Sat.Feb 17, 2018 - Fri.Feb 23, 2018

article thumbnail

SEC Releases Updated Cybersecurity Guidance

Data Breach Today

Regulator Demands More Risk Disclosure, Better Insider Trading Policies The U.S. Securities and Exchange Commission has released revised guidance "to assist public companies in preparing disclosures about cybersecurity risks and incidents." It includes new prohibitions on trading in corporate shares after a breach has been discovered but before investors have been notified.

article thumbnail

Perspective Check: InfoGov Short Cuts

Weissman's World

Sorry, kids, but there just aren’t any more short-cuts to good information governance than there are in serious mountaineering. The best I can tell you is to leverage the same sort of disciplined project management skills in infogov as you would in any other initiative you engage in. The post Perspective Check: InfoGov Short Cuts appeared first on Holly Group.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Digital Preservation -- High Stakes for Finance and Insurance Companies

AIIM

It is time to think about Digital Preservation differently — as a dedicated capability that keeps long-term information alive and usable and trusted and easily found. The time to act is now. AIIM believes that digital preservation needs to be viewed through the prism of a set of Intelligent Information Management capabilities that are integral to delivering upon the Digital Transformation challenge of understanding, anticipating, and redefining internal and external customer experiences.

article thumbnail

What Rick Gates' Guilty Plea Means For Mueller’s Probe

WIRED Threat Level

Paul Manafort’s longtime deputy is cooperating with the special prosecutor, so we may soon have answers to these questions hovering around the Russia investigation.

Security 111
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Anatomy of a Russian Information Warfare Campaign

Data Breach Today

Cost of Troll Farm: $15 Million. Impact: Priceless Want to meddle with a democracy? Just use its social media outlets against it to amplify already existing social divisions. That's the quick take on the indictment recently unsealed by Special Counsel Robert Mueller that accuses Russians of running an "active measures" campaign against the United States.

IT 184

More Trending

article thumbnail

Information Security and Compliance Through the Prism of Healthcare and Retail

AIIM

Organizations must focus strategically on how to manage digital content and understand that: 1) end-users are consuming technology differently; 2) consumer devices are being increasingly used as “on-ramps” to digital workflows; and 3) how you secure the scan and capture process becomes increasingly important. Let’s explore how these concepts relate to two specific industries – healthcare and retail. 1 -- Healthcare at the practice level illustrates the challenges of matching small business IT re

Retail 91
article thumbnail

WhatsApp Co-Founder Brian Acton Injects $50 Million in Newly Formed Signal Foundation

WIRED Threat Level

WhatsApp co-founder Brian Acton has taken on the leadership of the non-profit behind that popular encryption app—and given it a serious injection of cash.

article thumbnail

Intel Faces 32 Spectre/Meltdown Lawsuits

Data Breach Today

Plaintiffs Seek Damages Over Security Vulnerabilities, Alleged Insider Trading Intel faces 32 lawsuits filed over the trio of flaws in its CPUs known as Meltdown and Spectre, seeking damages for the security vulnerabilities as well as alleged insider trading. The flaws have also been cited in lawsuits against chipmakers AMD and ARM, as well as against Apple.

Security 161
article thumbnail

AI/ML and Digital Security

Thales Cloud Protection & Licensing

Sixty-four percent of the more than 1,200 senior security executives from around the world, whom we surveyed for the 2018 Thales Data Threat Report (DTR), believe artificial intelligence (AI) “increases data security by recognizing and alerting on attacks,” while 43% believe AI “results in increased threats due to use as a hacking tool.”. They’re both right.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

And the survey said. Make your voice heard on the future of Information Management

AIIM

There’s a lot going on in the content management space right now. The "scale" of information challenges is getting bigger by the day -- bigger files, more of them, in wildly varying formats and in demand across more and more applications and processes. Our State of the Industry survey this year is focused on better understanding these information management challenges.

ECM 90
article thumbnail

US Border Patrol Hasn’t Validated E-Passport Data For Years

WIRED Threat Level

For over a decade, US Customs and Border Patrol has been unable to verify the cryptographic signatures on e-Passports, because they never installed the right software.

Security 105
article thumbnail

Is US Computer Crime Justice Draconian?

Data Breach Today

Prosecutors Cry 'Deterrence' to Justify Lengthy Sentences. Who's Deterred? Is U.S. computer crime justice draconian? That's one obvious question following England's Court of Appeal ruling that suspected hacker Lauri Love would not be extradited to the United States, in part, because they said the U.S. justice system could not be trusted to treat Love humanely.

161
161
article thumbnail

Key deadlines for the Scottish Public-Sector Action Plan on cyber resilience

IT Governance

Scottish public-sector bodies and their key partners are required to take certain measures to improve cyber security and promote cyber resilience by the end of 2018, according to the Scottish Public Sector Cyber Resilience Framework. If you are a Scottish public body or your organisation deals with the Scottish public sector, and/or you’re looking to align your cyber resilience strategy with government best practice, you need to be aware of these deadlines: End of March 2018.

