Sat.Apr 14, 2018 - Fri.Apr 20, 2018

article thumbnail

Do you know what data your organisation holds?

IT Governance

How can you be sure that your organisation is compliant with the EU General Data Protection Regulation (GDPR) if you don’t know exactly what data you hold? You might think it’s impossible to be unaware of data you store, but you’d be surprised. Information has a way of being left on hard drives, appropriated by other departments or reproduced in different formats.

GDPR 68
article thumbnail

Securing Elections

Schneier on Security

Elections serve two purposes. The first, and obvious, purpose is to accurately choose the winner. But the second is equally important: to convince the loser. To the extent that an election system is not transparently and auditably accurate, it fails in that second purpose. Our election systems are failing, and we need to fix them. Today, we conduct our elections on computers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Looking at Information Management Through a Different Lens

AIIM

Organizations need to think about how the advent of the third wave of exponential change – the drive to Artificial Intelligence and Machine Learning - will require them to look at the future through a different set of lenses. I’d like to offer three of these “lenses” – I’m sure there are more – but I think these three are ones that those in this community are uniquely prepared to tackle.

article thumbnail

Managing Third-Party Risks

Data Breach Today

Bitsight's Tom Turner on Security Ratings Managing third-party risks is more critical than ever, says Tom Turner of BitSight Technologies, who discusses the urgency of communicating that to the board.

Risk 133
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Teens Who Hacked Microsoft's Videogame Empire—And Went Too Far

WIRED Threat Level

Among those involved in David Pokora's so-called Xbox Underground, one would become an informant, one would become a fugitive, and one would end up dead.

Security 111

More Trending

article thumbnail

Surviving Disruption -- Strategies for the Era of AI and Machine Learning

AIIM

Truly disruptive moments occur only once in a generation. They occur when the cumulative inertia of technology innovation combines to disrupt business models. And the heart of disruption is ultimately when radical technology changes are standardized and then incorporated into new business models. Let’s take a look at a couple. The first ones on this graphic are the telephone and electricity.

article thumbnail

Health Data Breach Tally Spikes in Recent Weeks

Data Breach Today

A Wide Assortment of Hacker, Insider Incidents Reported The reporting of major health data breaches has spiked in recent weeks, with a wide variety of incidents reported. So what's behind the surge?

article thumbnail

Number of Facebook users whose data was compromised 'far more than 87m', MPs told

The Guardian Data Protection

Former Cambridge Analytica employee gives evidence before parliamentary committee Far more than 87 million people may have had their Facebook data harvested by Cambridge Analytica, according to evidence from former employee Brittany Kaiser. Speaking to the Commons digital, culture, media and sport select committee, Kaiser said Cambridge Analytica had a suite of personality quizzes designed to extract personal data from the social network, of which Aleksandr Kogan’s This Is Your Digital Life app

article thumbnail

Six eco-friendly RIM tips that could save you money

TAB OnRecord

Protecting the environment can translate into an improved bottom line, from the cost savings associated with resource conservation, to benefits of increased consumer and shareholder confidence. In this blog we will be sharing six ways to incorporate environmentally friendly practices into your organization’s RIM processes. 1. The more you throw away, the more you can [.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Guest Post--Will Automation Make Us More Human Centric?

AIIM

Automation in the workplace is already well underway. The McKinsey Global Institute estimates that up to 50% of workplace tasks could be fully automated by 2055 , if not before. For employees, this can be a daunting concept, as increased automation in professional settings could lead to job loss on a mass scale. Yet, automation is the workplace might not be all doom and gloom, depending on how we look at it.

article thumbnail

Huge Malware Distribution Network Crippled

Data Breach Today

'EITest' Shuffled as Many as 2 Million Users a Day to Malware Security researchers are claiming at least a temporary victory over an enormously productive malware distribution scheme that shuffled as many as 2 million users a day from legitimate websites to malware.

Security 145
article thumbnail

Facebook admits tracking users and non-users off-site

The Guardian Data Protection

Statement comes as company faces US lawsuit over facial recognition feature launched in 2011 and planned to expand to EU Facebook has released more information on the social media platform’s tracking of users off-site, after its CEO, Mark Zuckerberg, failed to answer questions about the process from US politicians and as the company prepares to fight a lawsuit over facial recognition in California.

