Sat.Dec 30, 2017 - Fri.Jan 05, 2018

article thumbnail

DHS Says 246,000 Employees' Personal Details Were Exposed

Data Breach Today

13 Years of Witness Statements to DHS Office of Inspector General Also Exposed The U.S. Department of Homeland Security says nearly 250,000 federal employees' personal details were exposed in a 2014 breach of its Office of Inspector General's case management system. Witness testimony and an unknown number of nonemployees' personal details also were exposed.

Security 181
article thumbnail

5 automation issues that every organization needs to answer about information chaos

AIIM

Ultimately, AIIM believes Digital Transformation is more than conventional change. Digital Transformation is about using information in brand new ways. Digital Transformation success or failure fundamentally rests upon radically redefined experiences with customers, employees, and partners. In our previous Tip Sheet – Conquering Information Chaos with Intelligent Information Management (IIM) – I discussed the key role that IIM plays as a core set of foundational technologies for Digital Transfor

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Personal data of a billion Indians sold online for £6, report claims

The Guardian Data Protection

Newspaper says it bought access to details from world’s largest biometric database, used to administer public services The personal information of more than a billion Indians stored in the world’s largest biometric database can be bought online for less than £6, according to an investigation by an Indian newspaper. The reported breach is the latest in a series of alleged leaks from the Aadhaar database, which has been collecting the photographs, thumbprints, retina scans and other identifying de

article thumbnail

Best of TAB 2017 part 3: the top white papers

TAB OnRecord

In a four-part series, we are bringing you the top case studies, white papers, blog posts, and guides – all chosen by your records management colleagues! For part three of our series, we reveal the most popular white papers of the past year. These in-depth resources cover: survival skills for modern records managers, RIM software, [.] Read More. The post Best of TAB 2017 part 3: the top white papers appeared first on TAB Records Management Blog | TAB OnRecord.

Paper 92
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

KCMA Rebrands as Hitachi Construction Machinery Loaders America

Data Breach Today

KCMA Corporation, a subsidiary of Hitachi Construction Machinery Group, has changed their corporate name to Hitachi Construction Machinery Loaders America Inc effective January 1, 2018. . The company based in Kennesaw, Georgia, intends to increase production and streamline their wheel loader offering in the North American market with manufacturing facilities in Banshu, Japan; Ryugasaki, Japan, and Newnan, Georgia.

More Trending

article thumbnail

Virtually Celebrate New Year’s Eve in Every Timezone with the ‘VRChat’ Community

IBM Big Data Hub

Ever wished you could jet set around the world fast enough to ring in the New Year at a party in every timezone? Well that might not be quite possible, but VRChat is offering something close. VRChat , a social VR experience supporting major PC VR headsets via Steam , is celebrating New Year’s Eve virtually in every timezone, every hour, on the hour.

102
102
article thumbnail

Why 2018 Will Be the Trust Turning Point for the Digital Economy

Thales Cloud Protection & Licensing

We are in the midst of a digital revolution impacting every aspect of our everyday lives. At the center of the revolution is data, which is available in more forms, volume, depth and complexity since the beginnings of the computer revolution. Earlier this year , IDC predicted the world’s volume of data would expand to 163 zettabytes by 2025 – a tenfold rise in the total.

article thumbnail

Top 5 Ways to Hack a Business

Data Breach Today

Testing Networks With WannaCry, Petya and EternalRocks Finds Widespread Failures Simulated attacks by an information security testing firm have found that fresh WannaCry, NotPetya and EternalRocks would still rip through many an enterprise network. Here's how organizations must respond.

article thumbnail

John Daly AIIM18 Speaker Interview

AIIM

Here’s your chance to get to know our AIIM18 speakers a little better before you get to San Antonio and see them live. We can’t wait to see you April 11-13th. Name John Daly. Email jdaly@stlmsd.com. LinkedIn Profile [link]. Job Title Information Governance Manager. Company Metropolitan St. Louis Sewer District. Can you give us a sneak peek into your AIIM18 Presentation?

Paper 81
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

2018 Cause Awareness & Giving Day Calendar

Troy Hunt

Cause awareness and giving days can be very powerful themes upon which to launch online fundraising campaigns. The real-time, in-the-moment nature of cause awareness and giving days can inspire donors to give provided that your nonprofit knows how to promote the days effectively. The first step is to decide which days to build a campaign upon and add them to your 2018 editorial calendar.

98
article thumbnail

Counting down, Getting Ready: GDPR in a Multi-Cloud World

Thales Cloud Protection & Licensing

( Originally posted to CenturyLink’s blog on November 10 ). To help save time and money, a growing number of enterprises are storing sensitive customer data in the public cloud. Increasingly, they’re also leveraging multiple cloud providers. According to IDC, nearly 80% of IT organizations currently deploy multi-cloud or plan to implement multi-cloud environments within 12 months.

GDPR 91
article thumbnail

Security Vulnerabilities in Star Wars

Data Breach Today

A fun video describing some of the many Empire security vulnerabilities in the first Star Wars movie. Happy New Year, everyone.

Security 201
article thumbnail

Susan Sherrouse AIIM18 Speaker Interview

AIIM

Here’s your chance to get to know our AIIM18 speakers a little better before you get to San Antonio and see them live. We can’t wait to see you April 11-13th. Name Susan Sherrouse Email susan.sherrouse@fluor.com. LinkedIn Profile [link]. Job Title Principal Project Information Manager. Company Fluor. Please provide one or two points that you will mention during your session.

