California Unanimously Passes Historic Privacy Bill
WIRED Threat Level
JUNE 28, 2018
The law will give Californians more control over the data that companies collect on them than ever before.
WIRED Threat Level
JUNE 28, 2018
The law will give Californians more control over the data that companies collect on them than ever before.
Schneier on Security
JUNE 27, 2018
The IEEE came out in favor of strong encryption: IEEE supports the use of unfettered strong encryption to protect confidentiality and integrity of data and communications. We oppose efforts by governments to restrict the use of strong encryption and/or to mandate exceptional access mechanisms such as "backdoors" or "key escrow schemes" in order to facilitate government access to encrypted data.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
eSecurity Planet
JUNE 26, 2018
Stopping a DDoS attack quickly is critical for the survival of your business. Here are six ways you can stop a DDoS attack.
Krebs on Security
JUNE 26, 2018
Previous stories here on the proliferation of card-skimming devices hidden inside fuel pumps have offered a multitude of security tips for readers looking to minimize their chances of becoming the next victim, such as favoring filling stations that use security cameras and tamper-evident tape on their pumps. But according to police in San Antonio, Texas, there are far more reliable ways to avoid getting skimmed at a fuel station.
Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage
Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.
Data Breach Today
JUNE 28, 2018
2 Terabyte Database Includes Up To 150 Fields With US Consumers' Data A computer security researcher has discovered a vast marketing database containing 340 million records on U.S. consumers. The database is the latest in a long line of databases to have been left exposed to the internet without authentication, thus putting people's personal data at risk.
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
AIIM
JUNE 26, 2018
Now that the EU General Data Protection Regulation (GDPR) is in force organizations are ramping up their efforts to re-fresh data subject consent obtained prior to GDPR and under the EU Data Protection Directive 95/46/EC by virtue of which opt-out, or implied consent was permissible. There seems to be divergent opinions relating to the requirement to undertake re-permissioning of data subject consent under GDPR.
Krebs on Security
JUNE 28, 2018
Many people, particularly older folks, proudly declare they avoid using the Web to manage various accounts tied to their personal and financial data — including everything from utilities and mobile phones to retirement benefits and online banking services. The reasoning behind this strategy is as simple as it is alluring: What’s not put online can’t be hacked.
Data Breach Today
JUNE 28, 2018
Hacker Modified JavaScript Chatbot to Scrape Customers' Card Payment Details Ticketmaster is warning customers that it suffered a data breach after an attacker modified its third-party chatbot software to steal customers' payment card details. Software provider Inbenta Technologies says Ticketmaster should never have been running the JavaScript software on a payments page.
WIRED Threat Level
JUNE 27, 2018
The leak may include data on hundreds of millions of Americans, with hundreds of details for each, from demographics to personal interests.
Advertisement
Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.
AIIM
JUNE 25, 2018
Artificial intelligence has the ability to change our lives for the better. Increasingly, businesses are looking to automation to complete tasks in a more cost effective and efficient manner. Unfortunately, automation may lead to job loss. In fact, the finance, manufacturing, and service industries have already cut jobs due to automation. While there are certainly risks posed by the advancement of AI, there are also several benefits.
Data Matters
JUNE 29, 2018
On June 28, 2018, California Gov. Jerry Brown signed into law the California Consumer Privacy Act of 2018 (AB 375). According to the bill’s author, it was consciously designed to emulate the new European General Data Protection Regulation (GDPR) that went into effect on May 25, and if and when it goes into effect, it would constitute the broadest privacy law in the United States.
Data Breach Today
JUNE 25, 2018
ACLU Says Decision 'Provides a Groundbreaking Update to Privacy Rights' The U.S. Supreme Court has ruled that location data generated by mobile phones is protected by the Fourth Amendment, meaning police need "probable cause" before they can access it. The ACLU says the ruling "provides a groundbreaking update to privacy rights" in the digital age.
WIRED Threat Level
JUNE 26, 2018
Trump’s call for a “Space Force” escalates a quiet, dangerous contest between the US, China, and Russia—one whose consequences no one really understands.
Advertisement
Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.
IT Governance
JUNE 27, 2018
2017 was a big year for data breaches. Uber , Equifax and Yahoo all fell victim, and many small organisations also suffered a breach or cyber attack. When it comes to cyber threats, all types of organisations are at risk. Using the findings of our monthly ‘list of data breaches and cyber attacks’ blog posts, we’ve created an infographic that summarises reported data breaches from 2017.
