedy. The vulnerabilities range from relatively benign to full remote code execution without authentication.

article thumbnail

Hurricane Redux: Hurricane Maria Targets Puerto Rico, USVI, and Threatens Mainland U.S.

National Archives Records Express

As Hurricane Maria, now a Category 5 hurricane, bears down on Puerto Rico and U.S. Virgin Islands, before possibly turning northeast and threatening the east coast of the U.S, we again remind Agency Records Officers that NARA posts records emergency information and other useful guidance to pass along to other agency personnel. This information is also still relevant for any Federal agencies that experienced damage to their records as a result of Hurricanes Harvey and Irma.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Transforming a city with data and insight

IBM Big Data Hub

For the first time in human experience, there’s the opportunity to transform a city by listening to all of its inhabitants, individually. That’s the mission of the Jakarta Smart City (JSC) project, and it’s a major challenge in a district of some 10 million residents.

IT 92
article thumbnail

Progress on Draft ePrivacy Regulation – EU Council Publishes Proposed Amendments

Hunton Privacy

On September 8, 2017, the Council of the European Union published its proposed revisions to the draft E-Privacy Regulation (“EPR”), which was first published by the European Commission in January 2016. The revisions have been made based on written comments and discussions involving the Working Party for Telecommunications and Information Society (“WP TELE”) and serve as a discussion for further meetings of the group in late September 2017.

Paper 56
article thumbnail

Canada’s Privacy Commissioner Pursues a Stronger Consent Framework and More Proactive Enforcement

Privacy and Cybersecurity Law

On September 21st, 2017, Daniel Therrien, Canada’s Federal Privacy Commissioner, tabled his annual report to Canada’s Parliament today. The report […].

Privacy 52