Sat.Jan 13, 2018 - Fri.Jan 19, 2018

article thumbnail

Management by Magazine (InfoGov Edition)

Weissman's World

Today, on Perpective Check: The truth and consequences of your boss flipping through the pages of a magazine and saying, “I just read about [new shiny infogov object] that EVERYBODY’S using. How come we’re not??” [link]. The post Management by Magazine (InfoGov Edition) appeared first on Holly Group.

article thumbnail

The Machine Identity Crisis

Data Breach Today

We are amidst a new "machine identity crisis," says Jeff Hudson, CEO of Venafi. And unless we tackle this growing challenge of how to secure machine-to-machine communication, then enterprise IT and security departments are likely to be overwhelmed.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Breaches Don't Affect Stock Price

Schneier on Security

Interesting research: " Long-term market implications of data breaches, not ," by Russell Lange and Eric W. Burger. Abstract : This report assesses the impact disclosure of data breaches has on the total returns and volatility of the affected companies' stock, with a focus on the results relative to the performance of the firms' peer industries, as represented through selected indices rather than the market as a whole.

article thumbnail

GDPR will be a harsh wake-up call for most U.S. companies

Information Management Resources

Recent studies suggest only one-in-four organizations are well-prepared for the data management mandate, a statistic that could have costly consequences.

GDPR 126
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Guest Post -- Automation Is Changing the Way We Work

AIIM

Artificial intelligence is changing the way we do everything. As we look ahead, self-driving cars, hyper-intelligent predictive software, and self-improving robots seem possible. As AI progress at a rapid pace, incremental changes in the capability of computer programs changes how we interact with the world, the internet and each other. Already, AI is integrated into our daily lives, from automated suggestions from Amazon based on products we’ve purchased in the best, to automatic email sorting

More Trending

article thumbnail

Meet Antifa's Secret Weapon Against Far-Right Extremists

WIRED Threat Level

Megan Squire doesn’t consider herself to be antifa and pushes digital activism instead, passing along information to those who might put it to real-world use—who might weaponize it.

IT 111
article thumbnail

What are vital records, and how do you protect them?

TAB OnRecord

When vital records are not protected, there is a major risk involved if the unthinkable happens. We’ve created this resource to help your organization mitigate that risk by following these five steps. Read More. The post What are vital records, and how do you protect them? appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Guest Post - Three Critical Steps for GDPR Compliance

AIIM

This is the eighth post in a series on privacy by Andrew Pery. You might also be interested in: Mitigate Data Privacy and Security Risks with Machine Learning. The Privacy and Security Dichotomy. GDPR and Cross Border Data Flows between the EU and the US: Current State of the Law. Privacy by Design: The Intersection of Law and Technology. What Do the GDPR and new Privacy Laws Mean for U.S.

GDPR 83
article thumbnail

'Hacking Incident' Impacts Nearly 280,000 Medicaid Patients

Data Breach Today

Oklahoma State University Center for Health Sciences Sends Notification Letters A health data breach reported to federal regulators as a "hacking/IT incident" impacting nearly 280,000 Medicaid patients in Oklahoma has experts wondering exactly what happened.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The role of the data curator: Make data scientists more productive

Information Management Resources

In 2018 we will increasingly see this job created in order to bridge the worlds of business and IT for the better use of analytics.

Analytics 106
article thumbnail

The Astrophysicist Who Wants to Help Solve Baltimore's Urban Blight

WIRED Threat Level

Vacant buildings are more than just an economic threat. They're also a public safety concern. And it turns out they have their own sort of gravitational pull.

IT 103
article thumbnail

Guest Post -- 10 Mindset Tips for Project Managers

AIIM

Project management often involves working in high stress environments with tight deadlines and multiple competing priorities. The most successful Project Managers learn how to navigate these environments and often have a strong understanding of their own shortcomings and the strengths of their team. To create this success orientated mindset there are a number of tips and strategies that Project Managers can look to adopt. 1 -- Spend Time To Understand Your Own Management Style.

article thumbnail

Intel Confirms Fresh Spectre, Meltdown Patch Problems

Data Breach Today

Latest CPUs Also Suffer From Frequent Rebooting Problem Intel says firmware updates it developed to help protect users against the Meltdown and Spectre vulnerabilities have been causing not just older chipsets but also its newest CPUs - in both client devices and data center servers - to reboot much more frequently than they should.

IT 160
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

4 easy ways to get started with information governance

IBM Big Data Hub

Two paradoxes of information technology are: data has no value if you can’t access it, and it’s a liability if the wrong people access it. Company leaders don’t think they need data governance until these paradoxes hit them hard.

article thumbnail

How can an ITIL qualification help you advance your career?

