2017

Records Disrupted: Blockchain as a Transformative Force

Weissman's World

Authors: Alan Pelz-Sharpe (Deep Analysis) & Steve Weissman (Holly Group) If records and content management issues such as security, privacy, and compliance seem everlasting, that’s because they are!

Data Breach Today - Untitled Article

Data Breach Today

18 Best 2018 B2B Lead Generation Strategies For Marketers. Have you yet planned your best 2018 B2B lead generation strategies? Well if you have not until now then you should probably know that when it comes to B2B lead Generation, 2018 is going to become the lifeblood of modern sales process.

B2B 209

Dispelling 3 most common myths about AI and big data

Information Management Resources

The intelligence in AI comes from the humans who train it! All initiatives need smart human assistance to function successfully. Artificial intelligence Machine learning Data management

The case for delaying the date the GDPR applies for a couple more years

Data Protector

A huge percentage of the organisations I’ve recently come into contact with have little chance of becoming “GDPR compliant” by May 2018.

GDPR 181

Cybersecurity or Information Governance Failure???

Getting Information Done

This past weekend the world was overwhelmed by the cyberattack that spread around the globe hitting businesses, hospitals, and government agencies in over 150 countries.

‘Mailsploit’ Lets Hackers Forge Perfect Email Spoofs

WIRED Threat Level

The attack uncovers bugs in how more than a dozen programs implement email's creaky protocol. Security

4 records management best practices for maximizing storage capacity

TAB OnRecord

If you want to save on records storage space, you can do that by deploying high-density shelving, which allows you to increase storage capacity by up to 330% in a given area. Another way to save is by evaluating your records management practices.

More Trending

New Report: Discovering Consumer Attitudes Toward Connected Car Security

Thales Data Security

At Thales eSecurity we are always eager to obtain data on how the world perceives threats to personal data, because it has the potential to inform us on how to make our everyday lives more safe and secure.

Survey 110

What the Galactic Empire Teaches Us about HR

National Archives Records Express

With all the talk around Star Wars this month, we wanted to add to our series of HR lessons in pop culture. Check out our Harry Potter article in case you missed it!) A long time ago, in that galaxy far, far away, the Galactic Empire set out to rule the galaxy. Spoiler alert: they […].

4 cyber security predictions for 2018

IT Governance

From Yahoo to Equifax, this year’s headlines have been dominated by high-profile digital disasters. With the cyber threat landscape only set to grow in 2018, we spoke to a number of industry experts for an insight into the challenges and innovations IT professionals can expect to face in 2018.

Bitcoin ? Blockchain

Weissman's World

Seems like not an hour goes by that I don’t see a headline about the soaring value of bitcoin – followed near-immediately by another that warns of the imminent bursting of the bitcoin bubble. Since I’m not a bitcoin owner, my interest in these goings-on is more academic than practical.

Uber Concealed Breach of 57 Million Accounts For A Year

Data Breach Today

Firm Paid Hackers $100,000, But Was It Bug Bounty Reward or Extortion Payoff? Uber paid hackers $100,000 to keep quiet about a 2016 breach that exposed 57 million accounts belonging to customers and drivers, Bloomberg reports.

IT 209

Predictions 2018: 5 trends driving the IoT and IIoT

Information Management Resources

Adoption of the Internet of things and the Industrial Internet of Things show no signs of slowing down. If anything, adoption and implementations will only increase. Internet of things Data management Data and information management

IoT 240

What (currently ignored) privacy area might result in early enforcement action when the GDPR is in force?

Data Protector

We have 480 days to go before the General Data Protection Regulation is “in force”. And then what? That's the question I’m being increasingly asked these days.

Why Cybersecurity Pros Should Care About Governance

Getting Information Done

Cybersecurity is a strategic priority for most organizations. With recent high-profile breach incidents, including Home Depot, Target, and Sony, many companies are asking themselves, “Will I be next?” The answer is “yes,” based on the number of widespread and increasingly advanced attacks.

Hackers Can Rickroll Thousands of Sonos and Bose Speakers Over the Internet

WIRED Threat Level

Researchers found that network configuration errors have left thousands of high-end speakers open to epic audio pranking. Security

4 essential RIM practices to prepare for mergers and acquisitions

TAB OnRecord

Records management teams have a key role to play in mergers, acquisitions and divestitures. Whether big or small, the sale of any corporate asset must be supported by accurate and complete records. These provide buyers with historical information, compliance documentation and other crucial records.

Fixing Data Breaches Part 3: The Ease of Disclosure

Troy Hunt

This week, I've been writing up my 5-part guide on "Fixing Data Breaches" On Monday I talked about the value of education ; let's try and stop the breach from happening in the first place.

