Sat.Dec 23, 2017 - Fri.Dec 29, 2017

article thumbnail

Data Breach Today - Untitled Article

Data Breach Today

18 Best 2018 B2B Lead Generation Strategies For Marketers. Have you yet planned your best 2018 B2B lead generation strategies? Well if you have not until now then you should probably know that when it comes to B2B lead Generation, 2018 is going to become the lifeblood of modern sales process. With loads of strategies to choose from, it has become very challenging for businesses to survive the competition.

B2B 206
article thumbnail

Best of TAB 2017 part 2: the top blog posts

TAB OnRecord

It is time for part two of our series on the top RIM resources of the past year, including your favorite case studies, white papers, blog posts and guides. In this installment, we share the top three blog posts of 2017: how to save money with RIM, corporate moves, and document imaging for financial institutions. [.] Read More. The post Best of TAB 2017 part 2: the top blog posts appeared first on TAB Records Management Blog | TAB OnRecord.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What the Galactic Empire Teaches Us about HR

National Archives Records Express

With all the talk around Star Wars this month, we wanted to add to our series of HR lessons in pop culture. (Check out our Harry Potter article in case you missed it!) A long time ago, in that galaxy far, far away, the Galactic Empire set out to rule the galaxy. Spoiler alert: they […]. The post What the Galactic Empire Teaches Us about HR appeared first on.

IT 94
article thumbnail

Cryptojacking Has Gotten Out of Control

WIRED Threat Level

The practice of using a website visitor's device to mine cryptocurrency has expanded—and evolved—at an alarming rate.

Mining 111
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

What’s the Worst Thing You’ve Heard About Being a Woman in Recruitment?

IBM Big Data Hub

Sexism in the workplace continues to be relevant, as much as we all don’t want it to be. And sexism isn’t one sided either, there are stigmas that follow females and males around that continue to be all too commonplace. So we ask our diverse panel of female recruiters to point out the most annoying thing they. View Article. What’s the Worst Thing You’ve Heard About Being a Woman in Recruitment?

IT 94

More Trending

article thumbnail

Hong Kong to Further Regulate Drones

Data Matters

With the rise in drone usage for both commercial and recreational activities, air safety regulators around the world have increasingly focused on the impact of drones (otherwise known as unmanned aircraft systems or UAS) on flight safety and efficiency. Consistent with calls by the International Air Transport Association (IATA) for more oversight, Hong Kong’s Civil Aviation Department (CAD) recently announced plans to step up the regulation of commercial and recreational drones.

article thumbnail

Hackers Can Rickroll Thousands of Sonos and Bose Speakers Over the Internet

WIRED Threat Level

Researchers found that network configuration errors have left thousands of high-end speakers open to epic audio pranking.

Security 110
article thumbnail

5 blog posts to keep your data on track in 2018

IBM Big Data Hub

There are many right ways companies are using data: to know their customers better and to keep up with their needs and expectations to drive loyalty without sacrificing privacy. Here are some recommended reads that will help you learn how to stay on your customers’ good side while still gaining the insights you need to stay competitive.

Privacy 88
article thumbnail

How SMEs can comply with the PCI DSS

IT Governance

Organisations that accept card payments are responsible for the security of customers’ payment information and must comply with the Payment Card Industry Data Security Standard (PCI DSS). The PCI DSS is a set of tools and measures to help you protect payment card data. It applies to all organisations that transmit, process or store such information, but small and medium-sized enterprises (SMEs) should be extra vigilant.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Featured Floor: Clear Lake Chestnut LVP

TAB OnRecord

Tranquility Clear Lake Chestnut waterproof luxury vinyl plank (LVP) combines the look and feel of real hardwood with the easy maintenance of vinyl. This floor boasts rich, chocolate brown shades and authentic graining to add warmth and character to any space! Clear Lake Chestnut is featured in The Legacy Collection , a group of floors curated with the beauty of tradition in mind.

article thumbnail

Leaky RootsWeb Server Exposes Some Ancestry.com User Data

Threatpost

Ancestry.com closes parts of its community-driven genealogy site RootsWeb as it investigates a leaky server that exposed thousands of passwords, email addresses and usernames to the public internet.

article thumbnail

Recapping the Data Governance Winter Conference and looking ahead to 2018 governance trends

IBM Big Data Hub

The 2017 Data Governance Winter Conference on 4 - 8 December covered topics ranging from how to start a data governance program to attaining data governance maturity to how to improve your organization’s information quality. After attending, Brian Mayer, business ready data practitioner, and Mark Lynch unified governance practice lead, discuss major data governance trends covered at the conference.

article thumbnail

Employees open companies to security risks by working remotely

IT Governance

Many workers feel the need to check work emails while on holiday, according to a T-Systems study. Those who do so need to understand the importance of using a secure connection to make sure they are not compromising business security and confidentiality. Key findings included: 31% have used free Wi-Fi hotspots and 24% admitted to using them to access work emails and documents. 28% admitted to emailing work documents to and from their personal email address. 10% have used free USB charging points

Risk 78
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Discover how your company can embrace “The Future of Digital”

OpenText Information Management

Embrace the Future of Digital – as data continues to reinvent our economy, just about every organisation in every sector must transform to a Digital Enterprise if they are to remain competitive and relevant. My favourite conversations involve hearing how customers are succeeding in navigating this digital change. Digitisation and AI are clearly having a … The post Discover how your company can embrace “The Future of Digital” appeared first on OpenText Blogs.

