October, 2016

article thumbnail

My 7 top security publications from the ICO

Data Protector

Given what can only be described as an omnishambles of security breaches, is there much more that the ICO can do to warn data controllers of the risks they should take account of? Probably not. What might be helpful though, is data controllers refreshing their memories about the guidance which has emerged from the ICO over the past few years. In terms of the top 7 ICO publications, (virtual) copies of the following guides really ought to be at every DPO’s fingertips: 7.

Security 120
article thumbnail

Google Capitulates to Facebook’s Identity Machine: Is This Good News For The Open Web?

John Battelle's Searchblog

The post Google Capitulates to Facebook’s Identity Machine: Is This Good News For The Open Web? appeared first on John Battelle's Search Blog. Long time readers of this site know that once a year I make predictions, and revisit those I made the year before. But it’s not often I look back farther than one year to see if perhaps I was just a tad too early.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IoT's moment of truth -- who can secure the data flows?

Collaboration 2.0

Innovative Internet of Things efforts need the maturity and experience of industrial internet service providers to secure data platforms and drive growth.

IoT 110
article thumbnail

Federal Regulators Propose New Cybersecurity Rule for Big Banks

Hunton Privacy

On October 19, 2016, the Federal Deposit Insurance Corporation (“FDIC”), the Federal Reserve System (the “Fed”) and Office of the Comptroller of the Currency issued an advance notice of proposed rulemaking suggesting new cybersecurity regulations for banks with assets totaling more than $50 billion (the “Proposed Standards”). The Proposed Standards address five categories of cybersecurity: cyber risk governance; cyber risk management; internal dependency management; external dependency managemen

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Defense in Depth And Website Security

PerezBox

The concept of Defense in Depth is not new. It’s been leveraged in the InfoSec domain for a long time, and has it’s roots deeply embedded in military strategy and. Read More. The post Defense in Depth And Website Security appeared first on PerezBox.

More Trending

article thumbnail

In celebration of American Archives Month

Preservica

The month of October marks American Archives Month (#AmericanArchivesMonth) across the US that recognizes the collaborative efforts of archiving professionals and repositories across North America, highlighting the importance of preserving historic records for generations to come. Throughout October, events will take place across the US to celebrate the unique and valuable collections stored in archives.

article thumbnail

Customer enablement and mobility: How consumers are driving digital transformation within the utilities industry

CGI

Customer enablement and mobility: How consumers are driving digital transformation within the utilities industry. shobana.lv@cgi.com. Thu, 10/20/2016 - 08:06. The digital transformation of personal entertainment and communications has made consumers increasingly comfortable with digital tools and platforms. To the consumer, it’s iTunes Match, Google Drive, Apple TV and Pokemon GO.

article thumbnail

2016 InfoGov Expert of the Year Award

JKevinParker

See also: My Reflections on the 2016 InfoGovCon. I was honored at the 2016 Information Governance Conference to be named InfoGov Expert of the Year. This award is for "an Information Governance leader who has demonstrated leading expertise in 2016." Thank you so much to all who voted for me this year! Thank you also to Information Coalition and InfoGovCon.

article thumbnail

Department of Defense Finalizes Rule for Cyber Incident Reporting

Hunton Privacy

On October 4, 2016, the U.S. Department of Defense (“DoD”) finalized its rule implementing the mandatory cyber incident reporting requirements for defense contractors under 10 U.S.C. §§ 391 and 393 (the “Rule”). The Rule applies to DoD contractors and subcontractors that are targets of any cyber incident with a potential adverse impact on information systems and “covered defense information” on those systems.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Full(er) House: Exposing high-end poker cheating devices

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

DrupalCon Europe 2016 – Building a Security Framework for Your Websites

PerezBox

Last week I spent a few days in beautiful Dublin, Ireland for DrupalCon Europe 2016. I had the opportunity to present a new presentation in which I try to introduce. Read More. The post DrupalCon Europe 2016 – Building a Security Framework for Your Websites appeared first on PerezBox.

article thumbnail

Lessons Learned: E-Learning Company Faces $50,000 Spam Fine

Privacy and Cybersecurity Law

The Canadian Radio-television and Telecommunications Commission (CRTC) has issued its first Compliance and Enforcement Decision* under Canada’s Anti-Spam Law (CASL). The Commission […].

article thumbnail

It’s time to take the ‘A’ out of A&E

CGI

It’s time to take the ‘A’ out of A&E. Anonymous. Mon, 10/24/2016 - 03:00. Improving access to healthcare is one of the biggest challenges facing the NHS. Wide variations in demand make it hard for trusts to predict and provide cover. In winter, the growing toll of seasonal illness multiplies the burden on overstretched resources. Outbreaks of viral and microbial pathogens can shut hospitals to admissions for weeks at a time.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

US Army Grants Visi-Trac Software Certificate of Networthiness

RFID Global Solution, Inc.

