Sat.Jun 02, 2018 - Fri.Jun 08, 2018

article thumbnail

New Data Privacy Regulations

Schneier on Security

When Marc Zuckerberg testified before both the House and the Senate last month, it became immediately obvious that few US lawmakers had any appetite to regulate the pervasive surveillance taking place on the internet. Right now, the only way we can force these companies to take our privacy more seriously is through the market. But the market is broken.

article thumbnail

Cryptocurrency: A Gold Mine for Open-Source Intelligence

Data Breach Today

Expert Says Virtual Currency Systems Leak Useful Data to Track Criminals Experts have long warned that bitcoin is not as private as it appears. The very design of bitcoin, as well as some other virtual currencies, can lend a surprising amount of information about the groups using it to transact. In fact, it's sometimes easier to track than if criminals used the banking system.

Mining 160
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 10 EIM software benefits for your enterprise in 2018

OpenText Information Management

Enterprise Information Management (EIM) is rapidly becoming a ‘must have’ for many organizations. It helps deliver the value in enterprise information by making it accessible, meaningful, accurate, timely and secure. In this blog, we look at the key benefits in implementing an effective enterprise-wide EIM strategy can bring to your company. Today, the advance of … The post Top 10 EIM software benefits for your enterprise in 2018 appeared first on OpenText Blogs.

Access 45
article thumbnail

Australia drafts laws forcing Facebook and Google to reveal encrypted data

The Guardian Data Protection

Security agencies would be given access to encrypted messaging apps under bid to ‘modernise’ laws Technology companies such as Facebook and Google would be forced to give Australian security agencies access to encrypted data under legislation to be introduced by the Turnbull government. But the government has refused to say how the security agencies would access the data.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Ten best practices for a successful RIM training program – Part one

TAB OnRecord

As you begin new records and information management programs, you will inevitably encounter the challenge of how to train employees and enlist their cooperation. In this two-part blog post, we share the ten best practices for a successful records and information management training program. Obtain senior management endorsement Your training program will have its [.

More Trending

article thumbnail

Crime Fighting Gets High-Tech Advances Palantir, Axom, and More

WIRED Threat Level

Beyond big data, officers are increasingly turning to software and ­predictive analytics from companies like Palantir to anticipate when and where misdeeds are likely to occur.

article thumbnail

How to prepare for a penetration test

IT Governance

Conducting a successful penetration test is a challenge for even the most experienced tester. It involves much more than simply running tools and probing systems. Rather, it requires a lot of skill and experience, as testers need to know what vulnerabilities to look for, where to find them and how to exploit them. However, penetration testing isn’t a dark art.

article thumbnail

5 Tips for Protecting SOHO Routers Against the VPNFilter Malware

Dark Reading

Most home office users need to simply power cycle their routers and disable remote access; enterprises with work-at-home employees should move NAS behind the firewall.

Access 90
article thumbnail

GDPR: UK Privacy Regulator Open to Self-Certification

Data Breach Today

Focus on Continuous Compliance and Breach Response, Experts Say One day, organizations may be able to self-certify their GDPR compliance, says an official at the U.K.'s data privacy regulator. Regardless, experts recommend that organizations ensure they are focusing on continuous GDPR compliance and regularly testing their data breach response plans.

GDPR 171
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Britannica Insights Is a Chrome Extension to Fix False Google Results

WIRED Threat Level

Encyclopedia Britannica released a Chrome extension designed to fix Google's sometimes inaccurate "featured snippets.".

Security 105
article thumbnail

GP practice fined £35K for failing to secure medical records

IT Governance

The Information Commissioner’s Office (ICO) has fined London surgery Bayswater Medical Centre (BMC) £35,000 after highly sensitive medical information was left unsecured in an empty building. According to the ICO, the data was left exposed for more than 18 months – this included medical records, prescription information and patient identifiable medicines.

article thumbnail

MyHeritage Alerts Users to Data Breach

Dark Reading

A researcher found email addresses and hashed passwords of nearly 92.3 million users stored on a server outside MyHeritage.

article thumbnail

Another Fitness App Exposes Users' Data

Data Breach Today

Independent Researcher Finds PumpUp Data Was Accessible on Unsecured Amazon Server For at least the third time in recent months, a mobile fitness app maker apparently has exposed consumers' sensitive personal information. The latest app to expose data: PumpUp.

Access 168
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

What Will Microsoft's GitHub Buy Mean For Controversial Code?

WIRED Threat Level

The tech giant will officially acquire the legendary developer platform. The question now is what happens to some of the code it hosts.

