Sat.Oct 14, 2017 - Fri.Oct 20, 2017

article thumbnail

'All wifi networks' are vulnerable to hacking, security expert discovers

The Guardian Data Protection

WPA2 protocol used by vast majority of wifi connections has been broken by Belgian researchers, highlighting potential for internet traffic to be exposed The security protocol used to protect the vast majority of wifi connections has been broken, potentially exposing wireless internet traffic to malicious eavesdroppers and attacks, according to the researcher who discovered the weakness.

Security 112
article thumbnail

The 6-Step "Happy Path" to HTTPS

Troy Hunt

It's finally time: it's time the pendulum swings further towards the "secure by default" end of the scale than what it ever has before. At least insofar as securing web traffic goes because as of this week's Chrome 62's launch, any website with an input box is now doing this when served over an insecure connection: It's not doing it immediately for everyone , but don't worry, it's coming very soon even if it hasn't yet arrived for you personally and it's going to take many people by surp

Security 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to manage inactive records collections

TAB OnRecord

Inactive records management is an important component of a complete RIM program. At some point, space limitations and growing record volumes force organizations to deal with documents that aren't used very often. The most common approach is to send inactive files to an offsite storage environment, which frees up room for business operations and for… Read More.

article thumbnail

Profile of the Month: Derek Tumulak, Global Vice President of Product Management

Thales Cloud Protection & Licensing

Since the early days of his career as a software developer, Derek Tumulak has had a fascination with building things – a skill that has served him well throughout his career in the technology industry. He began his professional path at the tech giants of Microsoft and Netscape. He was a software developer, striving to find “elegant ways to solve complex problems,” he says.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

UK spy agencies may be circumventing data-sharing law, tribunal told

The Guardian Data Protection

Challenge brought by Privacy International alleges MI5 and MI6 data-sharing regimes and legal oversight system are illegal MI5 and MI6 may be circumventing legal safeguards when they share bulk datasets with foreign intelligence services and commercial partners, a court has been told. Most of the bulk personal datasets relate to UK citizens who are not of “legitimate intelligence interest”, the investigatory powers tribunal (IPT) heard.

More Trending

article thumbnail

Article 29 Working Party Publishes Final Guidance on Data Protection Impact Assessments

Data Matters

On 4 October 2017 the Article 29 Working Party (“ WP29 ”) published its final Guidelines on Data Protection Impact Assessment (“ DPIA ”) which were initially released in draft form in April 2017. Article 35 of the General Data Protection Regulation (“ GDPR ”) requires the use of DPIAs, or risk assessments of the proposed processing of personal data by an organisation, as part of regular business processes.

GDPR 60
article thumbnail

To Bucket or Not to Bucket…?

The Texas Record

There is a term in records management circles you might have heard of called “big buckets.” Have you ever stopped and thought, “What is this? Should I be doing this? Am I missing out on something?” (Coincidentally, there’s the pop culture acronym F.O.M.O. which stands for “fear of missing out” that comes to mind.

article thumbnail

Domino's blames data breach on former supplier's systems

The Guardian Data Protection

Customers complain about ‘eerie’ personalised spam emails and lack of communication from pizza seller Domino’s Australia has blamed a system “issue” of a former supplier for a leak of customer personal information to spam email lists. The pizza seller has called in the Australian information commissioner to investigate the breach but insists its systems haven’t been compromised.

article thumbnail

Get ready for the attacks – Implement Vulnerability Management

Outpost24

Get ready for the attacks – Implement Vulnerability Management. 20.Jul.2016. sdfsdfsdfsdfs. Fri, 10/20/2017 - 02:05. Nils Thulin. Network security. Teaser. Data breaches are nowadays a common factor risk but there are ways to reduce the risk. Know your assets and get on top of your infrastructure, even if you have Signature-Based Defences and Content-Based Protection you still need to work with updating and patching your systems.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

U.S. Supreme Court to Weigh in on Extraterritorial Search Warrant Dispute

Data Matters

On October 16, 2017, the U.S. Supreme Court granted the U.S. government’s request for review of a lower court decision that rejected the government’s construction of the Stored Communications Act (SCA) and embraced a more restrictive view that Microsoft had advanced, backed by much of the tech industry and many privacy groups. The decision now under review held that electronic communications that are stored exclusively on foreign servers cannot be reached by U.S. prosecutors under the SCA’s warr

article thumbnail

How can Office 365 Improve Information Management?