Reston, VA, Oct 18, 2016. U.S. Army Grants RFID Global’s Visi-Trac Software Certificate of Networthiness and Authority to Operate. Affirms Visi-Trac’s Status as Approved DoD Inventory Management System. RFID Global Solution, Inc., a leading provider of asset management solutions for the U.S. Department of Defense, recently announced that its Visi-Trac 3.x enterprise software has been awarded a Certificate of Networthiness (CoN # 201620336, CoN Type: Enterprise) and Authority to Operate (ATO) by

article thumbnail

CJEU Rules That Dynamic IP Addresses Are Personal Data

Hunton Privacy

On October 19, 2016, the Court of Justice of the European Union (the “CJEU”) issued its judgment in Patrick Breyer v. Bundesrepublik Deutschland , following the Opinion of Advocate General Manuel Campos Sánchez-Bordona on May 12, 2016. The CJEU followed the Opinion of the Advocate General and declared that a dynamic IP address registered by a website operator must be treated as personal data by that operator to the extent that the user’s Internet service provider (“ISP”) has &#

article thumbnail

Predicting Hearthstone game outcome with machine learning

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

Accounting for Website Security in Higher Education

PerezBox

This morning I had the privilege of speaking at the Higher Education Web Professionals Association (HighEdWeb) annual conference. I took the opportunity to share a number of points around the. Read More. The post Accounting for Website Security in Higher Education appeared first on PerezBox.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

US Officially Blames Russia For DNC Hack

Privacy and Cybersecurity Law

The United States (US) Department of Homeland Security (DHS) and Office of the Director of National Intelligence (ODNI) issued a […].

article thumbnail

Key considerations in implementing a hybrid cloud management solution

CGI

Key considerations in implementing a hybrid cloud management solution. shobana.lv@cgi.com. Wed, 10/12/2016 - 01:16. Hybrid IT service delivery models that combine public-cloud architectures with private-cloud architectures are on the rise within companies across industries. Such environments require a holistic management approach that ensures effective governance, regulatory compliance and security, as well as high IT performance and reduced costs.

Cloud 40
article thumbnail

Laws on Using Personal Information Are Changing. Are You Ready?

Managing Your Information

The Current Situation. As many of us will already know, if we use personal information we are likely to be subject to data protection laws that govern the way in which we are able to use that information. Whether we have a simple contacts and appointments book as a self-employed or freelance worker, post pictures on social media promoting our business or charity, or have many thousands of individual client records within a large business, we are likely to be required to comply with the Data Pro

GDPR 28
article thumbnail

CIPL and Telefónica Call for Action on New Approaches to Data Transparency

Hunton Privacy

Recently, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP, a privacy and information policy think tank based in Brussels, London and Washington, D.C., and Telefónica, one of the largest telecommunications company in the world, issued a joint white paper on Reframing Data Transparency (the “white paper”). The white paper was the outcome of a June 2016 roundtable held by the two organizations in London, in which senior business leaders, Data Privacy Officers, la

Paper 49
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Post Brexit, what options are available for a GDPR-light Data Protection Act?

Data Protector

Let’s think the unthinkable. Lets assume that, post Brexit, the British Government has an opportunity to decide how its data protection legislation should reflect the requirements of an aspiring British economy. And let’s assume that the Minister with responsibility for Data Protection asks for options about trimming back those elements of the General Data Protection Regulation that are unduly burdensome and, in practice, actually do very little to safeguard fundamental human rights.

GDPR 136
article thumbnail

How Should Your Network-Attached Applications Access DB2 for z/OS?

Robert's Db2

Some relatively recent developments have plenty of people asking, "How should my applications that connect to a z/OS server via a network link access DB2 for z/OS data?" In writing today I hope to provide some information that will be useful to folks pondering this question. I'll organize my thoughts on the matter around two key questions. z/OS Connect or DB2 Connect?

Access 48
article thumbnail

UK ICO Seeks Personal Liability for Directors

Hunton Privacy

On October 13, 2016, Elizabeth Denham, the UK Information Commissioner, suggested that directors of companies who violate data protection laws should be personally liable to pay fines at a House of Commons Public Bill Committee meeting when discussing the latest draft of the Digital Economy Bill (the “Bill”). The Bill is designed to enable businesses and individuals to access fast, digital communications services, promote investment in digital communications infrastructure and support the “digit

article thumbnail

CIPL and its GDPR Project Stakeholders Discuss DPOs and Risk under GDPR

Hunton Privacy

In September, the Centre for Information Policy Leadership (“CIPL”) held its second GDPR Workshop in Paris as part of its two-year GDPR Implementation Project. The purpose of the project is to provide a forum for stakeholders to promote EU-wide consistency in implementing the GDPR, encourage forward-thinking and future-proof interpretations of key GDPR provisions, develop and share relevant best practices, and foster a culture of trust and collaboration between regulators and industry. .

GDPR 49
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Entry into Force of the French Digital Republic Bill

Hunton Privacy

On October 7, 2016, the French Digital Republic Bill (the “Bill”) was enacted after a final vote from the Senate. The Bill aligns the French legal data protection framework with the EU General Data Protection Regulation (“GDPR”) requirements before the GDPR becomes applicable in May 2018. Increased Fines. The Bill significantly increases the maximum level of fines for violations of the French Data Protection Act.

GDPR 45
article thumbnail

Regulation on the Online Protection of Minors Published for Comment in China

Hunton Privacy

Recently, the Cyberspace Administration of China published for public comment a draft of the Regulations on the Online Protection of Minors (“Draft Regulations”). The Draft Regulations are open for comment until October 31, 2016. The Draft Regulations stipulate certain requirements are applicable to the online collection and use of personal information of minors.

article thumbnail

FTC Issues Guide for Businesses on Handling Data Breaches

Hunton Privacy

On October 25, 2016, the Federal Trade Commission released a guide for businesses on how to handle and respond to data breaches (the “Guide”). The 16-page Guide details steps businesses should take once they become aware of a potential breach. The Guide also underscores the need for cyber-specific insurance to help offset potentially significant response costs.