Sat.Feb 10, 2018 - Fri.Feb 16, 2018

article thumbnail

Facebook personal data use and privacy settings ruled illegal by German court

The Guardian Data Protection

Firm to appeal decision by Berlin regional court which upholds complaints that users not given informed consent Facebook’s default privacy settings and use of personal data are against German consumer law, according to a judgement handed down by a Berlin regional court. The court found that Facebook collects and uses personal data without providing enough information to its members for them to render meaningful consent.

article thumbnail

Russia Will Meddle in US Midterm Elections, Spy Chief Warns

Data Breach Today

White House Inaction Questioned by Some Lawmakers The top U.S. intelligence official has warned Congress that Russia will attempt to meddle in the this year's U.S. midterm elections, a repeat of the country's alleged 2016 U.S. presidential election interference.

189
189
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Transparency in eDiscovery? Save it for your clients

OpenText Information Management

This article was first published in Legaltech News. “Cooperation should not result in one party exerting extensive control over another’s discovery process or the application of a heightened discovery standard.” – Anna Mercado Clark, partner at Phillips Lytle LLP Civil litigation doesn’t have to be uncivil, or so the idea goes. In the spirit of … The post Transparency in eDiscovery?

IT 131
article thumbnail

Internet Security Threats at the Olympics

Schneier on Security

There are a lot : The cybersecurity company McAfee recently uncovered a cyber operation, dubbed Operation GoldDragon, attacking South Korean organizations related to the Winter Olympics. McAfee believes the attack came from a nation state that speaks Korean, although it has no definitive proof that this is a North Korean operation. The victim organizations include ice hockey teams, ski suppliers, ski resorts, tourist organizations in Pyeongchang, and departments organizing the Pyeongchang Olympi

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Going Down the Rabbit Hole

AIIM

When I was a young child, in an era when school papers had to be researched in libraries with card catalogs and shelves upon shelves of books, my father had the bright idea to purchase a complete set of Encyclopedia Britannica. Now, we lived on a tight budget and my mother wasn’t too thrilled with this splurge when a perfectly good library was so close to home.

More Trending

article thumbnail

Did Russia Affect the 2016 Election? It’s Now Undeniable

WIRED Threat Level

In the wake of the Mueller indictment of a Russian troll farm, any attempt to claim that the 2016 election wasn’t affected by Russian meddling is laughable.

Security 112
article thumbnail

Don’t Follow the Money; Follow the Customer!

Bill Schmarzo - Dell EMC

“Mr. Schmarzo, we’ve noticed that your cholesterol count is at 210, so we have prescribed Fluvastatin and placed selected foods into your shopping basket to help you control your cholesterol. Complete the purchase by selecting ‘ here ’ and we’ll deliver the medication and groceries to your home today between 4:00 and 4:20pm. If you complete the full Fluvastatin prescription, then we’ll reduce your monthly healthcare insurance payment by 5%.”.

article thumbnail

Content Migration -- Go Manual? Or Find a Partner?

AIIM

Carefully think through the pros and cons of your approach to content migration. The advent of a new generation of modern content solutions and the desire of many organizations to reduce the number of content systems is driving organizations to look at how they can update their content management infrastructure. More and more organizational leaders face the need to migrate legacy content to a newer content suite, either in the cloud or on premise.

ECM 90
article thumbnail

U.S. Indicts 13 Russians for Election Interference

Data Breach Today

'Information Warfare Against the United States' Alleged A U.S. grand jury has taken the extraordinary step of indicting 13 Russian nationals and three Russian companies for allegedly interfering with the U.S. political system, including the 2016 presidential election, in what the Justice Department portrays as "information warfare against the United States.

174
174
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Mueller Indictment Against Russia Details Efforts to Undermine US Democracy

WIRED Threat Level

Robert Mueller's office has come out with a 37-page indictment that details the extraordinary lengths Russian agents went to influence the 2016 presidential election.

Security 107
article thumbnail

Four important questions that AI can help retailers answer

OpenText Information Management

In my previous blog, I looked at how quickly Artificial Intelligence (AI) is rapidly becoming a part of the retail experience. Industry analysts agree that 2018 will be the year that AI brings top and bottom line benefits to innovative companies. So, where can AI most help retailers? Here’s four questions I think a combination … The post Four important questions that AI can help retailers answer appeared first on OpenText Blogs.

Retail 98
article thumbnail

It's like Deja Vu all over again -- a Records Management classic

AIIM

As Yogi supposedly once said, it's like deja vu all over again. I recently came across this article from e-doc Magazine (remember that?) by my friend Nishan DeSilva (then of Watson Wyatt fame, now at Microsoft). (Speaking of e-doc Magazine, how many remember it's successor, Infonomics magazine. Gosh I wish we had held onto that name.). Many of the core concepts are still relevant and can be applied to the current challenges facing records managers.

article thumbnail

Criminals Hide 'Billions' in Cryptocurrency, Europol Warns

Data Breach Today

Police Want More Help From Cryptocurrency Exchanges During Major Investigations Criminals in Europe are annually laundering at least $4 billion - and growing - via cryptocurrencies, warns Europol. The agency is calling on regulators and legislators to regulate cryptocurrencies to help battle money laundering and protect consumers.

