July, 2017

article thumbnail

How to Deploy Your Own Algo VPN Server in the DigitalOcean Cloud

Lenny Zeltser

When analyzing malware or performing other security research, it’s often useful to tunnel connections through a VPN in a public cloud. This approach helps conceal the analyst’s origin, contributing to OPSEC when interacting with malicious infrastructure. Moreover, by using VPN exit nodes in different cities and even countries, the researcher can explore the target from multiple geographic vantage points, which sometimes yields additional findings.

Cloud 111
article thumbnail

Understanding how people use private browsing

Elie

This post looks at how and why people are using the private browsing mode. Private Browsing. , also known as. InPrivate. in Internet Explorer and. Incognito mode. in Google Chrome, is a special mode where the browser doesn’t record the browsing activity on the local device. The promise made to the user is that when the private windows are closed, no trace will be left on the computer.

Paper 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Get five helpful RIM guides in TAB’s latest resource booklet

TAB OnRecord

TAB recently published a booklet containing several helpful resources relating to records and information management. In one convenient PDF document, this booklet covers several pressing topics, including: how to implement RIM software, document imaging, and mergers and acquisitions. You can download the booklet here. Here is a run-down of what you will find in the… Read More.

article thumbnail

Article 29 Working Party Releases Opinion on Data Processing at Work

Hunton Privacy

The Article 29 Working Party (“Working Party”) recently issued its Opinion on data processing at work (the “Opinion”). The Opinion, which complements the Working Party’s previous Opinion 08/2001 on the processing of personal data in the employment context and Working document on the surveillance of electronic communications in the workplace, seeks to provide guidance on balancing employee privacy expectations in the workplace with employers’ legitimate interests in processing employee data.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

“No Harm, No Foul”: Court Denies Motion for Spoliation Sanctions Pursuant to Rule 37(e)

eDiscovery Law

Snider v. Danfoss, LLC, 15 CV 4748, 2017 WL 2973464 (N.D. Ill. July 12, 2017). In this case, the court addressed Plaintiff’s request for sanctions for Defendant’s failure to preserve emails and, concluding the information did “not appear to be relevant” and that Plaintiff was not prejudiced, denied Plaintiff’s motion for sanctions: Federal Rule of Civil Procedure 37(e) incorporates the long-standing legal principle embodied in the phrase used on basketball courts everyday across the countr

IT 58

More Trending

article thumbnail

HHS Issues Quick Response Cyber Attack Checklist

Privacy and Cybersecurity Law

Last month, after the WannaCry ransomware attack infected 230,000 computers in 150 countries, the US Department of Health and Human […].

article thumbnail

Attacking encrypted USB keys the hard(ware) way

Elie

Ever wondered if your new shiny AES hardware-encrypted USB device really encrypts your data - or is just a fluke? If you have, come to our talk to find out if those products live up to the hype and hear about the results of the audit we conducted on multiples USB keys and hard drives that claim to securely encrypt data. In this talk, we will present our methodology to assess "secure" USB devices both from the software and the hardware perspectives.

article thumbnail

Red Teaming Your Information Governance Program

Brandeis Records Manager

George Despres, CRM. Program Director for University Records Management, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). About Red Teaming. Have you deliberately challenged your own program plans and procedures recently? With a book on the topic, Bryce Hoffman defines red teaming as: “ a… way to stress-test strategies, flush out unseen threats and missed opportunities, and execute more successfully….

article thumbnail

Belgian Privacy Commission Issues Recommendation on Internal Records Under the GDPR

Hunton Privacy

This post has been updated. . The Belgian Privacy Commission (the “Belgian DPA”) recently released a Recommendation (in French and Dutch ) regarding the requirement to maintain internal records of data processing activities (the “Recommendation”) pursuant to Article 30 of the EU General Data Protection Regulation (“GDPR”). The Recommendation aims to provide guidance to data controllers and data processors in establishing and maintaining internal records by May 25, 2018.