IT Governance

The Information Technology Infrastructure Library ( ITIL ® ) is the most widely adopted IT service management (ITSM) framework in the world, and is acknowledged as best practice for ITSM in any organisation. It is based around a five-phase service lifecycle: service strategy, service design, service transition, service operation and continual service improvement.

article thumbnail

The 'Doublespeak' of Responsible Encryption

WIRED Threat Level

It's a new name for an old argument: that public agencies fighting crime and terrorism must have access to our private communications—for our own good.

article thumbnail

$17.2 Million Settlement for Breach Case Involving HIV Info

Data Breach Today

Aetna's Settlement Points to Need to Pay Attention to Details A mailing error can have huge consequences. Case in point: Aetna has agreed to a $17.2 million settlement of a class action lawsuit filed after a data breach involving HIV drug information that was visible through envelope windows on thousands of letters.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

What is Enterprise Content Management (ECM)?

OpenText Information Management

Enterprise Content Management (ECM) comes in many forms. At its heart, it’s a set of processes, strategies and tools that allow an enterprise to capture, manage, store, preserve, deliver and measure content throughout the enterprise and beyond. In today’s world, information sharing and collaboration with customers, suppliers and other trading partners is essential part of … The post What is Enterprise Content Management (ECM)?

ECM 80
article thumbnail

IT budgets on the rise, driven by software, AI investments

Information Management Resources

Worldwide IT spending will reach $3.7 trillion this year, with the primary drivers of growth being projects in digital business, blockchain, the IoT, machine learning and artificial intelligence.

article thumbnail

Patch your vulnerabilities now or risk punishment under the GDPR

IT Governance

In the wake of the Meltdown and Spectre flaws revealed on 3 January 2018, the Information Commissioner’s Office (ICO) has warned that existing vulnerabilities could lead to punishment when the EU General Data Protection Regulation (GDPR) is enforced. Even though the GDPR won’t take effect until 25 May 2018, organisations failing to identify and patch vulnerabilities before this date face strict disciplinary measures.

GDPR 76
article thumbnail

Bitcoin-Amassing AlphaBay Drug Barons Get US Prison Time

Data Breach Today

'Caliconnect' Earned $1.4 Million on Silk Road Before Its Demise Two men have been sentenced to serve at about six years each in U.S. federal prison after selling drugs such as marijuana and cocaine via darknet markets, including AlphaBay. The separate arrests of both defendants predate law enforcement seizing control of AlphaBay.

Marketing 151
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

What is Customer Experience Management (CEM)?

OpenText Information Management

There was a time when content almost entirely flowed one way – from enterprises to customers. Customers’ responses were effectively measured in sales and occasional surveys. But in today’s digital world, customers demand a two-way omnichannel customer experience. They expect a customer experience that delights or they will go looking at your competitors.

article thumbnail

What is the Best Way to Manage Records and Documents?

Record Nations

Most people use the terms “Records” and “Documents” interchangeably. However, there are some important, yet different, aspects of each. Where records aren’t used regularly, they are used to provide evidence of events. Documents are active files that need to be available for people to access and edit. Now what? You have records that you are […].

Access 76
article thumbnail

Will technology companies be ready for the NIS Directive by May 2018?

IT Governance

With many companies working towards compliance with the EU General Data Protection Regulation (GDPR) , another EU legislation that is expected to be transposed into law in May 2018 is falling under the radar: the Directive on Security of Network and Information Systems (NIS Directive). The NIS Directive requires operators of essential services (OESs) and digital service providers (DSPs) to implement effective security measures appropriate to associated risks, as well as measures that minimise th

article thumbnail

Is Healthcare Ready to Comply With GDPR?

Data Breach Today

This edition of the ISMG Security Report takes a look at how ready healthcare organizations are for GDPR compliance. Also featured: comments from Alberto Yepez of Trident Capital on the 2018 outlook for information security companies and a summary of the latest financial fraud trends.

GDPR 144
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

A Popular Crime-Predicting Algorithms Performed Worse Than Mechanical Turks in One Study

WIRED Threat Level

When researchers put a popular criminal justice algorithm up against a bunch of Mechanical Turks, they came out about even.

article thumbnail

Home Office pays out £15,500 to asylum seeker over data breach

The Guardian Data Protection

Sensitive information given by government staff to officials in man’s Middle East home country The Home Office has paid out £15,500 in compensation after admitting handing over sensitive information about an asylum seeker to the government of his Middle East home country, a move which could have endangered his life and that of his family. The settlement relates to confidential proof of his persecution in his home country which was wrongly shared with the authorities there.

article thumbnail

The real costs of a data breach

IT Governance

According to Ponemon Institute’s 2017 Cost of Data Breach Study: United Kingdom , data breaches cost UK organisations an average of £2.48 million. When a data breach hits the headlines, we immediately think of the fine that the breached organisation may receive. However, there are a number of other costs associated with a data breach that aren’t just financial.