September, 2016

article thumbnail

Roughtime

Imperial Violet

Security protocols often assume an accurate, local clock (e.g. TLS, Kerberos, DNSSEC and more). It's a widely accepted assumption when designing protocols but, for a lot of people, it just isn't true. We find good evidence that at least 25% of all certificate errors in Chrome are due to a bad local clock. Even when the local clock is being synchronised, it's very likely to be using unauthenticated NTP.

article thumbnail

How to Work Beyond the Corporate Firewall Safely

JKevinParker

Today's workforce is increasingly distributed, increasingly mobile, and increasingly expecting telework options. This equates to more people working beyond the corporate walls and beyond the corporate IT firewall. But how can organizations offer such flexibility without losing control of their information? This is the subject of a guest post I authored for AIIM's Digital Landfill blog.

Paper 92
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

I feel terrible about this site.

John Battelle's Searchblog

The post I feel terrible about this site. appeared first on John Battelle's Search Blog. I don’t write here anymore. I write almost entirely on Medium now. It’s not a choice I made to NOT write here, it’s a choice I made to edit NewCo Shift , our new publication. It lives on Medium, but if it were a WordPress site, well, my writing would all be on that site.

article thumbnail

Final Rules for the Data Privacy Act Published in the Philippines

Hunton Privacy

Recently, the National Privacy Commission (the “Commission”) of the Philippines published the final text of its Implementing Rules and Regulations of Republic Act No. 10173, known as the Data Privacy Act of 2012 (the “IRR”). The IRR has a promulgation date of August 24, 2016, and went into effect 15 days after the publication in the official Gazette.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How To Protect Your Business Data

PerezBox

It’s impossible to go a week without seeing some reference to a data breach, whether it’s a write up on what happened years ago, or updates on breaches that are. Read More. The post How To Protect Your Business Data appeared first on PerezBox.

More Trending

article thumbnail

CASL compliance undertakings continue to mount

Privacy and Cybersecurity Law

Another company that is well-known to consumers has agreed to enter into a compliance undertaking with the CRTC for alleged […].

article thumbnail

Current challenges in fighting financial crime – Part 1

CGI

Current challenges in fighting financial crime – Part 1. Anonymous. Mon, 09/26/2016 - 01:57. As the threat and sophistication of financial crime continues to increase, financial institutions are challenged to stay one step ahead and ensure the highest level of protection for their organizations and customers. In part one of this two-part blog on financial crime, we’ll take a look at some of the factors driving the complexity and cost in fighting financial crime.

article thumbnail

The Business Case for Information Strategy and Architecture

JKevinParker

Information Management is a meta discipline that combines strategy, architecture, technology, and governance to get the right information to the right people at the right times to do the right things in support of an organization’s mission, vision, and values. Information Management happens at the intersection of people, process, information, and technology.

article thumbnail

Department of Transportation Issues Cyber Guidance for Autonomous Cars

Hunton Privacy

On September 20, 2016, the Department of Transportation, through the National Highway Traffic Safety Administration (“NHTSA”), released federal cyber guidance for autonomous cars entitled Federal Automated Vehicles Policy (“guidance”). The guidance makes a number of recommendations, including that automated vehicles should be designed to comply with “established best practices for cyber physical vehicle systems.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

ICA Congress 2016: Creating value with digital preservation

Preservica

The International Council on Archives (ICA) is dedicated to records management and the preservation of the world’s archival heritage. For over 60 years, the ICA has united archival institutions and practitioners across the world to share industry knowledge and expertise. The ICA is a truly international organisation, and this year held their Congress event in Seoul, South Korea.

article thumbnail

Briefing Templates

Attensa

Check out our briefing template breakdown at our guide website. View starter templates and download them from our github repo if you have a basic understanding of HTML and CSS. The post Briefing Templates appeared first on Attensa Inc.

40
article thumbnail

New York Proposes First-in-the-Nation Cybersecurity Regulation for Financial Institutions

Privacy and Cybersecurity Law

On September 13, 2016, the New York Department of Financial Services introduced a new rule that would require banks, insurance […].

article thumbnail

Data hubs will revolutionize the electricity business: Lessons from 10 data hub projects

CGI

Data hubs will revolutionize the electricity business: Lessons from 10 data hub projects. shobana.lv@cgi.com. Mon, 09/12/2016 - 03:38. Last spring, Finland’s Ministry of Employment and the Economy tasked Fingrid with building a centralized information exchange solution, informally dubbed the data hub, for the Finnish electricity market. Any major short-circuits notwithstanding, the data hub is expected to revolutionize the Finnish electricity business.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

DB2 for z/OS: Using PGFIX(YES) Buffer Pools? Don't Forget About Large Page Frames

Robert's Db2

Not long ago, I was reviewing an organization's production DB2 for z/OS environment, and I saw something I very much like to see: a REALLY BIG buffer pool configuration. In fact, it was the biggest buffer pool configuration I'd ever seen for a single DB2 subsystem: 162 GB (that's the combined size of all the buffer pools allocated for the subsystem).

IT 54
article thumbnail

CNIL Publishes Internet Sweep Results on Connected Devices

Hunton Privacy

On September 23, 2016, the French Data Protection Authority (“CNIL”) published the results of the Internet sweep on connected devices. The sweep was conducted in May 2016 to assess the quality of the information provided to users of connected devices, the level of security of the data flows and the degree of user empowerment ( e.g. , user’s consent and ability to exercise data protection rights).

article thumbnail

Global Futures: A look back at ARA 2016

Preservica

An insightful few days in Archiving & Digital Preservation. Earlier this month the Archives & Records Association (ARA) held their annual members conference in Wembley, London. The event brought together archivists and records managers from across Europe, including many Preservica Users. The conference theme was focused on ‘Global Futures’, and it was clear that the ARA community continue to stride forward with enthusiasm towards a future that will ensure their valuable collections and r

article thumbnail

What Is Our Professional Future?

