Sat.Nov 11, 2017 - Fri.Nov 17, 2017

article thumbnail

Annual Report to Congress on Breaches of Unsecured Protected Health Information

Data Breach Today

The Department of Health and Human Services' Office for Civil Rights provided a report to Congress on health information breaches from September 2009 through 2010, as required under the HITECH Act. Nearly 7.9 million Americans were affected by almost 30,800 health information breaches, according to the report.

221
221
article thumbnail

How to Tackle the Information Chaos Problem

AIIM

Many organizations are on some sort of Digital Transformation journey – or they should be. Everyone wants to “transform.” But what exactly is Digital Transformation? Most organizations and departments have a mandate to continuously improve operations. A conventional change agenda involves better tools and technology, better behaviors, and better processes, all focused on generating better efficiencies and improved productivity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Everything Attorney General Jeff Sessions Has Forgotten Under Oath

WIRED Threat Level

Over the course of four recent congressional hearings, Attorney General Jeff Sessions has somehow forgotten dozens of people, places, and events. Here's all of them in one place.

Security 111
article thumbnail

Ten things impacting the world: living to 150

OpenText Information Management

Over the course of human history, our life expectancy has been on an upward trend: increasing from 30 years (during prehistoric times) to 35 years (in the Classical Greek and Roman eras) to 48 years (in Medieval times). Better living conditions in the mid-20th century caused the average lifespan to jump to the 70-year mark. … The post Ten things impacting the world: living to 150 appeared first on OpenText Blogs.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Accounting of Disclosures Under the HITECH Act

Data Breach Today

A notice of proposed rulemaking from the HHS Office for Civil Rights that would modify the HIPAA Privacy Rule standard for accounting of disclosures of protected health information and add new requirements for access reports.

Privacy 179

More Trending

article thumbnail

How to lose your password

Thales Cloud Protection & Licensing

The tsunami of passwords that exist across every aspect of our digital life means that there’s a thriving underground industry of cyber-criminals trying to get at them. To borrow from Shakespeare’s Macbeth: “Each new morn, new widows howl, new orphans cry, new sorrows slap Internet giants on the face”. The modern era of mass data breaches perhaps began in 2009, with the hack of 32 million account credentials held by software developer RockYou, in which a SQL injection attack revealed that passwo

article thumbnail

How my Apple Watch gave me a window into a world of IoT in Retail

OpenText Information Management

The Internet of Things (IoT) is beginning to have a major impact in many industry sectors. IoT is a network of connected devices with embedded sensors othat can communicate, analyze and share data over the cloud. So far, the Retail sector has been slow to embrace IoT but it’s beginning to happen. Buying an Apple … The post How my Apple Watch gave me a window into a world of IoT in Retail appeared first on OpenText Blogs.

Retail 102
article thumbnail

FFIEC Final Authentication Guidance

Data Breach Today

The Final FFIEC Guidance has been issued and its main intent is to reinforce the 2005 Guidance's risk management framework and update the Agencies' expectations regarding customer authentication, layered security, or other controls in the increasingly hostile online environment.

article thumbnail

Document Capture Automation Tools to Improve the Way You Work With Data

AIIM

Your business deals with documents on a constant basis. Without technology in place, organizing the different types of files and contact points for written communication can be intense. You might have paper contracts, email and attachments, faxes, and web forms all integral to the same client or customer file. This is where capture automation becomes effective in streamlining your productivity and organizational ability.

ECM 97
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How to Lock Down Your Facebook Privacy Settings

WIRED Threat Level

Friends, friends of friends, advertisers; keeping track of Facebook's privacy settings can get confusing. Here's how to get yours just right.

Privacy 111
article thumbnail

Why the cybersecurity industry should care about Open Source maintenance

Thales Cloud Protection & Licensing

In June of this year, Thales eSecurity joined the Core Infrastructure Initiative (CII), a project both founded and managed by The Linux Foundation, with the aim of collaboratively enhancing and strengthening the security and resilience of critical Open Source projects. Many of the world’s largest technology companies already belong to the CII, with Thales being officially recognised as the first global security firm to join the initiative.

article thumbnail

ENISA: Software vulnerability prevention initiatives

Data Breach Today

The European Network and Information Security Agency, ENISA, has compiled a list of existing initiatives focused on finding and preventing software vulnerabilities.

article thumbnail

3 Key Objectives Typically at the Heart of a Content Integration Initiative

AIIM

Technical complexity, and in some cases vendor lock-in, make it very difficult to connect all of the various content systems that typically exist in every organization and access the right content. And that has a negative impact on the productivity of your knowledge workers and on your organization's ability to respond in a timely manner to changing market conditions.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

OnePlus Phones Have an Unfortunate Backdoor Built In

WIRED Threat Level

Every OnePlus model except for the original shipped with "Engineer Mode," essentially a backdoor for anyone who get their hands on your device.