OpenText Information Management
JUNE 26, 2018
If you don’t already know her, it’s time you met Saadia Muzaffar. Saadia is an incredible tech entrepreneur, author, and passionate advocate of responsible innovation. In addition, Saadia is driving forward the agenda of decent work for everyone, prosperity of immigrant talent in STEM careers, and diversity and inclusion in the Canadian technology industry.
Data Breach Today
JUNE 29, 2018
Cloud Forensics, Fraud, Extortion and Cyber Sociology Dominate Edinburgh Event What are hot cybersecurity topics in Scotland? The "International Conference on Big Data in Cyber Security" in Edinburgh focused on everything from securing the internet of things the rise of CEO fraud to the origins of "cyber" and how to conduct digital forensic investigations on cloud servers.
The Guardian Data Protection
JUNE 26, 2018
Watchdogs reveal more data protection complaints and increase in breach notifications The first month of GDPR has seen a sharp increase in the number of complaints to regulators across Europe, showing strong public interest in the new rules. The UK’s Information Commissioner’s Office (ICO) told the Guardian it has seen a rise in breach notifications from organisations, as well as more data protection complaints following the activation of the law.
Advertisement
Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.
Gimmal
JUNE 28, 2018
Below is a blog post by Gimmal Director of Services Karen Goode. Karen is a valuable leader within our Services organization whose passion for process and project execution has driven some of our most successful implementations. Below, she discusses how an effective project execution framework can help organizations see through the chaos of project management and ensure consistency, efficiency, and repeatability throughout all of their processes.
WIRED Threat Level
JUNE 27, 2018
From *Carpenter v. United States* to a landmark bill in California, privacy advocates sense a shift in what people will accept from Facebook, mobile carriers, and more.
Data Breach Today
JUNE 26, 2018
Campaigners Seek Court Sanctions to End Blanket Communications Data Retention Privacy rights groups are calling on the Court of Justice of the European Union to clamp down on at least 17 EU governments that require domestic telecommunications firms to store all communications data, despite the court having ruled that such mass surveillance practices are illegal.
Dark Reading
JUNE 25, 2018
The Wi-Fi Alliance officially launches its latest protocol, which offers new capabilities for personal, enterprise, and IoT wireless networks.
Advertisement
“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.
TAB OnRecord
JUNE 28, 2018
Most organizations are involved in some kind of effort to go digital, to stay digital, or to optimize their digital workplace. In a three-part blog post, we will share lessons from the front-lines of digital transformation. These key takeaways from our work with over 90 percent of the Fortune 500 will provide you with important [.] Read More. The post Lessons from the front-lines of digital transformation – Part one appeared first on TAB Records Management Blog | TAB OnRecord.
WIRED Threat Level
JUNE 25, 2018
With better password security and idiot-proof IoT connections, WPA3 will make your internet experience much, much safer.
Data Breach Today
JUNE 25, 2018
Medical Appointment Booking Platform Says It Obtains Consent Australia's large online medical booking platform, HealthEngine, has become embroiled in a privacy controversy after it reportedly passed personal medical details to a personal injury law firm. HealthEngine maintains it obtained users' consent, but the revelation appears to have caught many by surprise.
IBM Big Data Hub
JUNE 26, 2018
In this Q&A, IBM financial services solution architect Irina Saburova discusses an insurance use case with IBM Data Science Marketing Lead Rosie Pongracz. In this scenario common to the insurance industry, an organization needs to adjust its operations based on upcoming weather event and multiple weather indicators can improve forecast accuracy.
Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO
The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.
Dark Reading
JUNE 26, 2018
Serverless workloads in the cloud can be as secure as traditional applications with the right processes and tools. The key: start small, scale as your application scales, and involve everyone.
Gimmal
JUNE 29, 2018
Technology is an enabler for sure. But w ithout the right resources and direction, it can also be an inhibiter. Once an enterprise decides that all corporate information has the potential of being a corporate asset, the next step is to establish a continuous program to identify, improve, and protect this asset just like any other.
Data Breach Today
JUNE 29, 2018
Software Engineer Profited From Breach Knowledge, Regulator Alleges An Equifax software engineer has settled an insider trading charge with the U.S. Securities and Exchange Commission after he allegedly earned $77,000 after he made a securities transaction based on his suspicion that the credit bureau had suffered a data breach.
Let's personalize your content