Sat.Oct 07, 2017 - Fri.Oct 13, 2017

article thumbnail

Testing Security Keys

Imperial Violet

Last time I reviewed various security keys at a fairly superficial level: basic function, physical characteristics etc. This post considers lower-level behaviour. Security Keys implement the FIDO U2F spec , which borrows a lot from ISO 7816-4. Each possible transport (i.e. USB, NFC, or Bluetooth) has its own spec for how to encapsulate the U2F messages over that transport (e.g. here's the USB one ).

Security 104
article thumbnail

What Would It Look Like If We Put Warnings on IoT Devices Like We Do Cigarette Packets?

Troy Hunt

A couple of years ago, I was heavily involved in analysing and reporting on the massive VTech hack , the one where millions of records were exposed including kids' names, genders, ages, photos and the relationship to parents' records which included their home address. Part of this data was collected via an IoT device called the InnoTab which is a wifi connected tablet designed for young kids; think Fisher Price designing an iPad. then totally screwing up the security.

IoT 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Reader favorites October 2017: Our most popular RIM resources

TAB OnRecord

The most popular RIM resources this month cover several hot records management topics. Our free guide provides tips to save money with your records management program. Our popular white paper on records retention is a handy reference for every RIM professional designing a records management program. For records management environments that include paper and electronic… Read More.

article thumbnail

Picking a data management solution just got easier

IBM Big Data Hub

Organizations are collecting terabytes of data, so it’s not surprising that organizations are scrambling to identify a data management solution that fits their unique environment. The freedom of choosing the right data source to fit an organization’s data storage strategy is the key to robust data management process.

75
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

AI, IG and what it all means: Our Interview with Reid Smith

Gimmal

Recently, Gimmal interviewed Reid Smith, co-founder and CEO at i2k Connect. The mission of i2k Connect is to revolutionize information discovery using its novel artificial intelligence (AI) technology, informed by industry knowledge, to transform unstructured documents into structured data.

More Trending

article thumbnail

Is a FINRA Violation Really That Bad?

Hanzo Learning Center

Short answer: of course not!—That is, if you don’t mind providing a portion of the $176 million in fines that FINRA issued last year. However, if you’re like the majority of businesses out there, you can probably think of a lot of better ways to spend your company’s money. If you think you're not at risk, think again. There's a lot more to FINRA then just avoiding investment fraud.

Risk 49
article thumbnail

Unmasking the ransomware kingpins

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

It’s Here…My Next Thought Leadership Paper

Getting Information Done

Kill Your File Shares: A Roadmap to Reducing Your Biggest Information Risk This is my sequel to last year’s paper, Not if, But When You Get Hacked: Measuring and Proactively Managing Information Risk. This year I attack one of the biggest contributors to information risk and provide an actionable roadmap to “Kill Your File Shares” There are many good reasons to kill your file shares, so what holds organizations back from tackling this challenge?

Paper 45
article thumbnail

FRANCE: CNIL GDPR guidance for data processors

DLA Piper Privacy Matters

By Denise Lebeau-Marianna and Caroline Chancé . On September 29, 2017, the French data protection authority (the CNIL) published practical guidance on General Data Protection Regulation (“GDPR”) requirements intended for data processors. The objective is to guide them on how to comply with their new obligations. Under the GDPR, data processors have new responsibilities and liabilities in their own right, and data processors may now be liable to pay damages or be subject to fines or other pena

GDPR 45
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Weekly update 56 (island edition)

Troy Hunt

After being couped up inside most of the week due to some (very unusual) bad weather, when the sun came out today the only responsible thing to do was to jump on the jet ski and head off to an island to do my weekly update. As much as it was nice to get out, the audio is a little sketchy in places which I suspect is due to my mic losing its furry cover and then dangling from the lanyard on my hat and hitting my chest.