Gimmal

Office 365 provides an excellent foundation for organizations to improve information management and productivity in the cloud. But what about Office 365 makes it the ideal starting place for your policy initiatives? It's all about flexibility and integration. With the right extensions, Office 365 can also provide structure to a hybrid environment that includes on-premises systems and other cloud solutions.

Cloud 56
article thumbnail

New Pluralsight Course: Emerging Threats in IoT

Troy Hunt

It's another Pluralsight course! I actually recorded Emerging Threats in IoT with Lars Klint back in June whilst we were at the NDC conference in Oslo. It's another "Play by Play" course which means it's Lars and I sitting there having a conversation like this: We choose to talk about IoT because frankly, it's fascinating. There's just so many angles to security in otherwise everyday devices, for example: The collection of never-before digitised data (adult toys are a perfect example).

IoT 53
article thumbnail

Vulnerability Management – Business more secure

Outpost24

Vulnerability Management – Business more secure. 13.Jul.2016. sdfsdfsdfsdfs. Fri, 10/20/2017 - 02:10. Nils Thulin. Network security. Teaser. To work with Vulnerability Management is similar to preventing bad things to happen over time and is basically the exercise of limiting the chance of a breach by remediating vulnerabilities thereby reducing one’s overall risk level of being hacked.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Proposed Changes to Singapore’s Data Protection Act

Data Matters

On July 27, 2017, the Personal Data Protection Commission (PDPC) initiated a public consultation to consider several significant proposed changes to Singapore’s Personal Data Protection Act 2012 (PDPA). Citing technological advances and global developments, the PDPC proposed changes that would have the effect of (1) broadening the circumstances under which organizations could collect, use and disclose personal data without consent and (2) imposing a mandatory data breach notification requirement

article thumbnail

European Parliament’s LIBE Committee Approves Amended ePrivacy Regulation

Hunton Privacy

On October 19, 2017, the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs (“LIBE Committee”) narrowly voted to approve an amended version of the e-Privacy Regulation (“Regulation”). The committee vote is an important step in the process within the European Parliament. This vote will be followed by a vote of the European Parliament in its plenary session on October 23-26.

GDPR 53
article thumbnail

Resourceful Records Managers!

The Schedule

And, now for our much awaited series: Resourceful Records Managers! This month we meet George Despres, the Program Director for University Records Management at Brandeis University. If you would like to be included in this feature please contact Jessika Drmacich, jgd1(at)williams(dot)edu. What led you to choose your current career in Records Management?

article thumbnail

Vulnerability Management for Beginners – Hole in the fence

Outpost24

Vulnerability Management for Beginners – Hole in the fence. 24.May.2016. sdfsdfsdfsdfs. Fri, 10/20/2017 - 02:14. Nils Thulin. Network security. Teaser. If you had a valuable storage deposit with a fence around it would you not like to know if there was a hole in it?

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Weekly update 57

Troy Hunt

I'm doing this week's update a little back to front due to the massive incident in South Africa involving what looks like pretty much the entire population. I've spent the first half an hour just talking about that incident in a way that I hope is consumable for the layperson. I wanted to explain what these things many regular viewers understand as "data breaches" are, why I have them and pretty much everything else I know about the incident in South Africa.

IoT 47
article thumbnail

Records Storage vs. Scanning: Your Cheapest Option

Record Nations

Got too much office clutter? Many companies turn to document scanning services to clean up their office, but this solution might not be right for you. Hybrid solutions that incorporate both document scanning and record storage can be the most efficient and cost-effective. Learn more about what that looks like by watching the video below, […]. The post Records Storage vs.