GDPR 58
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Fun and Interactive Ways to Raise Awareness about the GDPR within your Organisation

Archive Document Data Storage

Education, education, education. Yes, educating staff about the GDPR and raising awareness is the all-important step that will unite your organisation and team members in the GDPR fight for survival! The key is to get everyone on board, from the company directors all the way through to your suppliers or any party with a valued interest in your organisation.

GDPR 45
article thumbnail

Court Compels Production of Documents Withheld as Nonresponsive, Orders Requesting Party to Bear Costs of Re-Review

eDiscovery Law

Nachurs Alpine Sols. Corp. v. Banks, No. 15-CV-4015-LTS, 2017 WL 2918979 (N.D. Iowa July 7, 2017). In this case, Defendants identified a number of potentially responsive documents by conducting a search with court-approved terms. Upon review of those documents, many were withheld from production as nonresponsive. When Plaintiff sought to compel production of additional documents it suspected were relevant, the court granted the request, but shifted the burden of reviewing the withheld documents

IT 45
article thumbnail

Insurers’ top trends and priorities: A look at CGI’s 2017 Voice of Our Clients findings (part 1)

CGI

Insurers’ top trends and priorities: A look at CGI’s 2017 Voice of Our Clients findings (part 1). harini.kottees…. Mon, 07/31/2017 - 05:30. Every year, CGI meets in-person with clients across the globe to get a pulse on their top trends and priorities to understand their challenges and opportunities, especially as the urgency to become digital organizations continues to accelerate across industries.

article thumbnail

How we created the first SHA-1 collision and what it means for hash security

Elie

In February 2017, we announced the first SHA-1 collision. This collision combined with a clever use of the PDF format allows attackers to forge PDF pairs that have identical SHA-1 hashes and yet display different content. This attack is the result of over two years of intense research. It took 6500 CPU years and 110 GPU years of computations which is still 100,000 times faster than a brute-force attack.

IT 63
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Defence as the best form of attack

MIKE 2.0

The global economy is powered by business innovation with small and large organisations alike inventing the future for us all. The rapid rate of change brings both opportunities and threats with recent cyber events acting as a wake-up call. Far from being afraid, we should be reminded that we need to design businesses to operate and even thrive in unexpected circumstances.

article thumbnail

CNIL Fines Rental Car Company for Data Security Failure Attributable to Third-Party Service Provider

Hunton Privacy

On July 27, 2017, the French Data Protection Authority (“CNIL”) imposed a fine of €40,000 on a French affiliate of the rental car company, The Hertz Corporation, for failure to ensure the security of website users’ personal data. On October 15, 2016, the CNIL was informed of the existence of a security incident which resulted in the compromise of personal data on a French website related to Hertz France’s discount program.

article thumbnail

Why we need long-term thinking for long-term records

Preservica

Regardless of the sector you work in, there’s a tendency for users and managers to focus exclusively on the short-term. This sometimes means that we lose opportunities to act in our long-term interest. Here’s why we need to think long-term and take action to protect critical digital records: Maintaining perspective. As records management professionals, we’re still fighting the thorny issue of getting people to pay attention in the normal course of business operations to records that need care an

article thumbnail

US Coast Guard Releases Draft Cybersecurity Guidelines

Data Protection Report

On July 11, 2017, the US Coast Guard (USCG) and the Department of Homeland Security (DHS) proposed new cybersecurity draft guidelines for Maritime Transportation Security Act (MTSA) regulated facilities. The guidelines follow the White House’s May 2017 Executive Order to strengthen the cybersecurity of critical infrastructure. The draft guidelines are open for public comment until September 11, 2017.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Digitisation: Driving better user experiences of the justice system

CGI

Digitisation: Driving better user experiences of the justice system. ravi.kumarv@cgi.com. Tue, 07/18/2017 - 03:00. The Police Foundation, the UK’s only independent think tank to concentrate exclusively on policing and crime reduction, is working with CGI to investigate the transformative potential of digital in the justice system, and above all to consider how digital can change the experience of witnesses, victims and the public for the better.

article thumbnail

Tracking desktop ransomware payments end to end

Elie

A niche term just two years ago, ransomware has rapidly risen to fame in the last year, infecting hundreds of thousands of users, locking their documents, and demanding hefty ransoms to get them back. In doing so, it has become one of the largest cybercrime revenue sources, with heavy reliance on Bitcoins and Tor to confound the money trail. In this talk, we demonstrate a method to track the ransomware ecosystem at scale, from distribution sites to the cash-out points.

article thumbnail

RFID Market – Global Forecast to 2023

RFID Global Solution, Inc.

