Sat.Nov 25, 2017 - Fri.Dec 01, 2017

article thumbnail

In praise of. Elizabeth Stafford

Data Protector

Many of even the most dedicated members of the UK’s data protection fraternity may not have heard of Elizabeth Stafford. And that’s a shame. Why? Because she, along with a small band of colleagues in the Department of Digital, Culture, Media & Sport are doing great things. How? Because, as Head if EU Data Flows, not only is she working on ensuring UK businesses can rely on unencumbered data flows between the UK and the EU post Brexit, she’s also one of the key DDCMS officials working hard be

Privacy 120
article thumbnail

4 essential RIM practices to prepare for mergers and acquisitions

TAB OnRecord

Records management teams have a key role to play in mergers, acquisitions and divestitures. Whether big or small, the sale of any corporate asset must be supported by accurate and complete records. These provide buyers with historical information, compliance documentation and other crucial records. Most importantly, complete and accurate records help demonstrate the full value… Read More.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A decade of content management change

AIIM

As Jerry Garcia might say, “What a long strange trip it’s been.”. Think about the incredible changes going on in the content management space: A decade of Content Management change. Content Management 2007. Content Management 2017. Driven by IT and specialists. Driven by end users and the business. Departments at large companies. Any size company. Usability & mobility an afterthought.

article thumbnail

Here's the NSA Agent Who Inexplicably Exposed Critical Secrets

WIRED Threat Level

The Justice Department has struck a plea deal with Nghia Hoang Pho, a programmer in the NSA's elite operations unit, for taking his highly classified work home with him.

Security 111
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

New Report: Discovering Consumer Attitudes Toward Connected Car Security

Thales Cloud Protection & Licensing

At Thales eSecurity we are always eager to obtain data on how the world perceives threats to personal data, because it has the potential to inform us on how to make our everyday lives more safe and secure. Together with an independent firm, we recently conducted a survey of 1,000 consumers across the U.S. and UK and found that ownership of internet-connected cars is on the rise.

Security 103

More Trending

article thumbnail

A Head Scratcher - Solving the Productivity Riddle

AIIM

I came across a chart recently that left me scratching my head. It was a chart from the Federal Reserve Bank of St. Louis, featuring U.S. Bureau of Labor Statistics (BLS) on labor productivity. Per BLS, “Labor productivity is a measure of economic performance that compares the amount of goods and services produced (output) with the number of labor hours used in producing those goods and services.

article thumbnail

North Korea’s Missile Test Puts the Entire US in Range

WIRED Threat Level

The bad news: Tuesday's missile test shows that North Korea's ICBM can likely hit the US. The slightly less bad news: It's still a long way off from actually doing so.

IT 109
article thumbnail

What are the best books on information security?

IT Governance

There are few resources that can match the in-depth, comprehensive detail of a good book. As Charles William Eliot, the famed president of Harvard University, once said, “Books are the quietest and most constant of friends; they are the most accessible and wisest of counselors, and the most patient of teachers.”. Books also serve as valuable resources for IT professionals looking to broaden their knowledge.

article thumbnail

Here's What I'm Telling US Congress about Data Breaches

Troy Hunt

Last week I wrote about my upcoming congressional testimony and wow - you guys are awesome! Seriously, the feedback there was absolutely sensational and it's helped shape what I'll be saying to the US Congress, including lifting specific wording and phrases provided by some of you. Thank you! As I explained in that first blog post, I'm required to submit a written testimony 48 hours in advance of the event.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

UK class action accuses Google of unlawfully harvesting personal data

The Guardian Data Protection

Lawsuit claims tech firm bypassed iPhone default privacy settings between June 2011 and February 2012, affecting 5.4m people More than 5 million people in the UK could be entitled to compensation from Google if a class action against the internet giant for allegedly harvesting personal data is successful. A group led by the executive director of consumer body Which?

article thumbnail

North Korea's Latest Missile Test Was Even Scarier Than It Seemed

WIRED Threat Level

Further analysis of North Korea's latest ICBM launch shows that the country can likely land a nuclear weapon anywhere in the continental United States.

IT 108
article thumbnail

How the PCI DSS can help you meet the requirements of the GDPR

IT Governance

With less than 6 months until the General Data Protection Regulation ( GDPR ) is enforced, organisations across Europe must consider how the far-reaching changes introduced by the Regulation will affect how they handle and protect personal data. While some will be worried about how to comply with the new law, those that are already compliant with the Payment Card Industry Data Security Standard (PCI DSS) – or are moving towards compliance – have a head start and can use their existing PCI compli

GDPR 85
article thumbnail

Former National Security Council Legal Adviser Christopher Fonzone Joins Sidley in Washington, D.C.

Data Matters

Washington, D.C. – Sidley Austin LLP is pleased to announce that Christopher Fonzone, former National Security Council (NSC) legal adviser and deputy assistant and counsel to President Obama, has joined the firm as a partner in its Washington, D.C. office. He will be a member of Sidley’s global Privacy and Cybersecurity practice. Mr. Fonzone has years of experience advising high-level government officials on some of the most pressing national security issues of our time.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Providing transactional data to your Hadoop and Kafka data lake

IBM Big Data Hub

The data lake may be all about Apache Hadoop, but integrating operational data can be a challenge. Learn how to deliver real-time feeds of transactional data from mainframes and distributed environments directly into Hadoop clusters and make constantly changing data more available.