article thumbnail

Cheaper Record Storage Alternative to Scanning Your Archives

Record Nations

Company archives take up space. You may store your records in a closet or storage room, or you may have an ever increasing number of filing cabinets housed wherever they can fit across the office. As your company grows and expands, the storage space required for your files will continue to increase, but rather than […]. The post Cheaper Record Storage Alternative to Scanning Your Archives appeared first on Record Nations.

article thumbnail

Cybersecurity Awareness: What Banks and Credit Unions Need to Know

Rippleshot

October is cybersecurity awareness month — a prime time for banks and credit unions to re-think how they are managing their card fraud detection strategies. Then again, companies should be doing this the other 11 months of the year, too. Financial institution leaders need to be constantly thinking about how to evolve their card fraud detection management and update their cybersecurity measures - or risk making their organizations increasingly vulnerable.

article thumbnail

FRANCE: The new Health Information Institute in France

DLA Piper Privacy Matters

In France, the Health Information Institute (‘INDS’) has begun to accept requests for authorisation to access the new National Health Data System (‘SNDS’), as part of measures brought in by Act No. 2016-41 of 26 January 2016 (the ‘Reform Law’). Carol Umhoefer (DLA Piper Partner, Miami) and Jeanne Bossi Malafosse, Partner at Delsol Avocats, assess the new authorisation procedure for the provision of health data access in France, and consider the issues that may arise from its implementation.

Privacy 40
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The cyber times they are a-changing

CGI

The cyber times they are a-changing. pooja.cs@cgi.com. Thu, 10/12/2017 - 04:08. There was a time when companies sought to avoid a security breach because of the impact it would have on their reputation. Executives often would rely on the security organization to keep the firm “off the front page.” However, as attack vectors have evolved, corporations are now recognizing that the financial impact of cyber breaches are not just the potential lost revenue from reputational damage, but also the lowe

article thumbnail

Don’t Be a Data Hoarder: Without a Proper Migration Plan, Vital Content Will Disappear Into a Warehouse

Hanzo Learning Center

There’s a scene at the end of Raiders of the Lost Ark that will forever maintain its maddening status: Indiana Jones, after shepherding the Ark of the Covenant back home, is told by the U.S. government that “top men are working on it.” One of the most eye-twitching scenes in film history unfolds next: It shows the legendary Ark disappearing into a nameless box, the box walked into a sea of similar looking boxes and, then, ultimately disappearing into a massive, overstuffed warehouse.

article thumbnail

Celebrating Electronic Records Day: Thinking Long-Term

Preservica

Today, is Electronic Records Day , a day sponsored by the Council of State Archivists (CoSA) to raise awareness among US state government agencies, the general public, related professional organizations, and other stakeholders about the crucial role electronic records play in their world. It is also an opportunity to congratulate CoSA and its members on their work throughout 2017 in creating resources, undertaking research and running education programs on good digital record keeping practices.

article thumbnail

Applying Cyber Grand Challenge Technology to Real Software

ForAllSecure

I first heard about Mayhem when I read that researchers at my university, Carnegie Mellon, had reported 1200 crashes in Debian , just by running their binary analysis system on Debian programs for 15 minutes at a time. When I learned that the technology developed by those researchers was spun out as a startup, ForAllSecure, I knew I had to get involved.

40
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The growing impact of intelligent automation in trade finance

CGI

The growing impact of intelligent automation in trade finance. pooja.cs@cgi.com. Tue, 10/10/2017 - 07:00. Banks engaged in trade finance today are entering an incredibly exciting period of digital revitalization—a true turning point in their productivity and efficiency. Technologies such as intelligent data capture, predictive analytics, robotics and artificial intelligence are making sweeping changes possible, radically redesigning how banks conduct their business going forward.

article thumbnail

The IoT Hype Cycle

Information Matters

The IoT Hype Cycle. We know that last year Gartner placed the IoT at the Peak of Inflated Expectations on its annual hype cycle chart. That is probably not too unfair. From there the only way is down to the Trough of Disillusionment. I was playing around with Google Trends this afternoon to see how this plays out in terms of what people are searching for.

