Sat.Feb 06, 2016 - Fri.Feb 12, 2016

article thumbnail

Scrutinizing the draft Investigatory Powers Bill

Data Protector

The point about pre-legislative scrutiny is that a parliamentary bill gets a good prod before it begins its usual passage through Parliament. The main issues are identified, and stakeholders can marshal their views in an attempt to influence the decision-makers in good time for changes to be made that ought to result in a statute that is far fitter for purpose.

article thumbnail

President Obama Signs Executive Order Establishing Federal Privacy Council

Hunton Privacy

On February 9, 2016, President Obama signed an Executive Order establishing a permanent Federal Privacy Council (“Privacy Council”) that will serve as the principal interagency support structure to improve the privacy practices of government agencies and entities working on their behalf. The Privacy Council is charged with building on existing interagency efforts to protect privacy and provide expertise and assistance to government agencies, expand the skill and career development opportunities

Privacy 69
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Year, New Website, And New Blog!

ForAllSecure

Although we have been very busy at ForAllSecure, we finally got the time to redo our website, huzzah! This website is a bit more pleasing on the eyes, and we hope to add more up-to-date information about our projects and what we're up to. Part of this refresh is also a new blog. We plan to talk about interesting things we are working on, so check back frequently!

52
article thumbnail

The dark side of online poker or the commoditization and weaponization of big data and espionage

Elie

Big data weaponization and malware-based espionage are usually associated with governments; however, they don’t own a monopoly on such activities. Also, online poker uses big data to profile user behavior. Players search for fish (bad players) and they use malware to spy on and rip off infected players at the (online) poker table. This blog post is a brief tour of some of the darkest aspects of online poker.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

What You Need to Know About the Recent FBI Hack

Productivity Bytes

You know things are getting pretty bad when government agencies like the IRS and the Department of Homeland Security have experienced data breaches. Hackers were able to collect and make public the data records of nearly 10,000 Department of Homeland Security employees. Sadly, that’s not the end of it. The same hackers recently published the … + Read More.

More Trending

article thumbnail

New Year, New Website, And New Blog!

ForAllSecure

Although we have been very busy at ForAllSecure, we finally got the time to redo our website, huzzah! This website is a bit more pleasing on the eyes, and we hope to add more up-to-date information about our projects and what we're up to. Part of this refresh is also a new blog. We plan to talk about interesting things we are working on, so check back frequently!

40
article thumbnail

Is your vital digital information at risk of being the next "eX-Files"?

Preservica

As 90s hit television series The X-Files returns to our screens after a 13 year hiatus, we have launched an awareness campaign to highlight the danger of file format and software obsolescence, and an impending ‘Digital Dark Age’ – warned against by Google’s Vint Cerf last year. Many file formats and software applications popular in 1993 have already disappeared or become obsolete.

Risk 40
article thumbnail

Any colour as long as it’s black

CGI

Any colour as long as it’s black. p.butler@cgi.com. Tue, 02/09/2016 - 05:35. Henry Ford never actually said to a customer 'you can have any colour you like as long as it's black'. He did ,however, say it to his sales people to stop them asking (and trying to sell) many different variants of the Model T. Well personalisation has come a long way since then and car manufacturers allow you to select from a wide range of options, plus the ability to choose any paint colour you wish, meaning in today

Retail 40
article thumbnail

Administrative Law Judge Orders Health Care Provider to Pay HIPAA Civil Monetary Penalty

Hunton Privacy

On February 3, 2016, the U.S. Department of Health and Human Services Office for Civil Rights (“OCR”) announced that an Administrative Law Judge (“ALJ”) ruled that Lincare, Inc. (“Lincare”) violated the HIPAA Privacy Rule and ordered the company to pay $239,800 to OCR. Lincare, a health care provider, was investigated by OCR in 2009 after the ex-spouse of a Lincare employee discovered records in their home that contained the protected health information (“PHI”) of several hundred Lincare patient

Privacy 49
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

NEW YEAR, NEW WEBSITE, AND NEW BLOG!

ForAllSecure

Although we have been very busy at ForAllSecure, we finally got the time to redo our website, huzzah! This website is a bit more pleasing on the eyes, and we hope to add more up-to-date information about our projects and what we're up to. Part of this refresh is also a new blog. We plan to talk about interesting things we are working on, so check back frequently!

40
article thumbnail

Article 29 Working Party Issues Statement on 2016 Action Plan for Regulation

Hunton Privacy

On February 11, 2016, the Article 29 Working Party (the “Working Party”) issued a statement on the 2016 action plan for the implementation of the EU General Data Protection Regulation (the “Regulation”). The action plan outlines the priorities for the Working Party in light of the transition to a new legal framework in Europe and the introduction of the European Data Protection Board (the “EDPB”).

article thumbnail

Culture eats strategy for breakfast and technology for lunch…

CGI

Culture eats strategy for breakfast and technology for lunch…. ravi.kumarv@cgi.com. Mon, 02/08/2016 - 03:00. Bill Aulent from MIT states that “ Culture eats strategy for breakfast and technology for lunch and everything else for dinner “ – the trouble is it still leaves everyone hungry! Organisations spend time on developing strategies – but then face problems implementing these strategies because the culture of their organisation is often strongly resistant and refuses to accept the change.

Risk 40
article thumbnail

Unleashing The Mayhem CRS

ForAllSecure

In June, ForAllSecure participated in DARPA's Cyber Grand Challenge (CGC) Qualification Event (CQE) 1. During the event our automated system tweeted its progress, and to continue the trend of openness, we decided to publish a writeup of some more details about our system. Our team, Thanassis Avgerinos, David Brumley, John Davis, Ryan Goulden, Tyler Nighswander, and Alex Rebert spent many thousands of hours on our system, and now that the CQE is over, we're excited to give you a glimpse of its in

Cloud 52
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

UNLEASHING THE MAYHEM CRS

ForAllSecure

In June, ForAllSecure participated in DARPA's Cyber Grand Challenge (CGC) Qualification Event (CQE) 1. During the event our automated system tweeted its progress, and to continue the trend of openness, we decided to publish a writeup of some more details about our system. Our team, Thanassis Avgerinos, David Brumley, John Davis, Ryan Goulden, Tyler Nighswander, and Alex Rebert spent many thousands of hours on our system, and now that the CQE is over, we're excited to give you a glimpse of its in

Cloud 40
article thumbnail

Unleashing The Mayhem CRS

ForAllSecure

In June, ForAllSecure participated in DARPA's Cyber Grand Challenge (CGC) Qualification Event (CQE) 1. During the event our automated system tweeted its progress, and to continue the trend of openness, we decided to publish a writeup of some more details about our system. Our team, Thanassis Avgerinos, David Brumley, John Davis, Ryan Goulden, Tyler Nighswander, and Alex Rebert spent many thousands of hours on our system, and now that the CQE is over, we're excited to give you a glimpse of its in

Cloud 40
article thumbnail

Transforming UK healthcare providers

CGI

Transforming UK healthcare providers. ravi.kumarv@cgi.com. Tue, 02/09/2016 - 04:30. There’s no denying the reach of the NHS: most people in the UK, at one point or another, have relied on it for healthcare. But just as doctors today are receiving training that regularly gets updated based on the latest clinical research, so too the systems behind the NHS also require regular review.