77
article thumbnail

Supreme Court Must Understand That Cell Phones Aren’t Voluntary

WIRED Threat Level

Opinion: The US argues that police can access cell phone records freely because customers volunteer that data. But cell phones are no longer optional.

Access 108
article thumbnail

Key Steps to GDPR Compliance – Part 1

IT Governance

There are only six months to go before the General Data Protection Regulation (GDPR) comes into effect, but some businesses are not even thinking about it yet, or are only just starting to. In the first of three blogs on GDPR compliance, we have set out the first steps for starting compliance projects along with some IT Governance solutions should you need any extra help. 1.

GDPR 81
article thumbnail

Spreading OpenText cheer: the Philippines

OpenText Information Management

The holidays are fast approaching and our OpenText colleagues are starting to get festive in their offices around the world, In this post, OpenText employees Aileen Cacatian, Daryl Ancheta, Michelle Maquiso, Keith James Macapagal and Maria Cristine Sarmiento from the DGO Manila Team write about their favourite customs and traditions during the holiday season in … The post Spreading OpenText cheer: the Philippines appeared first on OpenText Blogs.

75
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Compliant data freedom: Oxymoron or opportunity?

IBM Big Data Hub

Many large organizations still have a large amounts of data on-premise, but also need data from a public cloud. Regardless of where the data resides, organizations can build a trusted data source from which they can drive key business insights and derive significant sustained advantages. Here's how.

Cloud 73
article thumbnail

How Bots Broke the FCC's Public Comment System During the Net Neutrality Debate

WIRED Threat Level

The FCC's net neutrality public comment period was overrun with bots, making it all but impossible for any one voice to be heard. That's not how this is supposed to work.

IT 96
article thumbnail

Different types of cyber attacks

IT Governance

A lot of organisations have experienced cyber attacks this year, but how were these companies actually hit? There are a number of different ways a criminal hacker can implement a cyber attack, and they all depend on what the criminal hacker is trying to gain. Some criminal hackers want data, whereas others want a ransom fee to be paid. The most common types of cyber attack are malware and vectors.

article thumbnail

Spreading OpenText Cheer: Brazil

OpenText Information Management

The holidays are fast approaching, and our employees are starting to get festive in their offices around the world! In this post, OpenText employee Luis Barbosa talks about his favourite holiday customs and traditions that take place in his home city of Sao Paulo, Brazil. What is your favourite part about this time of year? … The post Spreading OpenText Cheer: Brazil appeared first on OpenText Blogs.

72
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The 10 Records Scheduling Commandments

The Schedule

And it came to pass that Brad was preparing materials for records management training sessions, as one does; And the frustration with the records management practices put in place by his predecessor did boil over. Then did Brad throw together a quick-and-dirty records management graphic, and he shared it on Twitter for a lark. Lo! That graphic became Brad’s most RT’ed Records Management-related post ever, for Brad hath toucheth a nerve.

article thumbnail

Apple MacOS High Sierra Security Flaw Lets Anyone Get Root Access, No Password Required

WIRED Threat Level

A Turkish company found a glaring flaw in Apple's desktop operating system that gives anyone deep access, no password required.

Passwords 111
article thumbnail

List of data breaches and cyber attacks in November 2017 – 59 million records leaked

IT Governance

This month’s list is a little thin compared with other months this year. Is that a good sign? Maybe. What’s certainly not a good sign, however, is the number of data breaches caused by organisations’ own employees. Month after month, I find myself reporting more on organisational mistakes than on the efforts of cyber criminals. Basic information security practices – and I really do mean basic – are ignored over and over again, and for what?

article thumbnail

Ten things impacting the world: climate change

OpenText Information Management

The burning of fossil fuels and other activities have released enormous amounts of gases into the atmosphere. These emissions have warmed the Earth’s surface, and the oceans have absorbed 80 percent of this additional heat. As the ocean warms, the density decreases and the volume of the ocean increases. This is called thermal expansion and … The post Ten things impacting the world: climate change appeared first on OpenText Blogs.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Needless Panic Over a Wi-FI Network Name

Schneier on Security

A Turkish Airlines flight made an emergency landing because someone named his wireless network (presumably from his smartphone) "bomb on board.". In 2006, I wrote an essay titled " Refuse to be Terrorized." (I am also reminded of my 2007 essay, " The War on the Unexpected." A decade later, it seems that the frequency of incidents like the one above is less, although not zero.

IT 71
article thumbnail

The US Should Modernize Election Systems to Prevent Hacking

WIRED Threat Level

Opinion: Two senators from opposing parties argue that voting machines should be considered critical infrastructure, and funded accordingly.

article thumbnail

PCI DSS compliance: a range of encryption approaches available to secure your data

Thales Cloud Protection & Licensing

In the month of October, I wrote about reducing scope for PCI DSS. In this blog, I take it a step further with a discussion about the options available for securing data. Not all types of encryption give you the coverage and flexibility you need. There’s no one-size-fits-all solution for protecting account data; every organization is different, faces different threats and has different security objectives that (ideally) go beyond PCI DSS compliance.