Security 107
article thumbnail

5 tips for machine learning success outside of Silicon Valley

IBM Big Data Hub

Machine learning concerns in Silicon Valley tend to be different from those elsewhere in the U.S. — and outside of the U.S. So, here are five tips for those hearing about machine learning efforts in Silicon Valley, but who work elsewhere. These suggestions consider where machine learning and data science are headed on a large scale — as opposed to the fascinating (but often narrow) research happening in Silicon Valley.

article thumbnail

Australian InfoSec Analysts Hit With Restraining Orders

Data Breach Today

Did Disagreements on Social Media Go Too Far? What started as robust debates over social media among computer security professionals has turned into a drawn-out, bitter battle that has found its way into the Australian courts. The disputes highlight how those who foresake polite debate for legal battles may find themselves being called to account.

Security 150
article thumbnail

A pre-Thanksgiving Second Helping - 7 Tip Sheets, 4 eBooks and 4 Guest Columns

AIIM

Here are some eBooks, Guest Columns, and Tip Sheets you may have missed. A Thanksgiving treat. 7 Tip Sheets. Simple-Minded Migration is not the Solution to Content Modernization. 3 Ways to Look at the Next Generation of Information Management Challenges. 5 Reasons We Need a New Approach to Content Management. Conquering Information Chaos with Intelligent Information Management.

ECM 89
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

RIM policies and procedures: what they are and why you need them

TAB OnRecord

One of the most important, yet overlooked, components of a records and information management program is the RIM policies and procedures manual. Why you need it Managing corporate information through oral procedures, random resolutions and proprietary decisions can lead to confusion and inefficiency, and will not stand up well under legal scrutiny. Documenting your RIM… Read More.

article thumbnail

How One Woman's Digital Life Was Weaponized Against Her

WIRED Threat Level

A rare court case exposes the all-too-common horror of online harassment that followed when one woman broke off a relationship.

Security 111
article thumbnail

UK Cybersecurity Center Issues 'The Dark Overlord' Alert

Data Breach Today

Block Cyber-Extortion Bogeyman du Jour Using Long-Recommended Security Basics Want to stop the latest cybercrime bogeyman? For the umpteenth time, put in place well-known and proven strategies for repelling online attacks, such as the Australian Signals Directorate's top 4 mitigation strategies for repelling targeted cyber intrusions.

article thumbnail

Implementing Information Management on SharePoint and Office365

AIIM

It's hard to overestimate the impact of SharePoint on the information management market. Since its humble beginnings in 2001, it has grown to nearly 200 million seats and is found in every industry sector. If you're reading this blog post, you likely have SharePoint in your organization. But SharePoint can't magically make your information more accessible.

ROT 87
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How much should organisations spend on cyber security?

IT Governance

Cyber attacks and data breaches are becoming so common that all organisations are likely to be hit at some point. Some organisations might use this as an excuse not to invest in cyber security, but it’s possible to reduce the risk and subsequent damage of an attack – and that option is a lot more affordable than waiting until it’s too late. For example, Maersk announced (warning: paywall) that it lost up to $300 million (about £225 million) after it was hit by NotPetya, and it still had to deal

article thumbnail

OpenText File Intelligence

OpenText Information Management

Essentially, all organizations need to find and manage content for information governance or regulatory compliance and also for internal or regulatory investigations. Responding in a quick and cost-effective manner is directly related to how effectively an organization can identify, collect, analyze and act on all relevant information. Since most business communications and activities take place … The post OpenText File Intelligence appeared first on OpenText Blogs.

article thumbnail

DHS Official: No Proof Kaspersky Software Used to Hack Fed IT

Data Breach Today

Panel Told Most Agencies Have Complied with Directive to Stop Using Kaspersky Wares A top DHS cybersecurity official says she has seen no conclusive evidence that Russian-owned Kaspersky Lab's security software had been exploited to breach federal information systems. Jeanette Manfra told a House panel most agencies have complied with a directive to stop using Kaspersky software.

IT 145
article thumbnail

Calling all Slack, Teams, Yammer, Workplace, Jabber (etc.) users

AIIM

I'm doing a short bit of research on retention and preservation strategies re information on enterprise collaboration (i.e., internal social media) platforms. It's a pretty quick survey. One preliminary data point just FYI -- of the 36 instances of one of these platforms I've looked at, only 11 have a retention policy re this content. Yikes. How about your organization?

IT 80
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Data Science for All: What is it? Why care? How do I get it?

IBM Big Data Hub

Organizations everywhere, from massive governments to the smallest start-ups, are in a race for the best-possible data expertise and tools. To help your team understand the data science journey, IBM created the Data Science for All webcast.

article thumbnail

Watch a 10-Year-Old Beat Apple's Face ID on His Mom's iPhone X

WIRED Threat Level

Yes, twins can unlock each other's iPhones. But kids accessing their parents' devices raises different concerns.

Access 111
article thumbnail

Researcher: McAfee URL Security Service Gave Pass to Trojan

Data Breach Today

But ClickProtect Worked as Designed, McAfee Contends A security service from McAfee designed to scan and block malicious links sent via email appears to have given a free pass to "Emotet" banking malware, a researcher warned. But McAfee contends that its ClickProtect service worked as intended.

Security 149