Sat.Aug 27, 2016 - Fri.Sep 02, 2016

article thumbnail

Password Expiration

Roger's Information Security

FTC Chief Technologist Lorrie Cranor wrote in March it is time to reconsider mandatory password changes. Unless there is reason to believe a password has been compromised or shared, requiring regular password changes may actually do more harm than good in some cases. (And even if a password has been compromised, changing the password may be ineffective, especially if other steps aren’t taken to correct security problems.).

article thumbnail

DB2 for z/OS: Clearing Up Some Matters Pertaining to Database Access Threads

Robert's Db2

I have recently received a number of questions pertaining to DB2 for z/OS database access threads, or DBATs. DBATs are threads used in the execution of SQL statements that are sent to DB2 from network-attached applications (i.e., from DRDA requesters that access DB2 for z/OS by way of DB2's distributed data facility, also known as DDF). Thinking that these questions (and associated answers) might be of interest to a good many people in the DB2 for z/OS community, I'm packaging them in this blog

Access 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CASL compliance undertakings continue to mount

Privacy and Cybersecurity Law

Another company that is well-known to consumers has agreed to enter into a compliance undertaking with the CRTC for alleged […].

article thumbnail

FTC Seeks Input on GLB Safeguards Rule

Hunton Privacy

On August 29, 2016, the Federal Trade Commission announced that it is seeking public comment on the Gramm-Leach-Bliley Act (“GLB”) Safeguards Rule. The GLB Safeguards Rule, which became effective in 2003, requires financial institutions to develop, implement and maintain a comprehensive information security program to safeguard customer information.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

New White Paper Published

Getting Information Done

Not if, But When You Get Hacked: Measuring and Proactively Managing Information Risk If this is true, then what are organizations to do? These increased cyber security threats corporations face today is a big concern for Board members and CEOs. The Chief Information Security Officer (CISO) along with help from the Chief Privacy Officer, General Counsel (GC), and CIO are tasked with keeping the company safe and addressing this risk.

Paper 40
article thumbnail

The Ashley Madison Breach: Canada-Australia Report of Investigation and Takeaways for all Organizations

Privacy and Cybersecurity Law

On August 23, 2016, the Office of the Privacy Commissioner of Canada (OPC) released its joint report with the Office […].

Privacy 52