IT 98
article thumbnail

Germany: First court decision on GDPR

DLA Piper Privacy Matters

Only five days after the GDPR became applicable, the first German court, the Regional Court ( Landgericht ) Bonn (in a decision dated 29 May 2018, case number 10 O 171/18 – in German only), issued a ruling on the practical application of the GDPR. This probably makes the court’s ruling the first GDPR court decision worldwide, and the decision addressed the hot-button issue of public availability of ICANN “WHOIS data”.

GDPR 75
article thumbnail

Facebook Bug Sets 14M Users' Settings to 'Public'

Dark Reading

The default sharing setting was accidentally changed for millions of accounts during a four-day period last month.

106
106
article thumbnail

Congress Considers Ways to Beef Up Healthcare Cybersecurity

Data Breach Today

At Hearing, and in Letter, Concerns Raised About Confusion Over HHS's Role Congress is considering how to help beef up the healthcare sector's preparedness and response to cyber threats. But why is there so much confusion about the role of the Department of Health and Human Services?

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

7 GDPR readiness success stories to inspire any company

IBM Big Data Hub

Businesses are likely to look back on the early days of the GDPR and tell stories about how their relationships with customers changed forever. What will your story be?

GDPR 77
article thumbnail

WannaCry Hero Marcus Hutchins' New Legal Woes Spell Trouble for White Hat Hackers

WIRED Threat Level

By expanding the case against Marcus Hutchins, the Department of Justice has signaled a troubling interpretation of cybersecurity law.

article thumbnail

Researcher Succesfully Hacked In-Flight Airplanes - From the Ground

Dark Reading

IOActive researcher will demonstrate at Black Hat USA how satellite equipment can be 'weaponized.

107
107
article thumbnail

Geneology Service MyHeritage Leaked 92 Million Credentials

Data Breach Today

Company Says No Indications Data Family Trees, DNA Results Affected The geneology service MyHeritage says a security researcher found 92 million email addresses and hashed passwords for its users on a private external server. The company, however, says there's no evidence of abnormal account activity or indications family trees or DNA results were affected.

Passwords 154
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Why digital business needs a trusted data foundation

IBM Big Data Hub

This is an era in which everything has become digital. We live in the data-driven society. The difficulty is that all this digital technology still doesn’t totally cooperate.

74
article thumbnail

The GDPR: What do I need to do?

IT Governance

Although the EU General Data Protection Regulation (GDPR) has come into effect, a large number of organisations are not yet compliant. A Ponemon Institute survey found that almost half of companies would not meet the 25 May 2018 deadline. So, if you haven’t finished your compliance project or have only just started, don’t panic – you’re not alone. To help, IT Governance has created a checklist to highlight the essential steps your organisation must take in order to become GDPR compliant.

GDPR 73
article thumbnail

Sidley Updates Bloomberg Portfolio on FTC Enforcement of Privacy & Data Security

Data Matters

Sidley Austin has recently updated its “FTC Enforcement of Privacy & Data Security,” which has been published as part of Bloomberg Law’s Privacy & Data Security Practice Portfolio, Portfolio No. 500, available here. This updated and enhanced portfolio explains the enforcement authorities, powers, and limitations of the Federal Trade Commission (FTC), and its ever-evolving role as the de facto United States privacy and information security regulator in many sectors.

Privacy 60
article thumbnail

Medical Device Cyber Vulnerabilities: More Alerts

Data Breach Today

Healthcare Organizations Face Challenge of Tracking, Mitigating All the Risks Identified The Department of Homeland Security has issued two more alerts about cyber vulnerabilities in certain medical devices. The stream of recent advisories is helping to draw more attention to the importance of addressing device security. But healthcare providers face the challenge of tracking and mitigating all risks.

Risk 127
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to optimize your business decision-making

IBM Big Data Hub

Decision-makers across many different industries are making complex decisions every day that involve optimizing trade-offs to make the right business choices.

77
article thumbnail

Coca-Cola data breach affects thousands of employees

IT Governance

It has been revealed that Coca-Cola suffered a data breach in September 2017, but was asked not to disclose it by law enforcement while the incident was being investigated. The breach occurred when a former employee took a hard drive containing the personal data of about 8,000 Coca-Cola employees. A Coca-Cola spokesperson said: “We are issuing data breach notices to about 8,000 individuals whose personal information was included in computer files that a former employee took with him when he left

article thumbnail

Web Application Firewalls Adjust to Secure the Cloud

Dark Reading

Cloud-based WAFs protect applications without the costs and complexity of on-prem hardware. Here's what to keep in mind as you browse the growing market.

Cloud 74