Sat.Feb 03, 2018 - Fri.Feb 09, 2018

article thumbnail

Strong, streamlined and secure: How to get the most out of centralized key management

Thales Cloud Protection & Licensing

With organizations around the world now deploying ever-increasing amounts of encryption solutions in an effort to ward off cybercrime, businesses are facing a combination of challenges. Whether it’s varying protection levels, differing operational techniques and policies, or juggling multiple keys, managing more than one encryption system can quickly turn into a complex web that demands time, expertise and money to manage effectively.

article thumbnail

Blockchain for Identity: 6 Hot Projects

Data Breach Today

Distributed Ledgers For Identity and Access Management Have Great Promise Blockchain technology already underpins the boom in cryptocurrencies, but is also being rigorously tested and developed for other applications, including identity and access management. Such projects could make personal data easier to secure and less vulnerable to data breaches.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cabinet of Secret Documents from Australia

Schneier on Security

This story of leaked Australian government secrets is unlike any other I've heard: It begins at a second-hand shop in Canberra, where ex-government furniture is sold off cheaply. The deals can be even cheaper when the items in question are two heavy filing cabinets to which no-one can find the keys. They were purchased for small change and sat unopened for some months until the locks were attacked with a drill.

article thumbnail

New UK data protection rules are a cynical attack on immigrants | Claude Moraes

The Guardian Data Protection

Non-nationals subject to an immigration procedure are to lose the right to access data held about them, in a discriminatory move that worries the European parliament In September, I warned in a Guardian opinion article that the Brexit process could have the effect of allowing the UK government to bring in more draconian and discriminatory immigration laws, harking back to the 70s and 80s.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Three Strategies for Big Data Security

Thales Cloud Protection & Licensing

The 2018 Thales Data Threat Report (DTR) has great information on Big Data use and security. We surveyed more than 1,200 senior security executives from around the world, and virtually all (99%) report they plan to use Big Data this year. Top Big Data Security Concerns. But they rightly have concerns. As the report notes: The top Big Data security issue is that sensitive data can be anywhere – and therefore everywhere – a concern expressed by 34% of global and U.S. respondents.

More Trending

article thumbnail

Air Gap Hacker Mordechai Guri Steals Data With Noise, Light, and Magnets

WIRED Threat Level

Researcher Mordechai Guri has spent the last four years exploring practically every method of stealthily siphoning data off of a disconnected computer.

Security 108
article thumbnail

How State Governments Can Protect and Win with Big Data, AI and Privacy

Bill Schmarzo - Dell EMC

I was recently asked to conduct a 2-hour workshop for the State of California Senior Legislators on the topic of “Big Data, Artificial Intelligence and Privacy.” Honored by the privilege of offering my perspective on these critical topics, I shared with my home-state legislators how significant opportunities await the state. I reviewed the once-in-a-generation opportunities awaiting the great State of California (“the State”), where decision makers could vastly improve their constituents’ qualit

article thumbnail

Digital Transformation starts with the Employees

Thales Cloud Protection & Licensing

This past month, CEOs, elected leaders and academics from around the globe gathered at the World Economic Forum (WEF) in Davos, Switzerland, to discuss the world’s most pressing problems including technological change, global trade, education, sustainability, and gender equality. As in previous years, digital transformation remained a key theme at the event as well as discussions around artificial intelligence (AI) and IoT technologies impacting the workforce.

article thumbnail

Flash Hack: Adobe Updates Plug-in After Zero-Day Attacks

Data Breach Today

Malicious Spreadsheets With Embedded Flash Trace to North Korean Attackers A hacking team dubbed "Group 123" with apparent ties to the government of North Korea has been exploiting a zero-day vulnerability in the Flash browser plug-in, likely to hack high-value targets. Adobe has released an emergency Flash update with security fixes. Or organizations could simply stop using Flash.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Polisis AI Reads Privacy Policies So You Don't Have To

WIRED Threat Level

Polisis, a machine-learning-trained tool, automatically produces readable charts of where your data ends up for any online service.

Privacy 104
article thumbnail

EU data protection law may end up protecting scammers, experts warn

The Guardian Data Protection

WHOIS, one of oldest tools on internet for verifying real identities, at risk of being killed due to tough new GDPR regulations Sweeping new European data protection regulations may have the accidental effect of protecting scammers and spammers by killing the WHOIS system used to link misdeeds online to real identities offline, security experts have warned.

GDPR 86
article thumbnail

City & County of Denver: How to redesign a document-intensive business process – Part 1

TAB OnRecord

When Colorado approved the retail sale of marijuana in 2013, the City & County of Denver was hit with a massive influx of applications from hopeful retailers. The licensing department was soon swamped with a backlog of unprocessed applications. In a two-part blog post we show how they dealt with the backlog and redesigned their [.] Read More. The post City & County of Denver: How to redesign a document-intensive business process – Part 1 appeared first on TAB Records Management Blog | T

Retail 74
article thumbnail

Uber: 'No Justification' for Breach Cover-Up

Data Breach Today

CISO Says Characterizing Payoff as Bug Bounty Was Wrong Uber CISO John Flynn tells a U.S. Senate subcommittee that the company should have told the public sooner about its 2016 data breach. He says the company's attempt to position its $100,000 payoff to hackers as a bug bounty was not appropriate.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How to write a GDPR data protection policy

IT Governance

An integral part of your EU General Data Protection Regulation (GDPR) project is producing appropriate documentation to demonstrate your compliance. As part of this, organisations will need to produce a data protection policy. To help you prepare for the fast-approaching compliance deadline (25 May 2018), we have outlined what the data protection policy is, what you should be looking to include and what tools can help your organisation produce this essential piece of documentation.