Brandeis Records Manager

George Despres, CRM. Program Director for University Records Management, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). Like most people, I prefer to have a reasonable sense of job security, as long as my interest is engaged. I hope and need to remain in the workforce for many more years.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

White House Issues Presidential Directive Coordinating Government Response To “Cyber Incidents”

Privacy and Cybersecurity Law

On July 26, 2016, President Obama issued a new Presidential Directive setting forth the framework for how the United States […].

article thumbnail

Building long-term transformational outsourcing relationships: An insurance success story

CGI

Building long-term transformational outsourcing relationships: An insurance success story. Anonymous. Thu, 09/08/2016 - 02:38. Insurers, like organizations in most sectors, are under pressure to transform their businesses using modern technologies like digital, mobile, cloud, etc., but face the constraints of decades-old legacy environments and limited funds to invest in modernization.

article thumbnail

Belgian Privacy Commission Issues Priorities and Thematic Dossier to Prepare for GDPR

Hunton Privacy

On September 16, 2016, the Belgian Data Protection Authority (the “Privacy Commission”) published a 13-step guidance document (in French and Dutch ) to help organizations prepare for the EU General Data Protection Regulation (“GDPR”). The 13 steps recommended by the Privacy Commission are summarized below. Awareness. Inform key persons and decision makers about the upcoming changes in order to assess the consequences of the GDPR on the company or organization.

GDPR 45
article thumbnail

The Arc of a Data Breach: A 3-Part Series to Make Sure You’re Prepared

Hunton Privacy

Episode 1: Identify & Mobilize. In the first segment of our 3-part series with Lawline, Lisa J. Sotto , head of our Global Privacy and Cybersecurity practice at Hunton & Williams LLP, explains how to identify a cyber incident, mobilize your incident response team, coordinate with law enforcement and conduct an investigation. View the first segment and the presentation materials.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

New Jersey Moves Forward With Shopper Privacy Bill

Hunton Privacy

On September 15, 2016, the New Jersey Senate unanimously approved a bill that seeks to limit retailers’ ability to collect and use personal data contained on consumers’ driver and non-driver identification cards. The bill, known as the Personal Information and Privacy Protection Act , must now be approved by the New Jersey Assembly. Under the bill, retail establishments may scan an individual’s identification card ( i.e. , use an electronic device capable of deciphering, in an electronically rea

Privacy 45
article thumbnail

FTC Seeks Input on GLB Safeguards Rule

Hunton Privacy

On August 29, 2016, the Federal Trade Commission announced that it is seeking public comment on the Gramm-Leach-Bliley Act (“GLB”) Safeguards Rule. The GLB Safeguards Rule, which became effective in 2003, requires financial institutions to develop, implement and maintain a comprehensive information security program to safeguard customer information.

article thumbnail

The Arc of a Data Breach: A 3-Part Series to Make Sure You’re Prepared

Hunton Privacy

Episode 2: Response. In the second segment of our 3-part series with Lawline, Lisa J. Sotto , head of our Global Privacy and Cybersecurity practice at Hunton & Williams LLP, discusses data breach notification obligations and actions to take to manage the regulatory onslaught in the aftermath of a breach. Sotto notes that “these investigations are challenging because the threat actors are enormously sophisticated, and in some circumstances we can never figure out what happened.”.

article thumbnail

Korean Privacy Law Updated

Hunton Privacy

On September 22, 2016, Korean law firm Bae, Kim & Lee LLC released a Legal Update outlining amendments to Korea’s Personal Information Protection Act (“PIPA”) and the Act on the Promotion of IT Network Use and Information Protection (“IT Network Act”). The amendments to PIPA include: notification requirements for third-party transfers; and. an obligation to submit to regular inspection by MOI.

Privacy 40
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

New York Announces Proposed Cybersecurity Regulation to Protect Consumers and Financial Institutions

Hunton Privacy

On September 13, 2016, New York Governor Andrew Cuomo announced a proposed regulation that would require banks, insurance companies and other financial services institutions to establish and maintain a cybersecurity program designed to ensure the safety of New York’s financial services industry and to protect New York State from the threat of cyber attacks. .

article thumbnail

TalkTalk Appeal Against ICO Fine for Late Notification of Data Breach Dismissed by First-Tier Tribunal

Hunton Privacy

On August 30, 2016, the First-tier Tribunal (Information Rights) (the “Tribunal”) dismissed an appeal from UK telecoms company TalkTalk Telecom Group PLC (“TalkTalk”) regarding a monetary penalty notice issued to it on February 17, 2016, by the UK Information Commissioner’s Office (“ICO”). The ICO had issued the monetary penalty notice to TalkTalk, for the amount of £1,000, for an alleged failure to report an October 2015 data breach to the ICO within the legally required time period.

article thumbnail

Advocate General Advises Revision of PNR Agreement between EU and Canada

Hunton Privacy

On September 8, 2016, Advocate General Paolo Mengozzi of the Court of Justice of the European Union (“CJEU”) issued his Opinion on the compatibility of the draft agreement between Canada and the European Union on the transfer of passenger name record data (“PNR Agreement”) with the Charter of Fundamental Rights of the European Union (“EU Charter”). This is the first time that the CJEU has been called upon to issue a ruling on the compatibility of a draft international agreement with the EU Chart