150
150
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Facebook's Onavo Protect VPN Offers Less Privacy Protection Than Other Apps

WIRED Threat Level

The "Protect" menu item in Facebook's mobile apps refers users to the company's Onavo Protect VPN, but the tool falls short of basic privacy standards.

Privacy 111
article thumbnail

Have We Become Apathetic About Breaches?

Thales Cloud Protection & Licensing

Another day, another breach. It’s sarcastic, it’s comical, but it’s also real. Barely a day goes by where we don’t hear of a data breach. Affecting big companies and small in virtually every vertical and hitting government institutions at the local, state and federal level, sensitive data is routinely exfiltrated, stolen and leveraged with shocking regularity.

IoT 89
article thumbnail

How We Learned to Love Event Based Retention

AIIM

Allow me to introduce you to Wendy McLain, Manager of Enterprise Content & Records Management at Valero. Valero is a publicly traded international oil and gas company, with revenue in the billions of dollars. Wendy will be presenting at The AIIM Conference 2018. Her session is called "How We Learned to Love Event Based Retention: A Valero Energy Case Study in Records Management.

article thumbnail

Government Websites Deliver Cryptocurrency Mining Code

Data Breach Today

Security of Code Pushed by Content Delivery Networks Remains Ongoing Concern More than 4,200 websites, some belonging to the U.S., U.K. and Australian governments, have been turning their visitors' computers into mining machines to harvest the virtual currency Monero. The security lapse continues the recent trend of cryptocurrency mining malware overtaking ransomware.

Mining 150
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Mueller Indictment: Russian Trolls Stole Real US Identities to Fool Facebook

WIRED Threat Level

A new Justice Department indictment alleges Russia's disinformation operations created bank and social media accounts using the stolen identities of real US citizens.

Security 105
article thumbnail

City & County of Denver: How to redesign a document-intensive business process – Part 2

TAB OnRecord

When Colorado approved the retail sale of marijuana in 2013, the City & County of Denver was hit with a massive influx of applications from hopeful retailers. In a two-part blog post we show how they dealt with the backlog and redesigned their business process in the new era of legalized marijuana sales. In part [.] Read More. The post City & County of Denver: How to redesign a document-intensive business process – Part 2 appeared first on TAB Records Management Blog | TAB OnRecord.

Retail 83
article thumbnail

How to decrease shopping cart abandonment using AB testing

OpenText Information Management

One of the most common challenges e-tailers face today is high cart abandonment rates. According to a 2017 Baymard study, the average cart abandonment rate is just over 69%. Without a doubt, the high abandonment rate signifies a serious disconnect between visitor expectations and their actual online buying experience. So the question then becomes, what is causing that … The post How to decrease shopping cart abandonment using AB testing appeared first on OpenText Blogs.

article thumbnail

Aetna Breach Case Gets Messier

Data Breach Today

New Lawsuits Filed in the Wake of 2017 Mailing Mishap A case involving a 2017 privacy breach that has already cost health insurer Aetna about $20 million in legal settlements is getting messier. What new questions and lessons are emerging?

Insurance 140
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Pro-Gun Russian Bots Flood Twitter After Parkland Shooting

WIRED Threat Level

In the wake of Wednesday's Parkland, Florida school shooting Russian bots have taken to Twitter to stoke the gun control debate.

Security 112
article thumbnail

What's in store for a CDO at Think 2018

IBM Big Data Hub

When you wake up, the last thing you want to ask yourself is, “What did my data do last night?” CDOs who find themselves asking that question can put a stop to it on March 19. IBM is bringing experts and leaders across data governance and integration to the annual Think conference.

article thumbnail

What is a content management system (CMS)?

OpenText Information Management

The names (and acronyms) may be similar, but there’s a huge difference between the different solution sets that can fall under the banner of Content Management System (CMS). So let’s try to clear up the confusion and explain the role for an enterprise CMS today. CMS as a term has been around for a long … The post What is a content management system (CMS)?

CMS 75
article thumbnail

Russian Indictments: 'It's About Time'

Data Breach Today

Cyber intelligence expert Tom Kellermann discusses the significance and impact of the announcement that 13 Russian nationals and three Russian entities were indicted Friday for allegedly meddling in the 2016 presidential election.

IT 133
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

'Olympic Destroyer' Malware Hit Pyeongchang Ahead of Opening Ceremony

WIRED Threat Level

Researchers at Cisco Talos detail a new piece of disruptive, highly infectious malware with a clear target: the Pyeongchang Olympics IT infrastructure.

IT 94
article thumbnail

3 Tips to Keep Cybersecurity Front & Center

Dark Reading

In today's environment, a focus on cybersecurity isn't a luxury. It's a necessity, and making sure that focus is achieved starts with the company's culture.

article thumbnail

Preserving the human touch in a data-driven world

Information Management Resources

In today’s digital world, interpersonal connections matter more than ever. Technology can be shaped so that it adapts to people, using technology for people rather than instead of people.