GDPR 84
article thumbnail

Ensuring that email data is compliant with GDPR regulations

Information Management Resources

Architecting a security, privacy and governance solution can be fast and simple. This checklist will ensure your archiving solutions are in top notch shape before the General Data Protection Regulation is here.

GDPR 74
article thumbnail

Mastering Security in the Zettabyte Era

Dark Reading

Many businesses are ill-equipped to deal with potential risks posed by billions of connected devices, exponential data growth, and an unprecedented number of cyber threats. Here's how to prepare.

article thumbnail

Hospital Hit With Cryptocurrency Mining Malware

Data Breach Today

Are More Healthcare Sector Entities at Risk? Do healthcare entities face a growing risk of being hit with cryptocurrency mining attacks, which have become more common in other sectors? A Tennessee hospital may be the first victim in the sector, and some security experts predict many more such incidents.

Mining 150
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Scammers Are Stealing Bitcoin on Twitter With a Classic Scheme

WIRED Threat Level

A new twist on the classic Nigerian Prince scheme has jumped from gaming communities to Twitter. And now it's spreading.

IT 99
article thumbnail

LEAP makes perfect fit in OpenText™ cloud services strategy

OpenText Information Management

It’s been one year now since we announced our acquisition of Documentum, InfoArchive, Captiva, and LEAP SaaS Platform and Applications. LEAP had truly found a home as it was the perfect fit into the OpenText™ Cloud Services strategy. Having been in development for almost 2 years, it came fully equipped with an extensive list of … The post LEAP makes perfect fit in OpenText™ cloud services strategy appeared first on OpenText Blogs.

Cloud 78
article thumbnail

Weekly podcast: Grammarly, Infraud and Octoly

IT Governance

This week, we discuss breaches at Grammarly and Octoly, and the arrest of leading members of the Infraud cyber crime group. Hello and welcome to the IT Governance podcast for Friday, 9 February 2018. Here are this week’s stories. Last Friday, Tavis Ormandy of Google’s Project Zero discovered what he called a “high severity bug” affecting the users of the popular spelling and grammar checker Grammarly.

article thumbnail

Apple, Cisco Strike Partnerships for Cyber Insurance

Data Breach Today

Policies Offer Incentives for Good Information Security Practices Apple and Cisco say they've partnered with insurers Aon and Allianz to offer cyber insurance policies for organizations that meet best security practices and use products from the technology companies. The partnership follows increasing interest in cyber insurance as a hedge against hacking risks.

Insurance 140
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Check your machine learning IQ

IBM Big Data Hub

As the expression goes, "There’s no AI without IA." In other words, enthusiasm for AI has led many to jump in head first. But without a strong technology foundation, companies could be setting themselves up for obstacles.

76
article thumbnail

The top trends for manufacturing in 2018

OpenText Information Management

We’re now quite well into 2018 but I thought it was still worth putting together a blog on the trends I see affecting manufacturing over the coming year. I’ve chosen two legislative changes and three technology-driven trends. Taken together, I think they add up to great opportunities for manufacturers but an increasingly challenging business environment … The post The top trends for manufacturing in 2018 appeared first on OpenText Blogs.

article thumbnail

GDPR – Six key stages of the data protection impact assessment (DPIA)

IT Governance

The DPIA is one of the specific processes mandated by the General Data Protection Regulation (GDPR). Organisations must carry out a DPIA where a planned or existing processing operation –“is likely to result in a high risk to the rights and freedoms of individuals”. DPIAs are particularly relevant to taking a privacy-by-design approach when introducing a new data processing system or technology.

GDPR 75
article thumbnail

Behavioral Analytics' Role in Health Data Security

Data Breach Today

Healthcare entities are increasingly considering user and entity behavioral analytics tools because their previous breach prevention and detection efforts have fallen short, says security expert Mac McMillan.

Analytics 133
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Feds Take Down Infraud, a $530M Cybercrime Forum That Lasted 7 Years

WIRED Threat Level

Infraud may not have been as famous as dark web markets like the Silk Road and Alphabay, but it far outlasted both.

article thumbnail

Is mobile first government the way forward in 2018?

OpenText Information Management

In my previous blog I identified mobility as one of the key tech trends for government in 2018. The concept of a mobile first government IT strategy has been around for some years now but government agencies have been slow to adopt. Now, with the explosive growth of smartphones, the public sector must place much greater emphasis … The post Is mobile first government the way forward in 2018?

article thumbnail

Are critical business insights hiding inside your unstructured data?

IBM Big Data Hub

The search function is a very powerful tool, assuming you have concrete keywords or concepts to find in your data. And that does not even take into account the size of the information you might be searching.