How to lose your password

Thales Data Security

The tsunami of passwords that exist across every aspect of our digital life means that there’s a thriving underground industry of cyber-criminals trying to get at them.

The future of API banking dominates SIBOS

OpenText Information Management

Something that barely raised any interest only two years ago was the focus of many of the discussions at this year’s SIBOS. The use of APIs in banking has rapidly gone from a peripheral issue to central to the thinking for many banks.

Why making a call-centre worker say “poopsy-poo” will strengthen your security

Privacy Surgeon

By Simon Davies. I spent nearly twenty years as a university lecturer unsuccessfully trying to figure a way to make authentication a fun and popular topic, and only now have I cracked the problem.

View From AIIM17: New Blood or Fresh Meat?

Weissman's World

Like so many others, I have lots of nice things to say about last week’s AIIM17 conference in Orlando, FL. Energy levels were high, sessions were engaging, exhibitors seemed happy, and a good time was had by all.

Millions of Computers Affected By Intel Firmware Flaws

Data Breach Today

Numerous Manufacturers Must Prep and Distribute Customized Patches Security experts are readying for more details from chipmaker Intel about two classes of vulnerabilities in its chips that could put organizations' most trusted data at risk.

Understanding the role of Information Rights Management

Information Management Resources

IRM focuses on restricting access and improving security for documents, spreadsheets, PDFs and other important files intended to preserve or share information. Enterprise information management Data security Cyber security

When does the General Data Protection Regulation not require firms to appoint a Data Protection Officer?

Data Protector

I’m increasingly asked whether particular firms actually need to appoint a Data Protection Officer in order to comply with the requirements of the GDPR.

B2B 170

Coming Soon: My Next White Paper

Getting Information Done

Amazon Key Flaw Could Let Rogue Deliverymen Disable Your Camera

WIRED Threat Level

After hackers exposed a way to freeze the delivery service's security cameras, Amazon will push out a fix later this week. Security

Four space planning mistakes (and how to avoid them)

TAB OnRecord

How do we make the most effective use of space? This is a continual challenge for records managers, who are often under pressure to accommodate more documents in a fixed or shrinking storage footprint. When space becomes an issue, it is often the result of decisions or mistakes made a lot earlier.

I'm Sorry You Feel This Way NatWest, but HTTPS on Your Landing Page Is Important

Troy Hunt

Occasionally, I feel like I'm just handing an organisation more shovels - "here, keep digging, I'm sure this'll work out just fine." " The latest such event was with NatWest (a bank in the UK), and it culminated with this tweet from them: I'm sorry you feel this way.

NIST Cybersecurity Framework: IoT and PKI Security

Thales Data Security

In order to talk about any specialized field of knowledge, you need a common language with agreed upon terms, definitions and some level of accepted industry standards. Cybersecurity is no different. But as the industry has evolved, this critical foundational concept has somehow taken a backseat.

IoT 105

Tracking People Without GPS

Schneier on Security

Interesting research : The trick in accurately tracking a person with this method is finding out what kind of activity they're performing. Whether they're walking, driving a car, or riding in a train or airplane, it's pretty easy to figure out when you know what you're looking for.

Forensic research awards highlight the difficulty of digital privacy

OpenText Information Management

At OpenText, we talk often about digital transformation. Technology makes businesses more competitive, opens access to information and provides new opportunities for everyone. Unfortunately, it also creates new vehicles for hackers, scammers and criminals.

Is Your Information Governance Mostly Sound and Fury?

Weissman's World

“It is a tale told by an idiot, full of sound and fury, signifying nothing.”

Cryptocurrency Infrastructure Flaws Pose Bitcoin Risks

Data Breach Today

Major Cybercrime Gangs Shift From Hacking Banks to Bitcoins Bitcoin's massive rise in value and hype continues to draw the attention of hackers, scammers and organized crime.

Risk 198

10 leading IT trends at large delivery systems for 2018

Information Management Resources

Cybersecurity is getting more attention, while artificial intelligence’s benefits may not be realized next year. Cyber security Ransomware Mobile technology Wellness Cloud hosting Telehealth

In praise of. Elizabeth Stafford

Data Protector

Many of even the most dedicated members of the UK’s data protection fraternity may not have heard of Elizabeth Stafford. And that’s a shame. Because she, along with a small band of colleagues in the Department of Digital, Culture, Media & Sport are doing great things.

It’s Here…My Next Thought Leadership Paper

Getting Information Done

Kill Your File Shares: A Roadmap to Reducing Your Biggest Information Risk This is my sequel to last year’s paper, Not if, But When You Get Hacked: Measuring and Proactively Managing Information Risk.

Paper 142