75
article thumbnail

Public interest journalism faces a serious threat from Paradise

The Guardian Data Protection

The offshore law firm at the heart of the Paradise Papers leak has chosen to sue in Britain for good – and worrying – reasons The Paradise Papers investigation into the dubious tax schemes of the world’s wealthiest inhabitants involved 96 media organisations across 67 countries. Appleby, the offshore law firm at the heart of the story, has launched breach-of-confidence proceedings against just two: the Guardian and the BBC.

Paper 69
article thumbnail

The Section 702 Surveillance Debate Has Taken Place in the Dark

WIRED Threat Level

As the debate over Section 702 continues, those deciding its fate don't know basic facts about how it works.

IT 90
article thumbnail

4 tips for achieving better ISO 27001 audit results

IT Governance

An ISO 27001-compliant ISMS requires ongoing maintenance and review to meet the Standard’s requirements in clauses 8 and 9. The internal audit is an essential element of this process that must be carried out as described in clause 9.2 of ISO 27001, and should be conducted at planned intervals. Organisations looking to achieve compliance with ISO 27001 often view the internal audit as a perplexing prospect.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The "Extended Random" Feature in the BSAFE Crypto Library

Schneier on Security

Matthew Green wrote a fascinating blog post about the NSA's efforts to increase the amount of random data exposed in the TLS protocol, and how it interacts with the NSA's backdoor into the DUAL_EC_PRNG random number generator to weaken TLS.

article thumbnail

FERC Issues Notice of Proposed Rulemaking Aimed at Expanding Data Breach Reporting Obligations

Hunton Privacy

On December 21, 2017, the Federal Energy Regulatory Commission (“FERC”) issued a Notice of Proposed Rulemaking (“NOPR”) aimed at expanding mandatory reporting obligations in relation to cybersecurity incidents. In particular, FERC’s NOPR would direct the North American Electric Reliability Corporation (“NERC”) to develop modifications to certain Critical Infrastructure Protection (“CIP”) Reliability Standards so that those standards require mandatory reporting of cybersecurity incidents that com

article thumbnail

France Goes After WhatsApp For Sharing Data With Facebook, and More Security News This Week

WIRED Threat Level

A fake *Cuphead*, a WhatsApp privacy blow-up, and more of the week's top security news.

article thumbnail

NHS steps up its cyber security defences – how are you preparing for the NIS Directive?

IT Governance

In response to the WannaCry attack of May 2017, the NHS is now planning to invest £20 million in a Security Operations Centre , which will include ‘ethical hackers’ assessing the NHS’s defences against cyber attacks in order to prevent future data breaches. The NHS is also expecting the new Security Operations Centre to improve security communications within the organisation to make incident response to any future breaches more effective.

IT 68
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Acoustical Attacks against Hard Drives

Schneier on Security

Interesting destructive attack: " Acoustic Denial of Service Attacks on HDDs ": Abstract : Among storage components, hard disk drives (HDDs) have become the most commonly-used type of non-volatile storage due to their recent technological advances, including, enhanced energy efficacy and significantly-improved areal density. Such advances in HDDs have made them an inevitable part of numerous computing systems, including, personal computers, closed-circuit television (CCTV) systems, medical bedsi

article thumbnail

Code Used in Zero Day Huawei Router Attack Made Public

Threatpost

Researchers warn of copycat type attacks as exploit code used in Mirai variant goes public.

IoT 85
article thumbnail

The Most-read WIRED Security Stories of 2017

WIRED Threat Level

Numerous tales of hacking and breaches proves just how permeable the digital membrane can be.

article thumbnail

How Tech Companies Woo Higher Ed (and What They Seek in Return)

Information Management Resources

Gifts are plentiful during the holidays. But Christmas came early for some higher-ed institutions in the form of freebies and discounts from big technology companies. Amazon gave Echo Dots. Apple also reached out with iPad Pros and other hardware at a discounted rate. Charitable? Perhaps. But these efforts are part of a longer-term strategy for these companies to train future workers in their technology.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

The One Content Trend Essential to a Marketing Strategy in 2018

eSecurity Planet

As we inch closer to the end of the year, all brands have their eyes on the evolving marketing trends for 2018. To prepare, teams often start by brainstorming answers. The post The One Content Trend Essential to a Marketing Strategy in 2018 appeared first on Kapost Content Marketing Blog.

article thumbnail

Weekly Update 67

Troy Hunt

It's Xmas! Well, it was Xmas but I (and hopefully you too) am still in that Xmas period haze where it's hard to tell one day from the next. Apparently, it's also hard to remember to hit record before talking about this week's updates so yeah, good one Troy! But I did eventually record a full update and in an otherwise slow news week, I thought I'd talk a little bit about Xmas down under in Australia.

IT 53
article thumbnail

Post-Quantum Algorithms

Schneier on Security

NIST has organized a competition for public-key algorithms secure against a quantum computer. It recently published all of its Round 1 submissions. (Details of the NIST efforts are here. A timeline for the new algorithms is here.).