MarketsandMarkets June 2017 Driven by lower prices of radio-frequency identification (RFID) tags, and increasing penetration of RFID technology in various industries, the RFID market is likely to witness high growth in coming years. The RFID market was valued at USD 16.95 Billion in 2016 and is expected to grow at a CAGR of 7.7% between … RFID Market – Global Forecast to 2023 Read More ».

article thumbnail

CJEU Declares Envisaged EU-Canada Data Transfer Agreement Incompatible with EU Law

Hunton Privacy

On July 26, 2017, the Court of Justice of the European Union (“CJEU”) declared that the envisaged EU-Canada agreement on the transfer of Passenger Name Records (“PNR Agreement”) interferes with the fundamental right to respect for private life and the right to the protection of personal data and is therefore incompatible with EU law in its current form.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Request for information: RM bibliography

The Schedule

As Beth Cron posted last December , the Records Management Section steering committee has been working to update the Records and Information Bibliography that was first published in 2008. We chose to make this new version accessible through Zotero so it can be more dynamic and collaborative. This is where you come in: we’d like to invite volunteers who can assist us with revisions.

article thumbnail

Hong Kong Company Director Convicted Under Personal Data (Privacy) Ordinance

Data Protection Report

A director of a Hong Kong company has been convicted of an offence under the Personal Data (Privacy) Ordinance (“PDPO”). This is the first conviction of its type under the PDPO since the law came into effect in 1996, confirming the potential for directors’ liability under the law. In this case , a director of an employment agency failed to comply with a summons issued by the Office of the Privacy Commissioner (“PCPD”) to provide information requested by the PCPD in the context of an investigatio

article thumbnail

How change management can improve decision-making

CGI

How change management can improve decision-making. harini.kottees…. Tue, 07/18/2017 - 06:00. Behavioral science in business applications is a fascinating topic. In his book “The Undoing Project,” Michael Lewis describes behavioral economics and how even the best experts’ decision-making is not as accurate as predictive modeling or analytics. He cites an Oregon Research Institute study where radiologists were consulted on the best methods to make an accurate clinical diagnosis of stomach cancer.

article thumbnail

Understanding how people use private browsing

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

RFID Market – Global Forecast to 2023

RFID Global Solution, Inc.

MarketsandMarkets. June 2017. Driven by lower prices of radio-frequency identification (RFID) tags, and increasing penetration of RFID technology in various industries, the RFID market is likely to witness high growth in coming years. The RFID market was valued at USD 16.95 Billion in 2016 and is expected to grow at a CAGR of 7.7% between 2017 and 2023.

article thumbnail

Singapore Submits Notice of Intent to Join the APEC CBPR and PRP Systems

Hunton Privacy

On July 27, 2017, Singapore submitted its notice of intent to join the APEC Cross-Border Privacy Rules (“CBPR”) system and the APEC Privacy Recognition for Processors System (“PRP”). Singapore would be the sixth member of the CBPR system, joining Canada, Japan, Mexico, the United States and the newest member, South Korea. The announcement was made by Dr.

Privacy 45
article thumbnail

Content Cleanup and Migration Planning

JKevinParker

When planning a new content management system, you almost always have to plan for content migration. It doesn't matter if you are working with enterprise content, records, knowledge, data, or even web content. Migration means moving content from a source to a destination. Often it is from multiple sources to at least one destination. Here are some important considerations: If there are any information architecture changes required, the migration will be more complex than a simple "lift and shift

Cleanup 40