article thumbnail

Citing Failure to Cooperate, Court Orders Use of Specific Keyword Search Terms

eDiscovery Law

United States v. New Mexico State Univ., No. 1:16-cv-00911-JAP-LF, 2017 WL 4386358 (D.N.M. Sept. 29, 2017). In this pay discrimination case, the Court addressed Defendants’ motion for a protective order precluding further searching for responsive documents. Citing defense counsel’s failure to “adequately confer” before performing the initial searches, “which resulted in searches that were inadequate to reveal all responsive documents,” the Court concluded that “which searches will be conducted i

article thumbnail

Vulnerability Management for Beginners - Motor Vehicle Inspection

Outpost24

Vulnerability Management for Beginners - Motor Vehicle Inspection. 20.May.2016. sdfsdfsdfsdfs. Fri, 10/20/2017 - 02:20. Nils Thulin. Network security. Teaser. If you look at your company network as a company car you know that every now and then you will have to drive the car to the motor vehicle inspection. After the inspection you get a list of what type of defects the car has and how severe the defects are.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Digital leaders: Driving pace and scale in a dynamic market, part 2 (organization)

CGI

Digital leaders: Driving pace and scale in a dynamic market, part 2 (organization). pallavi.m@cgi.com. Wed, 10/18/2017 - 01:41. Digital transformation involves a fundamental change to an organization’s core DNA—including how it listens to customers, how it innovates, how it collaborates with partners, how it delivers new products and services, etc. It’s all about people and driving change across the entire enterprise.

article thumbnail

Working Party Adopts Revised Guidelines on Data Protection Impact Assessments Under the GDPR

Hunton Privacy

On October 4, 2017, the Article 29 Working Party (the “Working Party”) revised and adopted the final version of the Guidelines on data protection impact assessments (DPIA) and determining whether processing is “likely to result in a high risk” for the purposes of Regulation 2016/679 (the “Guidelines”). The Guidelines were first published for comment on April 4, 2017, and the final publication of these revised Guidelines follows the public consultation that ended in May 2017.

GDPR 45
article thumbnail

EUROPE: Latest WP29 Guidelines on Data Breach Notifications and Profiling

DLA Piper Privacy Matters

On 18 October 2017, WP29 published proposed Guidelines on two key aspects of the GDPR – namely: Personal Data Breach Notification (Articles 33/34); and. Profiling and Automated Decision Making (Article 22). We set out the key points and takeaways in this post. Data Breach Notification. The proposed Guidelines clarify how the Data Protection Authorities (DPAs) expect organisations to apply the personal data breach reporting requirements in practice and adopt a fairly broad definition of 

article thumbnail

Why do we need Vulnerability Management?

Outpost24

Why do we need Vulnerability Management? 20.May.2016. sdfsdfsdfsdfs. Fri, 10/20/2017 - 02:34. Victoria Sigurdsson. Network security. Teaser. Our company already use Firewalls, Intrusion Detection Systems, and other Security Solutions. Why do we need Vulnerability Management?

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Automated Decision-Making Under the GDPR – A Right for Individuals or A Prohibition for Controllers?

HL Chronicle of Data Protection

The complexity of the EU General Data Protection Regulation (“GDPR”) is often alleviated by the guidance of regulatory authorities who contribute their practical interpretation of the black letter of the law and provide welcome certainty. However, the latest draft guidelines issued by the Article 29 Working Party (“WP”) on automated decision-making has thrown up a particular curve ball which bears further investigation.

GDPR 40
article thumbnail

How Exactly are Fraudsters Ripping Off Your ATMs?

Rippleshot

Solving ATM fraud has become a 2 billion-dollar question. (The impact of ATM skimming on a global scale). Getting to the bottom of ATM fraud means having a better understanding of how fraudsters think, how quickly they act and what payment channels they are targeting most. In a recent webinar hosted by the ABA and Rippleshot's Chief Data Scientist Randal Cox, we discussed case studies of actual fraudster behavior and explored patterns of ATM misuse that help financial institutions fully understa

article thumbnail

Privacy and Data Security Risks in M&A Transactions: Part 2 of Video Series

Hunton Privacy

In our final two segments of the series, industry leaders Lisa Sotto , partner and chair of Hunton & Williams’ Privacy and Cybersecurity practice; Steve Haas , M&A partner at Hunton & Williams; Allen Goolsby , special counsel at Hunton & Williams; and Eric Friedberg , co-president of Stroz Friedberg, along with moderator Lee Pacchia of Mimesis Law, continue their discussion on privacy and cybersecurity in M&A transactions and what companies can do to minimize risks before, du

Privacy 40