Sat.Jan 06, 2018 - Fri.Jan 12, 2018

article thumbnail

Speaking of: Blockchain (with Alan Pelz-Sharpe)

Weissman's World

If a picture is worth 1000 words, then what’s a 15-minute video worth? Tons, especially when the subject is blockchain, and the guest expert is Alan Pelz-Sharpe! Join our discussion of the disruptive force blockchain will prove to be in records and information governance. The post Speaking of: Blockchain (with Alan Pelz-Sharpe) appeared first on Holly Group.

article thumbnail

Toymaker VTech Settles FTC Privacy Lawsuit For $650,000

Data Breach Today

Message From FTC to Toymakers: Don't Mess With Kids' Privacy One of the most alarming breaches of 2015, involving Hong Kong toymaker VTech, has resulted in a $650,000 settlement with the U.S. Federal Trade Commission. It's a warning that internet of things security shortcomings - especially involving children's personal data - will have business consequences.

Privacy 169
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Steven Clark AIIM18 Speaker Interview

AIIM

Here’s your chance to get to know our AIIM18 speakers a little better before you get to San Antonio and see them live. We can’t wait to see you April 11-13th. Name Steven Clark. Email steven_f_clark@raytheon.com. LinkedIn Profile [link]. Job Title Company Record Manager. Company Raytheon. Please provide one or two points that you will mention during your session Content analytics can be used to your advantage but it does take time and dedication.

article thumbnail

How Meltdown and Spectre Were Independently Discovered By Four Research Teams At Once

WIRED Threat Level

The uncanny coincidences among the Meltdown and Spectre discoveries raise questions about "bug collisions"—and the safety of the NSA's hidden vulnerability collection.

Security 111
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Profile of the Month: Cindy Provin, Chief Executive Officer

Thales Cloud Protection & Licensing

Cindy Provin is a 20-year veteran at Thales. This month, she became the CEO for Thales eSecurity. Previously, she served as the President for Thales eSecurity Americas, and Chief Strategy & Marketing Officer for Thales eSecurity. In her new role as CEO, Cindy will be responsible for leading a world-class organization and delivering a portfolio of security solutions to protect data wherever it is created, shared or stored.

More Trending

article thumbnail

Tammy Mackenzie AIIM18 Speaker Interview

AIIM

Here’s your chance to get to know our AIIM18 speakers a little better before you get to San Antonio and see them live. We can’t wait to see you April 11-13th. Name Tammy Mackenzie. Email Tammymackenziee@gmail.com. LinkedIn Profile [link]. Job Title Document Manager. Company Aecon. Please provide one or two points that you will mention during your session. 1) Planning leads to success. 2) Have the Right people, right places, right time.

article thumbnail

Data protection bill amended to protect security researchers

The Guardian Data Protection

Exemption added after researchers said efforts to demonstrate inadequate anonymisation could fall foul of law The government is to amend the data protection bill to protect security researchers who work to uncover abuses of personal data, quelling fears that the bill could accidentally criminalise legitimate research. The move follows a Guardian report on the concerns , and has been welcomed by one of the researchers who raised the alarm.

article thumbnail

Skype Introduces End-to-End Encrypted Texts and Voice

WIRED Threat Level

After years of lingering questions about Skype's commitment to protecting user data, it will soon offer end-to-end encryption to its 300 million monthly users.

article thumbnail

Microsoft Pauses Windows Security Updates to AMD Devices

Data Breach Today

Security Update Leaves Some Devices Unbootable; Microsoft Blames AMD Microsoft has paused issuing security updates to some Windows PCs with AMD chipsets after at least one update - meant to add some Meltdown and Spectre mitigations - has left some systems unbootable. Microsoft blamed the problem on AMD failing to properly document its firmware.

Security 167
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Gina Smith-Guidi AIIM18 Speaker Interview

AIIM

Name Gina Smith-Guidi. Email gina.guidi@edmonton.ca. Job Title Principal Information Manager. Company City of Edmonton. Please provide one or two points that you will mention during your session. - Implement solutions that work behind the scenes and do not change the way people work - Approach challenges with a flexible, unconventional mindset. Where do you see the information management industry in 5 years?

article thumbnail

Best of TAB 2017 part 4: the top guides

TAB OnRecord

Today, we wrap up a four-part series on the top RIM resources of 2017, as chosen by your colleagues. In this final installment, we bring you the year’s most popular records management guides. These informative and practical tools cover the following common issues: document imaging, RIM software, and functional classification. 1. A best practice template [.

article thumbnail

How the Government Hides Secret Surveillance Programs

WIRED Threat Level

A new report from Human Rights Watch sheds light on a troubling law enforcement practice called “parallel construction.”.

article thumbnail

Backdoored in 30 Seconds: Attack Exploits Intel AMT Feature

Data Breach Today

Physical Access Plus Default AMT Credentials Equals Takeover, F-Secure Warns An attacker who gains physical access to a corporate PC with an Intel chip could exploit the built-in Active Management Technology to backdoor the system in about 30 seconds, unless default AMT credentials have been changed, Finnish security firm F-Secure warns.

