Sat.May 19, 2018 - Fri.May 25, 2018

article thumbnail

Blockchain Unchained - Discovering its Potential in Information Management

AIIM

Blockchain is the hot topic of the IT industry – the explosive and rapid growth of BitCoin has taken the obscure technology of distributed ledgers into mainstream consciousness. But the question we want to ask is “ Does Blockchain have a role to play in Information Management? Does it have a role beyond cryptocurrencies? ”. The short answer to that question is yes, and it could become one of the most important innovations for our industry in decades.

article thumbnail

History Hub: A 21st Century Model for Archival Reference

Archives Blogs

When the National Archives launched History Hub in January 2016, we hoped it would be a game-changing way to provide access to information and diverse sources of expertise. I’m pleased to share that what started out as an experimental project has become an active community of researchers and experts. The idea for History Hub began with research into how organizations can best communicate with and serve their audiences.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

‘Significant’ FBI Error Reignites Data Encryption Debate

WIRED Threat Level

FBI stats about inaccessible cellphones were inflated, undermining already controversial bureau claims about the threat of encryption.

article thumbnail

Legacy Content Migration: Urgent Need is Largely Invisible

Weissman's World

Fun fact: an estimated 75% of today’s content management solutions were installed before the year 2010 – meaning that most organizations are now depending upon systems that at best are dated, and at are worst dangerously close end-of-life. This being the case, you’d think that folks would be working hard to move their legacy content […]. The post Legacy Content Migration: Urgent Need is Largely Invisible appeared first on Holly Group.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

FBI Seizes Domain Controlling 500,000 Compromised Routers

Data Breach Today

Sinkholing Should Help Mitigate 'VPN Filter' Outbreak At least 500,000 routers, mostly located in Ukraine, have been infected with "VPN Filter" malware that experts believe is a prelude to a massive cyberattack. But the FBI has reportedly sinkholed the control domain for the router botnet, which should help contain the potential damage.

189
189

More Trending

article thumbnail

Most GDPR emails unnecessary and some illegal, say experts

The Guardian Data Protection

Many firms have the required consent already; others don’t have consent to send a request The vast majority of emails flooding inboxes across Europe from companies asking for consent to keep recipients on their mailing list are unnecessary and some may be illegal, privacy experts have said, as new rules over data privacy come into force at the end of this week.

GDPR 111
article thumbnail

RPA - Is it the Answer to Our Dreams of Easier Business Automation?

AIIM

I’ve been involved in some way or another in the world of business process automation (BPM) for over twenty years. I was the author of AIIM’s first BPM training course back in 2006. I’m a big fan of the idea of reengineering business processes, but there is no getting away from the fact that BPM projects are complex and scary – they require buy-in from the top (which is always difficult) and are seldom inexpensive undertakings.

article thumbnail

GDPR Compliance for US Healthcare: What You Need to Know

Data Breach Today

Strict HIPAA compliance is a great preparation for compliance with the European Union's General Data Protection Regulation, which will be enforced starting May 25, according to attorneys Robert Stankey and Adam Greene, who provide compliance insights in an in-depth interview.

article thumbnail

See you at the ARMA Canada Conference!

TAB OnRecord

Are you attending the ARMA Canada 2018 Conference in Vancouver next week? If so, please stop by and visit us at booth #25. You can: play our Going Digital Quiz for a chance to win an instant prize get our latest white paper, Lessons from the Front-lines of Digital Transformation learn how TAB’s solutions can [.] Read More. The post See you at the ARMA Canada Conference!

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Dominic Cummings is the true cowardly face of the Brexiters | Nick Cohen

The Guardian Data Protection

Vote Leave’s director refuses to go before the Commons. He fears the truth will out Dominic Cummings is just a troll. He may have trolled the whole country and changed the course of British history, but he’s still the man with an egg for a face, who screams everyone must be accountable for their actions – everyone except him. MPs who want to question Cummings about the finances of his Vote Leave campaign are “grandstanding” fools spreading “fake news”.

IT 111
article thumbnail

Don’t Freak Out About That Amazon Alexa Eavesdropping Situation

WIRED Threat Level

You should certainly understand the risks of having a smart speaker in your home, but there’s a perfectly good explanation for how that rogue message might have gotten sent.

Risk 88
article thumbnail

GDPR a Litmus Test for Cross-Border Privacy Attitudes

Data Breach Today

Rather Than Honor Europeans' Data Privacy Rights, Some Organizations Exit EU To judge by the flood of GDPR-themed email hitting inboxes, Europe's privacy law has been designed to ensure that you say "yes" to companies that monetize the buying and selling of your personal details, regardless of whether you remember ever having done business with them before.

GDPR 154
article thumbnail

How to document the scope of your ISMS

IT Governance

If you’re planning to implement an information security management system (ISMS), you’ll need to document the scope of your project – or, in other words, define what information needs to be protected. There will almost certainly be more information and more locations where information is kept than you initially think of, so it’s essential that you take the time to scope your organisation.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

'I felt exposed online': how to disappear from the internet

The Guardian Data Protection

Worried about what’s out there about you? You’re not alone. But is it even possible to become a digital ghost? Early one morning last year, before the birds were up, Tio Bucard, his wife and children skittered down the path from their home in a tiny French village towards a black SUV, its engine running. As Bucard drove to the local airport, he checked his rear-view mirror every few moments to see that he was still being followed by Frank Ahearn , a 54-year-old American with a peppery beard and

Privacy 108
article thumbnail

Stealthy, Destructive Malware Infects Half a Million Routers

WIRED Threat Level

Cisco researchers discover a new router malware outbreak that might also be the next cyberwar attack in Ukraine.

