Sat.Oct 15, 2016 - Fri.Oct 21, 2016

article thumbnail

Federal Regulators Propose New Cybersecurity Rule for Big Banks

Hunton Privacy

On October 19, 2016, the Federal Deposit Insurance Corporation (“FDIC”), the Federal Reserve System (the “Fed”) and Office of the Comptroller of the Currency issued an advance notice of proposed rulemaking suggesting new cybersecurity regulations for banks with assets totaling more than $50 billion (the “Proposed Standards”). The Proposed Standards address five categories of cybersecurity: cyber risk governance; cyber risk management; internal dependency management; external dependency managemen

article thumbnail

Customer enablement and mobility: How consumers are driving digital transformation within the utilities industry

CGI

Customer enablement and mobility: How consumers are driving digital transformation within the utilities industry. shobana.lv@cgi.com. Thu, 10/20/2016 - 08:06. The digital transformation of personal entertainment and communications has made consumers increasingly comfortable with digital tools and platforms. To the consumer, it’s iTunes Match, Google Drive, Apple TV and Pokemon GO.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Full(er) House: Exposing high-end poker cheating devices

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

US Army Grants Visi-Trac Software Certificate of Networthiness

RFID Global Solution, Inc.

Reston, VA, Oct 18, 2016. U.S. Army Grants RFID Global’s Visi-Trac Software Certificate of Networthiness and Authority to Operate. Affirms Visi-Trac’s Status as Approved DoD Inventory Management System. RFID Global Solution, Inc., a leading provider of asset management solutions for the U.S. Department of Defense, recently announced that its Visi-Trac 3.x enterprise software has been awarded a Certificate of Networthiness (CoN # 201620336, CoN Type: Enterprise) and Authority to Operate (ATO) by

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

CJEU Rules That Dynamic IP Addresses Are Personal Data

Hunton Privacy

On October 19, 2016, the Court of Justice of the European Union (the “CJEU”) issued its judgment in Patrick Breyer v. Bundesrepublik Deutschland , following the Opinion of Advocate General Manuel Campos Sánchez-Bordona on May 12, 2016. The CJEU followed the Opinion of the Advocate General and declared that a dynamic IP address registered by a website operator must be treated as personal data by that operator to the extent that the user’s Internet service provider (“ISP”) has &#

More Trending

article thumbnail

Predicting Hearthstone game outcome with machine learning

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

Laws on Using Personal Information Are Changing. Are You Ready?

Managing Your Information

The Current Situation. As many of us will already know, if we use personal information we are likely to be subject to data protection laws that govern the way in which we are able to use that information. Whether we have a simple contacts and appointments book as a self-employed or freelance worker, post pictures on social media promoting our business or charity, or have many thousands of individual client records within a large business, we are likely to be required to comply with the Data Pro

GDPR 28
article thumbnail

CIPL and Telefónica Call for Action on New Approaches to Data Transparency

Hunton Privacy

Recently, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP, a privacy and information policy think tank based in Brussels, London and Washington, D.C., and Telefónica, one of the largest telecommunications company in the world, issued a joint white paper on Reframing Data Transparency (the “white paper”). The white paper was the outcome of a June 2016 roundtable held by the two organizations in London, in which senior business leaders, Data Privacy Officers, la

Paper 49
article thumbnail

Current challenges in fighting financial crime – Part 2

CGI

Current challenges in fighting financial crime – Part 2. shobana.lv@cgi.com. Fri, 10/21/2016 - 02:27. In part one of this two-part blog on fighting financial crime, we talked about the factors that are converging to make the battle against financial crime more complex and costly in today’s financial world. In part two, we’ll talk about a new approach that tackles these challenges, helping financial institutions to not only achieve higher levels of security but also create competitive advantage.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

UK ICO Seeks Personal Liability for Directors

Hunton Privacy

On October 13, 2016, Elizabeth Denham, the UK Information Commissioner, suggested that directors of companies who violate data protection laws should be personally liable to pay fines at a House of Commons Public Bill Committee meeting when discussing the latest draft of the Digital Economy Bill (the “Bill”). The Bill is designed to enable businesses and individuals to access fast, digital communications services, promote investment in digital communications infrastructure and support the “digit

article thumbnail

HHS Releases Guidance on HIPAA and Cloud Computing

Hunton Privacy

Earlier this month, the Department of Health and Human Services’ Office for Civil Rights issued guidance (the “Guidance”) for HIPAA-covered entities that use cloud computing services involving electronic protected health information (“ePHI”). The Guidance makes clear that covered entities and business associates may use a cloud service to store or process ePHI, provided that the covered entity or business associate enters into a HIPAA-compliant business associate contract or agreement (“BAA”) wi

Cloud 45
article thumbnail

California AG Announces Launch of Online CalOPPA Reporting Form

Hunton Privacy

On October 14, 2016, California Attorney General Kamala D. Harris announced the release of a publicly available online form that will enable consumers to report potential violations of the California Online Privacy Protection Act (“CalOPPA”). CalOPPA requires website and mobile app operators to post a privacy policy that contains certain specific content.

Privacy 45
article thumbnail

NHTSA Set to Release New Automobile Cybersecurity Best Practices

Hunton Privacy

On October 14, 2016, the National Highway Transportation Administration (“NHTSA”) indicated in a letter to Congress that it intends to issue new best practices on vehicle cybersecurity. This letter came in response to an earlier request from the House Committee on Energy and Commerce (“Energy and Commerce Committee”) that NHTSA convene an industry-wide effort to develop a plan to address vulnerabilities posed to vehicles by On-Board Diagnostics (“OBD-II”) ports.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Article 29 Working Party Issues Results of Fablab Workshop on the GDPR

Hunton Privacy

On October 7, 2016, the Article 29 Working Party (the “Working Party”) published a summary of the discussions that took place at its “Fablab” workshop entitled GDPR/from concepts to operational toolbox, DIY , which took place on July 26, 2016, in Brussels. The Fablab workshop gathered more than 90 participants, including 40 representatives from data protection authorities, to discuss certain operational and practical issues linked to the EU General Data Protection Regulation (“GDPR”) with repres

GDPR 40
article thumbnail

G-7 Endorses Best Practices for Bank Cybersecurity

Hunton Privacy

On October 11, 2016, Group of Seven (“G-7”) financial leaders endorsed the Fundamental Elements of Cybersecurity for the Financial Sector (“Best Practices”), a set of non-binding best practices for banks and financial institutions to address cybersecurity threats. The endorsement was motivated by recent large hacks on international banks, including the February 2016 theft of $81 million from the central bank of Bangladesh’s account at the New York Federal Reserve.

article thumbnail

Shifting from business as usual to the business of tomorrow

CGI

Shifting from business as usual to the business of tomorrow. ravi.kumarv@cgi.com. Mon, 10/17/2016 - 08:00. The CGI Global 1000 outlook brings together findings and insights drawn from in-person conversations with 1,000 senior business and technology leaders. In this blogpost and several others planned for the near future, we will share some specific cybersecurity insights from these conversations.