ROT 80
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Critical "Meltdown" and "Spectre" Flaws Breaks Basic Security for Intel, AMD, ARM Computers

WIRED Threat Level

Still-unidentified researchers have found a critical chip flaw that developers are scrambling to patch in millions of computers.

Security 111
article thumbnail

Digital Transformation in Government, keep calm and carry on

OpenText Information Management

Recently I attended a conference on Digital Transformation in Government along with leading senior managers from different government agencies in the US. We were there to discuss the challenges of Digital Transformation and to celebrate some of the incredible success stories. It struck me just how daunting the process of transforming to digital government can … The post Digital Transformation in Government, keep calm and carry on appeared first on OpenText Blogs.

article thumbnail

5 Trends Cybersecurity Practitioners Must Address in 2018

Data Breach Today

A look ahead at five trends that should have a significant impact on cybersecurity in 2018 is featured in the final ISMG Security Report for 2017. Cybersecurity and privacy thought leader Christopher Pierson forecasts the likely occurrences.

article thumbnail

Get a jump start on real-time analytics and insights

IBM Big Data Hub

Unlock the trusted information about your customers with MDM and empower your business analysts to search, explore and match with other data collections with governed freedom.

MDM 83
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Pro-Russia Twitter Trolls Take Aim at Special Counsel Robert Mueller

WIRED Threat Level

As special counsel Robert Mueller's Russia investigation heats up, a network of pro-Russia trolls have rushed to discredit him.

Security 111
article thumbnail

Privacy and Cybersecurity Top 10 for 2018

Data Matters

This past year was marked by ever more significant data breaches, growing cybersecurity regulatory requirements at the state and federal levels and continued challenges in harmonizing international privacy and cybersecurity regulations. We expect each of these trends to continue in 2018. As we begin this New Year, here is list of the top 10 privacy and cybersecurity issues for 2018: EU GDPR.

article thumbnail

$52 Million Water Utility Project at North Pole Begins

Data Breach Today

The News Miner in Fairbanks, Alaska, reports Exclusive Paving has been awarded a $52.1 million project to expand the water system in North Pole, southeast of Fairbanks, as part of a settlement to correct groundwater damage caused by a sulfolane leak at what was the Williams Alaska Petroleum refinery, now owned by Flint Hills Resources.

157
157
article thumbnail

SMBs – digitize or miss your window of opportunity

OpenText Information Management

Did you know that over 50% of information exchanged between business partners still travels by fax, email, or phone? The other half is exchanged via structured, automated methods and is increasingly gaining ground. If 2018 predictions are correct, I believe we are now at an inflection point and the window of opportunity for small to medium-sized businesses (SMBs) … The post SMBs – digitize or miss your window of opportunity appeared first on OpenText Blogs.

B2B 78
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Voter ID Laws Really Do Discriminate, a New Study Shows

WIRED Threat Level

Critics of voter ID laws have had a difficult time proving their menace in court. A new algorithm could change that.

Security 111
article thumbnail

Spectre and Meltdown Attacks Against Microprocessors

Schneier on Security

The security of pretty much every computer on the planet has just gotten a lot worse, and the only real solution -- which of course is not a solution -- is to throw them all away and buy new ones. On Wednesday, researchers just announced a series of major security vulnerabilities in the microprocessors at the heart of the world's computers for the past 15-20 years.

Cloud 78
article thumbnail

Meltdown and Spectre: Patches and Workarounds Appear

Data Breach Today

Makers of Operating Systems, Devices and Cloud Services Rush Fixes Microprocessor makers Intel, ARM and AMD, as well as operating system and software developers and makers of smartphones and other devices, are rushing to prep, test and ship fixes for the serious CPU flaws exploitable via Meltdown and Spectre attacks.

Cloud 154
article thumbnail

50 Gorgeous Gallery Walls You'll Want to Try

Archive Document Data Storage

Gallery walls are a decor trend that seem to be able to stand the test of time and for good reason. Powerful, beautiful, and full of character, these commanding art displays are a great way to fill up a large empty wall at home, without having to pull out your paint brushes (and with plenty more personality to boot). To prove our point, we've rounded up 50 of the most glorious gallery walls we could find on the web.

76
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

What Happens If Russia Attacks Undersea Internet Cables

WIRED Threat Level

The world’s internet infrastructure is vulnerable, but snipping a couple of lines is the least of your concerns.

Security 110
article thumbnail

Insurance firm and two senior figures handed record data breach fines

The Guardian Data Protection

Fines totalling more than £150,000 handed down over use of private detectives to illegally obtain private banking records An insurance firm and two senior figures connected with the company have been given record fines for using private detectives to illegally obtain the private banking records of a businessman they were investigating. The fines, totalling more than £150,000, were described by an official watchdog as the highest ever imposed under the Data Protection Act for unlawfully acquiring

article thumbnail

Ransomware Attacks Will Be More Devastating and Widespread

Data Breach Today

An analysis of how unprepared businesses are to fight back against the continued problem of ransomware is featured in the latest edition of the ISMG Security Report. Also featured: outlooks for health data breaches and other cybersecurity trends in 2018.