Paper 85
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Machine learning: The next transformational technology

IBM Big Data Hub

Machine learning has joined artificial intelligence (AI) as the hottest technology topics of 2018. We asked our expert influencers to share their thoughts on the state of the industry: where it's going, and how and why companies should be adopting machine learning and AI.

article thumbnail

Inside the Mueller Indictment: A Russian Novel of Intrigue

WIRED Threat Level

The cast of characters revealed in the special counsel's epic indictment is drawn from the overlapping circles of oligarchs, spooks, and mob figures.

Security 109
article thumbnail

Locking Down PowerShell to Foil Attackers: 3 Essentials

Data Breach Today

Microsoft Taps Machine Learning to Better Combat Fileless Malware Microsoft has been working to reduce the ability of attackers who use the PowerShell scripting language to "live off the land" in enterprise networks, in part via machine learning. But IT administrators should also have these three essential malicious PowerShell script defenses in place.

IT 154
article thumbnail

The Tories claim the data protection bill will make us safer. That’s not true | Diane Abbott

The Guardian Data Protection

The government’s growing store of personal details allows automatic adjudication on crucial aspects of our lives Is your data safe? The answer must be no if this government manages to push through its data protection bill without important amendments. The Tory claim that the bill is necessary for protecting our data is false. Related: The DWP – a bureaucracy of outstanding brutality | Diane Taylor Related: The data protection bill is yet another legal threat to UK press freedom Continue reading.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Databases that learn

IBM Big Data Hub

Machine learning is being used at the heart of next- generation methods for self-driving cars, facial recognition, fraud detection and much more. At IBM, we’re applying machine learning methods to SQL processing so databases can literally learn from experience.

80
article thumbnail

Facebook's Mandatory Anti-Malware Scan Is Invasive and Lacks Transparency

WIRED Threat Level

Facebook is locking users out of their accounts until they download antivirus software that sometimes doesn't even work on their computers.

Security 108
article thumbnail

Mitigating the Insider Threat: Lessons From PNB Fraud Case

Data Breach Today

After PNB Incident, Security Practitioners Discuss Technologies to Mitigate Risks Now that it's been confirmed that an insider at Punjab National Bank paved the way for $1.8 billion in fraudulent transactions, the Reserve Bank of India is reiterating the need to strengthen security measures tied to SWIFT interbank transactions, and security experts are offering risk mitigation advice.

Risk 150
article thumbnail

Is your staff’s cyber security awareness up to scratch?

IT Governance

Cyber attacks and data breaches are on the rise, and it’s easy to believe they’re all caused by criminal hackers out for financial gain. However, this isn’t the case. Last quarter, it was found that four of the five leading causes of data breaches are because of human or process error. The failure of staff to follow workplace security regulations, as well as criminal hackers finding more ways to exploit members of staff, is becoming an increasing problem.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

10 Can't-Miss Talks at Black Hat Asia

Dark Reading

With threats featuring everything from nation-states to sleep states, the sessions taking place from March 20-23 in Singapore are relevant to security experts around the world.

article thumbnail

APT37: Inside the Toolset of an Elite North Korean Hacker Group

WIRED Threat Level

Security researcher at FireEye break down the arsenal of APT37, a North Korean hacker team coming into focus as a rising threat.

article thumbnail

Google Filters Annoying Ads But Does Nothing for Security

Data Breach Today

Experts Say New Functionality Ignores Wider Privacy and Security Concerns Google has begun activating a new feature in Chrome that will block 12 types of intrusive advertisements. But some security experts say the online advertising industry needs to solve the malware and privacy problems that have caused users to turn to ad-blocking and anti-tracking tools.

Security 145
article thumbnail

ICO data security statistics highlight need for increased staff awareness

IT Governance

The Information Commissioner’s Office’s (ICO) latest statistics on data security incidents have revealed a 19% increase from Q2 to Q3 2017, with 815 incidents reported between October and December 2017. This is an astonishing 41% rise on the same period in 2016. The reasons are thought to be growing awareness of the General Data Protection Regulation (GDPR) and the launch of the ICO’s personal data breach helpline.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Visit OpenText at the Salesforce World Tour this spring

OpenText Information Management

We are just days away now from the start of a busy spring for Salesforce, its customer and partners. Their World Tour event hits the road in Sydney on March 6th and OpenText will be there amongst the crowds. Meet OpenText, myself and our team at these World Tour stops: Sydney – March 6th, 2018 … The post Visit OpenText at the Salesforce World Tour this spring appeared first on OpenText Blogs.

article thumbnail

Mueller Indictment Shows Russia's Internet Research Agency Inner Workings

WIRED Threat Level

The most chilling aspect of that blockbuster Mueller indictment? The bureaucracy behind Russia's onslaught.

Security 101
article thumbnail

Supreme Court Won't Review CareFirst Data Breach Case

Data Breach Today

Case Now Heads Back to Lower Court for Potential Trial The Supreme Court has declined to review the data breach case involving CareFirst, and so now the class action lawsuit against the health insurer is headed back to a Washington federal trial court. The breach case would have been the first of its kind considered by the nation's highest court.