2016

Post Brexit, what options are available for a GDPR-light Data Protection Act?

Data Protector

Let’s think the unthinkable. Lets assume that, post Brexit, the British Government has an opportunity to decide how its data protection legislation should reflect the requirements of an aspiring British economy.

GDPR 170

Roughtime

Imperial Violet

Security protocols often assume an accurate, local clock (e.g. TLS, Kerberos, DNSSEC and more). It's a widely accepted assumption when designing protocols but, for a lot of people, it just isn't true. We find good evidence that at least 25% of all certificate errors in Chrome are due to a bad local clock. Even when the local clock is being synchronised, it's very likely to be using unauthenticated NTP.

Predictions 2016: Apple, Tesla, Google, Medium, Adtech, Microsoft, IoT, and Business on a Mission

John Battelle's Searchblog

The post Predictions 2016: Apple, Tesla, Google, Medium, Adtech, Microsoft, IoT, and Business on a Mission appeared first on John Battelle's Search Blog. Twelve years of making predictions doesn’t make writing them any easier, regardless of my relatively good showing in 2015.

IoT 82

Information Governance Must Change

PHIGs

Information governance (IG) is all the rules, regulations, legislation, standards, and policies with which organizations need to comply when they create, share, and use information. Governance is mandated internally and externally. PHIGs IMC Inc – 2014 ).

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

How to Work Beyond the Corporate Firewall Safely

JKevinParker

Today's workforce is increasingly distributed, increasingly mobile, and increasingly expecting telework options. This equates to more people working beyond the corporate walls and beyond the corporate IT firewall.

Paper 97

More Trending

[0day] [exploit] Compromising a Linux desktop using. 6502 processor opcodes on the NES?!

Scary Beasts Security

Overview A vulnerability and a separate logic error exist in the gstreamer 0.10.x player for NSF music files. Combined, they allow for very reliable exploitation and the bypass of 64-bit ASLR, DEP, etc.

What Is Our Professional Future?

Brandeis Records Manager

George Despres, CRM. Program Director for University Records Management, Brandeis University. The content in this blog reflects the opinions of the author, and not of Brandeis University.). Like most people, I prefer to have a reasonable sense of job security, as long as my interest is engaged. I hope and need to remain in the workforce for many more years. At the risk of sounding alarmist, I have concerns about the records management profession’s long-range future.

The growing importance of dynamic pricing and rating in insurance

CGI

The growing importance of dynamic pricing and rating in insurance. shobana.lv@cgi.com. Fri, 11/11/2016 - 01:07. On June 20, 2016, CGI held a roundtable discussion on dynamic rating and pricing in the insurance industry that involved nearly all major Dutch insurers.

Why CGC Matters to Me

ForAllSecure

By David Brumley. In 2008 I started as a new assistant professor at CMU. I sat down, thought hard about what I had learned from graduate school, and tried to figure out what to do next. My advisor in graduate school was Dawn Song , one of the top scholars in computer security. She would go on to win a MacArthur "Genius" Award in 2010. She's a hard act to follow. I was constantly reminded of this because, by some weird twist of fate, I was given her office when she moved from CMU to Berkeley.

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

My Latest Article Published at Today’s General Counsel

Getting Information Done

General Counsel Can Spur Legal Hold Success Check out my latest article which was published in the December/January 2017 digital edition of Today’s General Counsel titled: “General Counsel Can Spur Legal Hold Success” .

Paper 52

My (somewhat unreliable) data protection predictions for 2017

Data Protector

I’ve recently had a quiet year on the blogging front – my professional duties have prevented me from playing a more active role on the Internet during this year than I would have liked, but that is set to change in 2017.

Cryptographic Agility

Imperial Violet

( These are notes that I wrote up from a talk that I gave at the National Academies Forum on Cyber Resilience. You can tell that it was in Washington, DC because of the “cyber”. I wasn't quite sure how technical to pitch this talk so it's relatively introductory; regular readers probably know all this. This isn't a transcript of what I said, but I try to hit the main points in my notes. ). Firstly I'd like to separate extensibility from agility.

