Sat.Jul 08, 2017 - Fri.Jul 14, 2017

article thumbnail

Understanding how people use private browsing

Elie

This post looks at how and why people are using the private browsing mode. Private Browsing. , also known as. InPrivate. in Internet Explorer and. Incognito mode. in Google Chrome, is a special mode where the browser doesn’t record the browsing activity on the local device. The promise made to the user is that when the private windows are closed, no trace will be left on the computer.

Paper 103
article thumbnail

HHS Issues Quick Response Cyber Attack Checklist

Privacy and Cybersecurity Law

Last month, after the WannaCry ransomware attack infected 230,000 computers in 150 countries, the US Department of Health and Human […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Red Teaming Your Information Governance Program

Brandeis Records Manager

George Despres, CRM. Program Director for University Records Management, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). About Red Teaming. Have you deliberately challenged your own program plans and procedures recently? With a book on the topic, Bryce Hoffman defines red teaming as: “ a… way to stress-test strategies, flush out unseen threats and missed opportunities, and execute more successfully….

article thumbnail

Information Security 101 with Lisa Sotto: Responding to a Data Breach

Hunton Privacy

In the third segment of this three-part series, Lisa Sotto , head of the Global Privacy and Cybersecurity practice at Hunton & Williams, discusses with The Electronic Discovery Institute how to respond to a data breach. It’s necessary, says Sotto, to have appropriate processes in place before a breach occurs. The “most important first step is to ensure that, when an issue arises, it’s escalated appropriately.”.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Understanding how people use private browsing

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

More Trending

article thumbnail

Request for information: RM bibliography

The Schedule

As Beth Cron posted last December , the Records Management Section steering committee has been working to update the Records and Information Bibliography that was first published in 2008. We chose to make this new version accessible through Zotero so it can be more dynamic and collaborative. This is where you come in: we’d like to invite volunteers who can assist us with revisions.

article thumbnail

Lead Generation Business Settles FTC Charges That It Unlawfully Sold Consumer Data

Hunton Privacy

On July 5, 2017, the FTC announced that Blue Global Media, LLC (“Blue Global”) agreed to settle charges that it misled consumers into filling out loan applications and then sold those applications, including sensitive personal information contained therein, to other entities without verifying how consumers’ information would be used or whether it would remain secure.

IT 45
article thumbnail

Content Cleanup and Migration Planning

JKevinParker

When planning a new content management system, you almost always have to plan for content migration. It doesn't matter if you are working with enterprise content, records, knowledge, data, or even web content. Migration means moving content from a source to a destination. Often it is from multiple sources to at least one destination. Here are some important considerations: If there are any information architecture changes required, the migration will be more complex than a simple "lift and shift

Cleanup 40
article thumbnail

DHS and FBI – Hackers Are Targeting US Nuclear, Energy, and Manufacturing Facilities

Privacy and Cybersecurity Law

According to a new joint report issued by the US Department of Homeland Security (DHS) and Federal Bureau of Investigation […].

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

From local to global, NYARC’s networks bring art history to the web archive

Archive-It

by Karl-Rainer Blumenthal. This is the third in Archive-It’s ongoing series of discussions with partners who share resources, policies, and personnel in order to archive the web collaboratively. For Part 1, see Better together: Collaborative web archiving at IIPC , and Part 2, Collaborative collecting: It’s a piece of KAIC. The New York Art Resources Consortium (NYARC) has blazed trails into digital art historical collection development and access for more than ten years.

article thumbnail

China Publishes Draft Regulations on Protecting the Security of Key Information Infrastructure

Hunton Privacy

This post has been updated. . On July 10, 2017, the Cyberspace Administration of China published a new draft of its Regulations on Protecting the Security of Key Information Infrastructure (the “Draft Regulations”), and invited comment from the general public. The Cybersecurity Law of China establishes a new category of information infrastructure, called “key [or critical] information infrastructure,” and imposes certain cybersecurity obligations on enterprises that operate such infrastructure.

article thumbnail

Leveraging pre-arrears to improve customer experience and reduce debt

CGI

Leveraging pre-arrears to improve customer experience and reduce debt. ravi.kumarv@cgi.com. Wed, 07/12/2017 - 06:57. Identification and action in pre-arrears has been a topic addressed on and off by lenders for a while. The opportunities are clear. Lower levels of default for the organisation and a better experience for the customer seem like a good outcome for all.

article thumbnail

HHS Issues Quick Response Cyber Attack Checklist

Privacy and Cybersecurity Law

Last month, after the WannaCry ransomware attack infected 230,000 computers in 150 countries, the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) issued a “ Quick-Response Checklist ” for HIPPA covered entities and business associates to follow when responding to a ransomware attack or other “cyber-related security incident,” as that phrase is defined under the HIPAA Security Rule. 45 C.F.R. 164.304.

Privacy 49
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

DHS and FBI – Hackers Are Targeting US Nuclear, Energy, and Manufacturing Facilities

Privacy and Cybersecurity Law

According to a new joint report issued by the US Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI), hackers have been penetrating the computer networks of companies that operate nuclear power stations, energy facilities, and manufacturing plants in the US since May 2017. The joint report carried an urgent amber warning, which is the second-highest rating for the sensitivity of a threat.