2017

Annual Report to Congress on Breaches of Unsecured Protected Health Information

Data Breach Today

The Department of Health and Human Services' Office for Civil Rights provided a report to Congress on health information breaches from September 2009 through 2010, as required under the HITECH Act. Nearly 7.9 million Americans were affected by almost 30,800 health information breaches, according to the report

175
175

‘Mailsploit’ Lets Hackers Forge Perfect Email Spoofs

WIRED Threat Level

The attack uncovers bugs in how more than a dozen programs implement email's creaky protocol. Security

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Records Disrupted: Blockchain as a Transformative Force

Weissman's World

Authors: Alan Pelz-Sharpe (Deep Analysis) & Steve Weissman (Holly Group) If records and content management issues such as security, privacy, and compliance seem everlasting, that’s because they are! What aren’t everlasting though, are the so-called information governance “technologies” we use to bring these matters to heel. In recent decades, we have cycled through imaging, document […]. The post Records Disrupted: Blockchain as a Transformative Force appeared first on Holly Group.

Dispelling 3 most common myths about AI and big data

Information Management Resources

The intelligence in AI comes from the humans who train it! All initiatives need smart human assistance to function successfully. Artificial intelligence Machine learning Data management

Open Source & Open Standards: Navigating the Intricacies of a Symbiotic Partnership

Speaker: Guy Martin, Executive Director of OASIS Open

The COVID-19 global pandemic has raised the already bright visibility of technology to an even higher level. Join Guy Martin, Executive Director at OASIS Open, as he presents this webinar that will discuss how we can make open source and open standards even more effective by helping them recapture their strong partnership.

The case for delaying the date the GDPR applies for a couple more years

Data Protector

A huge percentage of the organisations I’ve recently come into contact with have little chance of becoming “GDPR compliant” by May 2018. To be fair, a good proportion of these organisations have spent the past decade or so ignoring the professional advice that's available on how to better comply with the requirements of the existing data protection legislation.

GDPR 139

More Trending

Virtually Celebrate New Year’s Eve in Every Timezone with the ‘VRChat’ Community

IBM Big Data Hub

Ever wished you could jet set around the world fast enough to ring in the New Year at a party in every timezone? Well that might not be quite possible, but VRChat is offering something close. VRChat , a social VR experience supporting major PC VR headsets via Steam , is celebrating New Year’s Eve virtually in every timezone, every hour, on the hour. Fireworks included. Image courtesy VRChat.

87

Ten things impacting the world: living to 150

OpenText Information Management

Over the course of human history, our life expectancy has been on an upward trend: increasing from 30 years (during prehistoric times) to 35 years (in the Classical Greek and Roman eras) to 48 years (in Medieval times). Better living conditions in the mid-20th century caused the average lifespan to jump to the 70-year mark. … The post Ten things impacting the world: living to 150 appeared first on OpenText Blogs.

4 records management best practices for maximizing storage capacity

TAB OnRecord

If you want to save on records storage space, you can do that by deploying high-density shelving, which allows you to increase storage capacity by up to 330% in a given area. Another way to save is by evaluating your records management practices. Properly managing records can help reduce the volume of records, both now… Read More. The post 4 records management best practices for maximizing storage capacity appeared first on TAB Records Management Blog | TAB OnRecord. Physical filing

Cloud Leaks Continue: 123 Million U.S. Households' Personal Information Exposed Online

eSecurity Planet

The information, from data analytics firm Alteryx, was in an Amazon S3 bucket configured to provide any AWS user with access

Leading Advertising and Analytics Company Outperforms With a Graph Database

Xandr, a division of AT&T, has built an identity graph that connects information on people, households, and more. The company is using this graph to provide advertisers an ability to deliver commercials more successfully than ever before. Learn more.

Testing Security Keys

Imperial Violet

Last time I reviewed various security keys at a fairly superficial level: basic function, physical characteristics etc. This post considers lower-level behaviour. Security Keys implement the FIDO U2F spec , which borrows a lot from ISO 7816-4. Each possible transport (i.e. USB, NFC, or Bluetooth) has its own spec for how to encapsulate the U2F messages over that transport (e.g. here's the USB one ).

Data Breach Today - Untitled Article

Data Breach Today

18 Best 2018 B2B Lead Generation Strategies For Marketers. Have you yet planned your best 2018 B2B lead generation strategies? Well if you have not until now then you should probably know that when it comes to B2B lead Generation, 2018 is going to become the lifeblood of modern sales process. With loads of strategies to choose from, it has become very challenging for businesses to survive the competition.

B2B 171

Snowden-Backed App 'Haven' Turns Your Phone Into a Home Security System

WIRED Threat Level

The NSA leaker's latest project aims to secure your computer—and you—from not just digital but physical attacks. Security

Bitcoin ? Blockchain

Weissman's World

Seems like not an hour goes by that I don’t see a headline about the soaring value of bitcoin – followed near-immediately by another that warns of the imminent bursting of the bitcoin bubble. Since I’m not a bitcoin owner, my interest in these goings-on is more academic than practical. But I am invested (intellectually, […]. The post Bitcoin ≠ Blockchain appeared first on Holly Group. bitcoin Blockchain process management records management information governance

The Best Data Retention Policy & Template To Get You Started

In this whitepaper from Onna, we will walk you through data retention best practices and provide you with a downloadable template to help you get organized and gain better visibility into your data’s lifecycle.

Predictions 2018: 5 trends driving the IoT and IIoT

Information Management Resources

Adoption of the Internet of things and the Industrial Internet of Things show no signs of slowing down. If anything, adoption and implementations will only increase. Internet of things Data management Data and information management

IoT 113

What (currently ignored) privacy area might result in early enforcement action when the GDPR is in force?