The NewCo-BigCo Shift or, These Nine Things Will Change Business Forever

John Battelle's Searchblog

The post The NewCo-BigCo Shift or, These Nine Things Will Change Business Forever appeared first on John Battelle's Search Blog. Addressing the crowd at Dollar Shave before interviewing CEO Michael Dubin during NewCo LA last November. cross posted from NewCo ).

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Taps ‘n’ Apps: Craft Beer Meets the Cloud

PHIGs

Note : this post contains links to every craft brewery in British Columbia and Alberta that I could find. Sadly, I have yet to sample all of their wares.

Cloud 66

Why can’t we be briefed like the President?

Attensa

It started with a simple question posed by a senior marketing exec during a staff meeting.

What You Need to Know About the iMessage Security Flaw

Productivity Bytes

Apple has been in the news a lot lately, and most of the stories are about encryption. It’s currently in a battle with the FBI about adding a back door to its encryption software to allow law enforcement to access files on a locked iPhone, and now the software is coming under fire again.

Siri Lock Screen Bypass in news your non security friends read

Roger's Information Security

This morning I read an article on Good HouseKeeping (don’t make fun, it was a link on one of the news links that get pushed in your face on my start page. I think it was Bing. I hate the news links but like the pictures). It’s interesting to see what security items make it into websites for ‘normal’ people.

MDM 50

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Fact Denial and the Record Under Threat

Brandeis Records Manager

George Despres, CRM. Program Director for University Records Management, Brandeis University. The content in this blog reflects the opinions of the author, and not of Brandeis University.). As if we don’t have enough challenges, controlling information today. Part of our culture, at least here in the U.S., has embraced the acceptance of non-truths and the repudiation of facts in the record. It has also embraced the pseudo-record and fake news.

Strategic information management in the digital age

CGI

Strategic information management in the digital age. ravi.kumarv@cgi.com. Thu, 12/22/2016 - 01:09. Corporate information management has undergone a steady evolution over the past three decades.

Case Study: LEGIT_00004

ForAllSecure

LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution.

IT 52

My Latest Article Published at Document Strategy Magazine

Getting Information Done

How to Get Your Information Governance Projects Funded One of the big challenges for information governance professionals is getting buy-in from business stakeholders and sponsors for funding projects.

Apollo – they can’t still be up to their old tricks?

Data Protector

Two years ago I blogged about an unsettling experience I had with Apollo, a firm that had confused me as to what they were really all about. Since then, I’ve had a number of emails from people who have had similar experiences.

IT 156

memcpy (and friends) with NULL pointers

Imperial Violet

The C standard (ISO/IEC 9899:2011) has a sane-seeming definition of memcpy (section 7.24.2.1): The memcpy function copies n characters from the object pointed to by s2 into the object pointed to by s1. Apart from a prohibition on passing overlapping objects, I think every C programmer understands that.

Google Capitulates to Facebook’s Identity Machine: Is This Good News For The Open Web?

John Battelle's Searchblog

The post Google Capitulates to Facebook’s Identity Machine: Is This Good News For The Open Web? appeared first on John Battelle's Search Blog. Long time readers of this site know that once a year I make predictions, and revisit those I made the year before. But it’s not often I look back farther than one year to see if perhaps I was just a tad too early. It appears in the case of Google and personal data, I was.

The More Things Change …

PHIGs

Last week I wrote that I’m starting to focus on a new market for my services; for a number of reasons I’ve decided to have a go at landing clients from the craft beer industry in Western Canada. Something I didn’t mention in last week’s post is that the craft beer scene in Alberta is booming.

HCL transcending US protectionism with clear alignment to client's global digital business needs & goals

Collaboration 2.0

HCL's 'Great Digital Leap Forward' will keep astute client partners ahead of US offshoring BPO political protectionism

70

Are Your Wireless Gadgets Vulnerable to Hacking?

Productivity Bytes

Hackers are constantly looking for new ways to breach a system, through both hardware and software vulnerabilities. That’s why researchers and white hat hackers — the good guys — use pre-emptive measures to find these vulnerabilities.