Security 109
article thumbnail

Sharing HIPAA Fines With Victims: Will It Ever Happen?

Data Breach Today

HITECH Act Mandated Sharing the Wealth, But Rulemaking Has Stalled Will federal regulators finally tackle long overdue rulemaking related to a HITECH Act provision calling for the Department of Health and Human Services to share money collected from HIPAA settlements and penalties with breach victims?

IT 151
article thumbnail

Weekly podcast: the GDPR is here

IT Governance

The General Data Protection Regulation is now in force. Don’t panic. Hello and welcome to the IT Governance podcast for Friday, 25 May 2018, the day the EU’s General Data Protection Regulation (the GDPR) – the first major update to European data protection law in more than 20 years – applies across Europe and around the world. Frankly, there’s more than enough material out there for you to plough through at the moment without me adding to it by reiterating the six data processing principle

GDPR 70
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

What is GDPR and how will it affect you?

The Guardian Data Protection

The EU’s General Data Protection Regulation comes into force this week – here’s what it means You could be forgiven for thinking that Europe’s General Data Protection Regulation (GDPR) is a law created to fill your inbox with identikit warnings from every company you have ever interacted with online that “the privacy policy has changed” and pleas to “just click here so we can stay in touch”.

GDPR 104
article thumbnail

How the LAPD Uses Data to Predict Crime

WIRED Threat Level

The Los Angeles Police Department is using "predictive policing" to prevent crime, but this innovative approach has its problems.

IT 98
article thumbnail

Europe's Strong GDPR Privacy Rules Go Into Full Effect

Data Breach Today

It's May 25: Do You Know What Your Data Protection Polices Are? The EU's General Data Protection Regulation has gone into full effect as of May 25, 2018. After a two-year grace period following the passage of the legislation, member states' data privacy watchdogs are now enforcing the strong privacy rules, which offer worldwide protection for Europeans.

Privacy 150
article thumbnail

GDPR Day is Here!

Data Matters

Whether you are marking today with a glass of champagne, a shot of whiskey, or a hot cup of tea, today marks a significant day for privacy professionals world-wide. Here’s to all of the privacy professionals who have put in so many hours to prepare for the GDPR, fully effective as of Friday May 25, 2018 at midnight in Brussels; that is 6 PM eastern on Thursday, May 24th for toasting purposes.

GDPR 60
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Facebook and Google targeted as first GDPR complaints filed

The Guardian Data Protection

Companies have forced users into agreeing to new terms of service, says EU consumer rights organisation Facebook and Google have become the targets of the first official complaints of GDPR noncompliance, filed on the day the privacy law takes effect across the EU. Across four complaints, related to Facebook, Instagram, WhatsApp and Google’s Android operating system, European consumer rights organisation Noyb argues that the companies have forced users into agreeing to new terms of service, in br

GDPR 102
article thumbnail

A Location-Sharing Disaster Shows How Exposed You Really Are

WIRED Threat Level

The failures of Securus and LocationSmart to secure location data are the failures of an entire industry.

Security 103
article thumbnail

Malware Attacks: A Tale of Two Healthcare Incidents

Data Breach Today

Time for Detection, Mitigation Can Vary Widely Depending on Circumstances Two recently disclosed malware attacks in the healthcare sector illustrate that detection and mitigation of such attacks can be rapid, or it can take many months.

IT 145
article thumbnail

FCC Asks for Input After ACA International v. FCC

Data Matters

The TCPA bar has been reeling ever since the D.C. Circuit overturned a couple of key FCC rules in ACA International v. FCC , including the FCC’s overbroad interpretation of the definition of an autodialer. However, the ruling still left several key provisions in place that facilitate the potential for significant liability and sow uncertainty for everyday business and compliance operations.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Last-minute frenzy of GDPR emails unleashes 'torrent' of spam – and memes

The Guardian Data Protection

Inboxes around the world are clogging up as deadline for companies to comply with new regulations nears A last-minute flurry of emails from companies trying to retain customers ahead of the deadline for Europe’s new General Data Protection Regulation (GDPR) has prompted a slew of complaints - and memes - on social media. Friday is the last day for companies to comply with GDPR regulations and as a result, inboxes around the world are clogging up with emails warnings that “the privacy policy has

GDPR 100
article thumbnail

After Meltdown and Spectre, Another Scary Chip Flaw Emerges

WIRED Threat Level

A new processor vulnerability known as Speculative Store Bypass could expose user data on a huge swath of devices.

article thumbnail

Spectre and Meltdown Flaws: Two More Variants Discovered

Data Breach Today

More CPU Flaws Found in Intel, AMD, ARM and IBM Power Processors Researchers have discovered two new Spectre/Meltdown variants: variant 3a, a rogue system register read, and variant 4, a speculative store bypass. Some AMD, ARM, Intel and IBM Power chips have the flaws, which attackers could exploit to steal sensitive data. Some fixes have already been shipped.

140
140