Access 160
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Daniel Abdul AIIM18 Speaker Interview

AIIM

Here’s your chance to get to know our AIIM18 speakers a little better before you get to San Antonio and see them live. We can’t wait to see you April 11-13th. Name Daniel Abdul. Email daniel.abdul@gmail.com. LinkedIn Profile [link]. Job Title VP Data Solutions Strategy and Commercial Solutions. Company UHG. Please provide one or two points that you will mention during your session.

article thumbnail

AI in Cybersecurity: Where We Stand & Where We Need to Go

Dark Reading

How security practitioners can incorporate expert knowledge into machine learning algorithms that reveal security insights, safeguard data, and keep attackers out.

article thumbnail

Congress Renews FISA Warrantless Surveillance Bill For Six More Years

WIRED Threat Level

The House of Representatives Thursday strengthened spying powers authorized under Section 702 of the 2008 FISA Amendments Act.

Security 110
article thumbnail

Patch Now or Risk GDPR Fines Later, Regulator Warns

Data Breach Today

Failures Discovered After Privacy Law Takes Effect Face Retroactive Punishment Following the alert over Meltdown and Spectre vulnerabilities, the U.K. Information Commissioner's Office is warning that failures to patch today could be punished with fines under GDPR, once enforcement of the data protection law begins later this year.

GDPR 155
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Sophisticated cyber attacks are biggest technology concern in 2018

IT Governance

Cyber attacks and breaches are becoming a daily occurrence. In December 2017 we reported that 33.8 million records had been leaked, and in November 2017 there were 59 million records leaked. Targeted attacks by skilled and persistent cyber criminals are now a business reality. Cyber attacks have become more sophisticated and attackers use a variety of tactics: Social engineering: manipulation through phishing, vishing, smishing, etc.

article thumbnail

Envisioning new and hidden realities with data and augmented reality—a digital “twin city” example

CGI

Envisioning new and hidden realities with data and augmented reality—a digital “twin city” example. pooja.cs@cgi.com. Wed, 01/10/2018 - 15:25. Ten years ago, I had three devices connected to my home Internet, used intermittently, allowing my family and me to be more efficient, flexible, informed, and entertained. Now, I have 33 devices, collectively connected to the Internet, 24x7.

Mining 78
article thumbnail

WhatsApp Encryption Security Flaws Could Allow Snoops to Slide Into Group Chats

WIRED Threat Level

German researchers say that a flaw in the app's group-chat feature undermines its end-to-end encryption promises.

article thumbnail

Carphone Warehouse Breach: 'Striking' Failures Trigger Fine

Data Breach Today

Attacker Breached WordPress Installation Outdated by 6 Years Mobile phone retailer Carphone Warehouse has been hit with one of the largest fines ever imposed by Britain's data privacy watchdog after an attacker breached its outdated WordPress installation, exposing 3 million customers' and 1,000 employees' personal details.

Retail 162
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Think you’re not susceptible to phishing? Think again

IT Governance

Phishing is big business for cyber criminals. According to PhishMe’s Enterprise Phishing Resiliency and Defense Report 2017 , phishing attacks rose by 65% last year, with the average attack costing mid-sized companies $1.6 million (about £1.2 million). This is despite many respondents claiming that they are no longer fooled by cyber criminals’ most common techniques to trick people into clicking malicious links and opening emails.

article thumbnail

Around the world with OpenText

OpenText Information Management

From Brazil to Ireland to Canada, Cacio Neto has had an exciting journey with OpenText. In this Careers & Culture blog, Cacio describes his experience to date: I joined OpenText in my home country of Brazil four years ago. I was the first SAP Professional Services Consultant in South America for Vendor Invoice Management (VIM). … The post Around the world with OpenText appeared first on OpenText Blogs.

75
article thumbnail

Tech Companies Are Complicit in Censoring Iran Protests

WIRED Threat Level

Opinion: Google, Twitter, and Signal should take steps to ensure their tools aren’t restricting Iranian’s free speech.

Security 106
article thumbnail

Performance Hit: Meltdown and Spectre Patches Slow Systems

Data Breach Today

Intel, Microsoft and Linux Confirm Slowdowns - Especially For Servers, Older PCs Fixes for the Meltdown and Spectre vulnerabilities are leading to decreased processor performance, triggering cloud service and data center slowdowns. All Windows servers - plus older PCs - as well as Linux servers appear to be experiencing noticeable slowdowns.

Cloud 162
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

New Cryptocurrency Mining Malware Has Links to North Korea

Dark Reading

A malware tool for stealthily installing software that mines the Monero virtual currency looks like the handiwork of North Korean threat actors, AlienVault says.

Mining 76
article thumbnail

What is Enterprise Information Management (EIM)?

OpenText Information Management

Enterprise Information Management (EIM) can best be defined as a set of technologies, processes, disciplines and practices used to manage an organization’s data and content as an enterprise asset. It’s not a new concept but its importance to large organisations is growing rapidly. Frost and Sullivan has estimated that enterprise-level data grows at the rate … The post What is Enterprise Information Management (EIM)?

IT 71
article thumbnail

Meltdown and Spectre Vulnerability Fixes Have Started, But Don't Solve Everything

WIRED Threat Level

Meltdown and Spectre Fixes Arrive—But Don't Solve Everything.

Security 131