Sat.Sep 17, 2016 - Fri.Sep 23, 2016

article thumbnail

Roughtime

Imperial Violet

Security protocols often assume an accurate, local clock (e.g. TLS, Kerberos, DNSSEC and more). It's a widely accepted assumption when designing protocols but, for a lot of people, it just isn't true. We find good evidence that at least 25% of all certificate errors in Chrome are due to a bad local clock. Even when the local clock is being synchronised, it's very likely to be using unauthenticated NTP.

article thumbnail

I feel terrible about this site.

John Battelle's Searchblog

The post I feel terrible about this site. appeared first on John Battelle's Search Blog. I don’t write here anymore. I write almost entirely on Medium now. It’s not a choice I made to NOT write here, it’s a choice I made to edit NewCo Shift , our new publication. It lives on Medium, but if it were a WordPress site, well, my writing would all be on that site.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How To Protect Your Business Data

PerezBox

It’s impossible to go a week without seeing some reference to a data breach, whether it’s a write up on what happened years ago, or updates on breaches that are. Read More. The post How To Protect Your Business Data appeared first on PerezBox.

article thumbnail

Department of Transportation Issues Cyber Guidance for Autonomous Cars

Hunton Privacy

On September 20, 2016, the Department of Transportation, through the National Highway Traffic Safety Administration (“NHTSA”), released federal cyber guidance for autonomous cars entitled Federal Automated Vehicles Policy (“guidance”). The guidance makes a number of recommendations, including that automated vehicles should be designed to comply with “established best practices for cyber physical vehicle systems.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

The Business Case for Information Strategy and Architecture

JKevinParker

Information Management is a meta discipline that combines strategy, architecture, technology, and governance to get the right information to the right people at the right times to do the right things in support of an organization’s mission, vision, and values. Information Management happens at the intersection of people, process, information, and technology.

More Trending

article thumbnail

New York Proposes First-in-the-Nation Cybersecurity Regulation for Financial Institutions

Privacy and Cybersecurity Law

On September 13, 2016, the New York Department of Financial Services introduced a new rule that would require banks, insurance […].

article thumbnail

Belgian Privacy Commission Issues Priorities and Thematic Dossier to Prepare for GDPR

Hunton Privacy

On September 16, 2016, the Belgian Data Protection Authority (the “Privacy Commission”) published a 13-step guidance document (in French and Dutch ) to help organizations prepare for the EU General Data Protection Regulation (“GDPR”). The 13 steps recommended by the Privacy Commission are summarized below. Awareness. Inform key persons and decision makers about the upcoming changes in order to assess the consequences of the GDPR on the company or organization.

GDPR 45
article thumbnail

DB2 for z/OS: Using PGFIX(YES) Buffer Pools? Don't Forget About Large Page Frames

Robert's Db2

Not long ago, I was reviewing an organization's production DB2 for z/OS environment, and I saw something I very much like to see: a REALLY BIG buffer pool configuration. In fact, it was the biggest buffer pool configuration I'd ever seen for a single DB2 subsystem: 162 GB (that's the combined size of all the buffer pools allocated for the subsystem).

IT 54
article thumbnail

What Is Our Professional Future?

Brandeis Records Manager

George Despres, CRM. Program Director for University Records Management, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). Like most people, I prefer to have a reasonable sense of job security, as long as my interest is engaged. I hope and need to remain in the workforce for many more years.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Arc of a Data Breach: A 3-Part Series to Make Sure You’re Prepared

Hunton Privacy

Episode 1: Identify & Mobilize. In the first segment of our 3-part series with Lawline, Lisa J. Sotto , head of our Global Privacy and Cybersecurity practice at Hunton & Williams LLP, explains how to identify a cyber incident, mobilize your incident response team, coordinate with law enforcement and conduct an investigation. View the first segment and the presentation materials.

article thumbnail

New Jersey Moves Forward With Shopper Privacy Bill

Hunton Privacy

On September 15, 2016, the New Jersey Senate unanimously approved a bill that seeks to limit retailers’ ability to collect and use personal data contained on consumers’ driver and non-driver identification cards. The bill, known as the Personal Information and Privacy Protection Act , must now be approved by the New Jersey Assembly. Under the bill, retail establishments may scan an individual’s identification card ( i.e. , use an electronic device capable of deciphering, in an electronically rea

Privacy 45