Security 103
article thumbnail

8 Ways Hackers Monetize Stolen Data

Dark Reading

Hackers are craftier than ever, pilfering PII piecemeal so bad actors can combine data to set up schemes to defraud medical practices, steal military secrets and hijack R&D product information.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Guest Post -- Perspectives on Automation and Employment

AIIM

Automation will have a global impact like nothing else we have ever seen. This is not to say that it is altogether a new idea. Decades ago, science minded dreamers from around the globe would paint philosophical dreamscapes that relayed a world built on the backs of human ingenuity. Starting in the early 20th century, automation introduced itself to the world in the form of massive materials factories that could speed up the productivity of workers and create form perfect products for mass consu

article thumbnail

Preparing for Mid-Term Elections

Data Breach Today

FBI's Elvis Chan on Efforts to Bolster Cybersecurity of Social Media Stung by signs of Russian influencing of the 2016 presidential election, the FBI is working with social media companies to bolster cybersecurity in advance of the 2018 mid-term election. Elvis Chan of the FBI describes these efforts.

article thumbnail

'Was the Brexit poll compromised? We may need a public debate about that'

The Guardian Data Protection

Damian Collins, chair of the Commons committee looking into data breaches, says we are in the foothills of a global story Damian Collins is a few minutes late for our interview in his House of Commons office and immediately apologises. Even in normal times, as chairman of the digital, culture, media and sport committee, he has a lot on his plate. But over the last few weeks, since the Observer broke the story of the Facebook data scandal , the spotlight has fallen on this 44-year-old backbench T

article thumbnail

How to successfully harness AI to combat fraud and abuse

Elie

While machine learning is integral to innumerable anti-abuse systems including spam and phishing detection, the road to reap its benefits is paved with numerous abuse-specific challenges. Drawing from concrete examples this session will discuss how these challenges are addressed at Google and providea roadmap to anyone interested in applying machine learning to fraud and abuse problems.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How Russian Facebook Ads Divided and Targeted US Voters Before the 2016 Election

WIRED Threat Level

New research shows just how prevalent political advertising was from suspicious groups in 2016—including Russian trolls.

Security 111
article thumbnail

US, UK: Russian Hackers Deeply Embedded in Routers, Switches

Data Breach Today

Advice: Update Outdated Protocols, Equipment The U.S. and U.K. warned Monday that Russian hackers have compromised critical internet infrastructure with the aim of spying, extracting intellectual property and gaining footholds for future cyberattacks.

124
124
article thumbnail

Facebook to start asking permission for facial recognition in GDPR push

The Guardian Data Protection

Users will be asked to review information about targeted advertising but some say opting out is deliberately difficult Facebook has started to seek explicit consent from users for targeted advertising, storage of sensitive information, and – for the first time in the EU – application of facial recognition technology as the European general data protection regulation (GDPR) is due to come into force in just over a month.

GDPR 91
article thumbnail

How to successfully harness AI to combat fraud and abuse

Elie

While machine learning is integral to innumerable anti-abuse systems including spam and phishing detection, the road to reap its benefits is paved with numerous abuse-specific challenges. Drawing from concrete examples this session will discuss how these challenges are addressed at Google and providea roadmap to anyone interested in applying machine learning to fraud and abuse problems.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Security Risks of Login With Facebook

WIRED Threat Level

New research from Princeton University exposes vulnerabilities in the social network's universal login API.

Risk 110
article thumbnail

'Tech Accord' Emphasizes Teamwork to Prevent Hacking Damage

Data Breach Today

Agreement Includes Pledge to Not Aid Governments With Cyber Warfare Thirty-four companies have signed on to the Microsoft-led Cybersecurity Tech Accord, which is aimed at protecting civilians from cybercriminal and state-sponsored attacks.

article thumbnail

Social Media Thread-Hijacking is Nothing More Than Targeted Spam

Troy Hunt

I have a vehement dislike of spam. Right there, that's something you and I have in common because I'm yet to meet a person who says "well actually, I find those Viagra emails I receive every day kinda useful" We get bombarded by spam on a daily basis and quite rightly, people get kinda cranky when they have to deal with it; it's an unwanted invasion that takes a little slice of unnecessary mental processing each time we see it.

article thumbnail

Cambridge Analytica scandal 'highlights need for AI regulation'

The Guardian Data Protection

Lords report stresses need for artificial intelligence to be used for the common good Britain needs to lead the way on artificial intelligence regulation, in order to prevent companies such as Cambridge Analytica setting precedents for dangerous and unethical use of the technology, the head of the House of Lords select committee on AI has warned. The Cambridge Analytica scandal, Lord Clement-Jones said, reinforced the committee’s findings, released on Monday in the report “AI in the UK: ready, w

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

How to write a GDPR-compliant personal data breach notification procedure

IT Governance

An integral part of your EU General Data Protection Regulation (GDPR) compliance project is producing appropriate documentation, which includes a personal data breach notification procedure. If you’re just beginning your GDPR project, it’s unlikely that you’ll be fully compliant by 25 May 2018, when the Regulation is enforced. However, in our recent blog, GDPR priorities in the lead up to May , we suggested that your organisation should prioritise creating incident response and breach reporting

article thumbnail

Machine Learning and the Skills Gap

Data Breach Today

WhiteHat Security's Craig Hinkley on How Emerging Tech Can Improve Staff Training We have been talking about the cybersecurity skills gap for a decade, but the pain is truly being felt now as businesses churn out new apps with insufficient security, says WhiteHat Security's Craig Hinkley. What is machine learning's role?

article thumbnail

Inside the Unnerving CCleaner Supply Chain Attack

WIRED Threat Level

CCleaner owner Avast is sharing more details on the malware attackers used to infect legitimate software updates with malware.