IoT 40
article thumbnail

How to Step up Data Security in Your Business

Archive Document Data Storage

To say “data breaches are on the rise” is an understatement. In August 2017, the computer reseller CeX was hacked, potentially compromising the personal information of two million customers. Two weeks later, the US credit agency Equifax reported a cyberattack incident thought to reveal the personal information of 400,000 UK citizens as well as over half of all US citizens.

article thumbnail

ITALY: The role of the data protection officer according to the Italian privacy authority

DLA Piper Privacy Matters

The role of the Data Protection Officer (DPO) and what requirements needs to meet has now been partially clarified by the Italian privacy authority. I often define the role of the DPO as one of the most complex “ rebus ” of the European General Data Protection Regulation. The matter has been clarified in the past by guidelines of the Article 29 Working Party, but the guidelines still left some “gray areas” of unclarity.

Privacy 40
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to Research: Photographs Relating to WWII Marine Corps Units

Unwritten Record

In this fourth and final post of How to Research WWII photographs, we will provide an example of how researchers can search for and identify images related to a specific US Marine Corps unit. As is true with the WWII Army, Army Air Forces, and Navy photographs, prior to beginning your search in Still Pictures, it is important to gather as much information as possible about the USMC unit of interest.

article thumbnail

After a Disaster is Not the Time to Think About Data Recovery

Docuware

If your house was on fire, what would you save? We’ve all had that question posed to us. Other than trash bags of hard currency, the answer is probably something else, like irreplaceable photo albums, or critical documents, or a family pet. Precious things. And, of course, our phone.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

What follows below is an edited version of the debate in the House of Lords of the Second Reading of the Data Protection Bill, held on 10 October. Colleagues that prefer not to read the entire (46,709 word) transcript of the 5 hour debate will get an impression of the key interventions in this (16,000 word) summary: The Parliamentary Under-Secretary of State, Department for Digital, Culture, Media and Sport (Lord Ashton of Hyde) (Con) My Lords, I am delighted to be moving the Second Reading toda

GDPR 120
article thumbnail

IGI and TGCI’s “The Exchange” Presents The Information Governance Forum 2017

IGI

November 1 st , 2017-The Buckhead Club. Atlanta, GA. Colloquium Lead Moderators: Barclay T. Blair. Information Governance Initiative. Jason R. Baron. Drinker Biddle & Reath LLP. “The Exchange” Information Governance Forum – Atlanta, is the first program developed and delivered through the new TGCI partnership with IGI. Building off TGCI’s successful roundtable format, this inaugural Forum will focus on facilitated conversations designed to rapidly increase your IG insight and fluency.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Lynxes and Alligators and Ships, Oh, My! The Ships of the Ware Collection

Unwritten Record

Tucked away at Archives II in College Park, Maryland, in Record Group 45: Drawings of Naval Vessels and Equipment, is a series of magnificent ship drawings known simply as “The Ware Collection”. Named for Charles Ware, the artist that created them, the collection offers a high degree of detail and an eye-catching splash of red, white, and blue in the flags that stream from the ships.

article thumbnail

From the College of Nursing: Florida State’s Part in the Cuban Missile Crisis

Archives Blogs

The College of Nursing at Florida State University has a significant history. Recently, Heritage & University Archives received a new accession from the College that illustrates when the College played a key role in being prepared for a nuclear catastrophe on American soil. The newspaper clipping presented is from the spring of 1961, describing a “disaster drill” in an event of a plane crash and was given to the College by alumna Judith Butler White.

article thumbnail

Unmasking the ransomware kingpins

Elie

This blog post exposes the cybercriminal groups that dominate the ransomware underworld, and analyzes the reasons for their success. This is the third and final blog post of my series on ransomware economics. The first post was dedicated to the methodology and techniques developed to trace ransomware payments from end to end. The second post shed light on the inner workings of ransomsphere economics.