Sat.Jul 01, 2017 - Fri.Jul 07, 2017

article thumbnail

How to Deploy Your Own Algo VPN Server in the DigitalOcean Cloud

Lenny Zeltser

When analyzing malware or performing other security research, it’s often useful to tunnel connections through a VPN in a public cloud. This approach helps conceal the analyst’s origin, contributing to OPSEC when interacting with malicious infrastructure. Moreover, by using VPN exit nodes in different cities and even countries, the researcher can explore the target from multiple geographic vantage points, which sometimes yields additional findings.

Cloud 111
article thumbnail

Article 29 Working Party Releases Opinion on Data Processing at Work

Hunton Privacy

The Article 29 Working Party (“Working Party”) recently issued its Opinion on data processing at work (the “Opinion”). The Opinion, which complements the Working Party’s previous Opinion 08/2001 on the processing of personal data in the employment context and Working document on the surveillance of electronic communications in the workplace, seeks to provide guidance on balancing employee privacy expectations in the workplace with employers’ legitimate interests in processing employee data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Beeing Internet Safe

CGI

Beeing Internet Safe. harini.kottees…. Thu, 07/06/2017 - 05:56. Cyber security and cyber-attacks are rarely out the news headlines. Organisations worry about it and the impact on their businesses. We, as individuals, have concerns for our own safety, our online identity and how we are perceived online, as well as what personal information is shared.

Access 40
article thumbnail

5 Signs You Need to Go Paperless

Archive Document Data Storage

Perhaps you’ve considered going paperless for months, but procrastination has led to inaction. Or maybe you’re just ignoring important indicators that point to the inefficiency of your paper-based system. Here are five signs it may be time to go paperless: 1. Your File Cabinets Aren’t Opening. Nothing is more frustrating than not being able to open a filing cabinet drawer because it’s overstuffed with documents.

Paper 49
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Belgian Privacy Commission Issues Recommendation on Internal Records Under the GDPR

Hunton Privacy

This post has been updated. . The Belgian Privacy Commission (the “Belgian DPA”) recently released a Recommendation (in French and Dutch ) regarding the requirement to maintain internal records of data processing activities (the “Recommendation”) pursuant to Article 30 of the EU General Data Protection Regulation (“GDPR”). The Recommendation aims to provide guidance to data controllers and data processors in establishing and maintaining internal records by May 25, 2018.

GDPR 58
article thumbnail

New Data Protection Enforcement Provisions Take Effect in Russia

Hunton Privacy

As reported in BNA Privacy Law Watch , on July 1, 2017, a new law took effect in Russia allowing for administrative enforcement actions and higher fines for violations of Russia’s data protection law. The law, which was enacted in February 2017, imposes higher fines on businesses and corporate executives accused of data protection violations, such as unlawful processing of personal data, processing personal data without consent, and failure of data controllers to meet data protection requi