Data Protector

We have 480 days to go before the General Data Protection Regulation is “in force”. And then what? That's the question I’m being increasingly asked these days. Does it really mean that in 481 days, European privacy regulators will be heralding the first megafine for non-compliance with one of the GDPR’s more obscure requirements? I think not.

GDPR 131

Inside Mirai the infamous IoT Botnet: A Retrospective Analysis

Elie

This post provides a retrospective analysis of Mirai — the infamous Internet-of-Things botnet that took down major websites via massive distributed denial-of-service using hundreds of thousands of compromised Internet-Of-Things devices. At its peak in September 2016, Mirai temporarily crippled several high-profile services such as. OVH. , Dyn. , Krebs on Security. via massive. distributed Denial of service attacks (DDoS). reported that these attacks exceeded 1Tbps—the largest on public record.

IoT 83

Learning Machine Learning? Six articles you don’t want to miss

IBM Big Data Hub

Digital disruption has revolutionized the way we live and do business — and machine learning is the latest wave of that revolution

87

How to Measure DevSecOps Progress and Ensure Success

Speaker: Shannon Lietz, Director of DevSecOps Team, Intuit

The new DevSecOps team is up and running, and you feel ready to take on rising security threats while delivering quality software updates. But that leaves just one question: how do you monitor your new program as effectively and efficiently as possible? Join Shannon Lietz, Director of DevsecOps at Intuit, and award-winning innovator, to learn the answers to these questions so you can lead your DevSecOps team to the top!

How my Apple Watch gave me a window into a world of IoT in Retail

OpenText Information Management

The Internet of Things (IoT) is beginning to have a major impact in many industry sectors. IoT is a network of connected devices with embedded sensors othat can communicate, analyze and share data over the cloud. So far, the Retail sector has been slow to embrace IoT but it’s beginning to happen. Buying an Apple … The post How my Apple Watch gave me a window into a world of IoT in Retail appeared first on OpenText Blogs.

How do you reduce physical file volumes? Get TAB SMART!

TAB OnRecord

Any place where you find physical files, you also find a great deal of unneeded documents. We regularly see physical records collections containing over 50 percent non-record content. These non-records include duplicates, convenience copies, and documents that have passed their required retention period. Need help getting rid of unneeded documents? Our TAB SMART program is… Read More. The post How do you reduce physical file volumes? Get TAB SMART!

Average Organization Faced 8 DDoS Attacks a Day in Q3 2017

eSecurity Planet

That's a 35 percent increase over the previous quarter

79

What the Galactic Empire Teaches Us about HR

National Archives Records Express

With all the talk around Star Wars this month, we wanted to add to our series of HR lessons in pop culture. Check out our Harry Potter article in case you missed it!) A long time ago, in that galaxy far, far away, the Galactic Empire set out to rule the galaxy. Spoiler alert: they […]. The post What the Galactic Empire Teaches Us about HR appeared first on. General HR

IT 76

Digital Trends Report 2020

As part of our goal to continue helping our community during these times, we wanted to share with you this critical data on the state of digital products across industries and provide context on how businesses are responding to the changing winds.

Uber Concealed Breach of 57 Million Accounts For A Year

Data Breach Today

Firm Paid Hackers $100,000, But Was It Bug Bounty Reward or Extortion Payoff? Uber paid hackers $100,000 to keep quiet about a 2016 breach that exposed 57 million accounts belonging to customers and drivers, Bloomberg reports. But was the payment a bug bounty, as Uber has suggested, or really an extortion payoff and hush money

IT 163

The Mirai Botnet Was Part of a College Student Minecraft Scheme

WIRED Threat Level

The DDoS attack that crippled the internet last fall wasn't the work of a nation-state. It was three college kids working a *Minecraft* hustle. Security

IT 87

View From AIIM17: New Blood or Fresh Meat?

Weissman's World

Like so many others, I have lots of nice things to say about last week’s AIIM17 conference in Orlando, FL. Energy levels were high, sessions were engaging, exhibitors seemed happy, and a good time was had by all. However, rather than write yet another trip report on the subject (links to some are listed below), […]. The post View From AIIM17: New Blood or Fresh Meat? appeared first on Holly Group. AIIM ECM information professional information governance information management

ECM 146

Top 8 Cybersecurity Skills IT Pros Need in 2018

Dark Reading

Cloud security architecture skills to customer-service savvy are among the key IT security skills needed next year as CIOs ramp up hiring

Cloud 73

Testing at Every Stage of Development

Up to 80% of new products fail. The reality is harsh and the reasons why are endless. Perhaps the new product couldn’t oust a customer favorite. Maybe it looked great but was too hard to use. Or, despite being a superior product, the go-to-market strategy failed. There’s always a risk when building a new product, but you can hedge your bets by understanding exactly what your customers' expectations truly are at every step of the development process.

When does the General Data Protection Regulation not require firms to appoint a Data Protection Officer?

Data Protector

I’m increasingly asked whether particular firms actually need to appoint a Data Protection Officer in order to comply with the requirements of the GDPR. Given that the potential fine for non-compliance (with Article 37) is €10 million Euros or up to 2% of the total worldwide annual turnover, companies quite understandably don't want to get such a basic issue wrong.

B2B 131

Exposing the inner-workings of the ransomware economy

Elie

This blog post shed light on the inner workings of the ransomsphere economics and exposes which cybercriminal groups are the biggest earners. This is the second blog post in my series about ransomware economics. The first post. is dedicated to the methodology and techniques needed to trace ransomware payments end-to-end. As this post builds on that methodology, I encourage you to read through the first post if you haven’t done so. final post.

Influencers assess 2017 and make predictions for 2018

IBM Big Data Hub

As the year winds down, questions tend to arise about what the big trends of the past year have been and what the year to come may hold

86