#ModernDataMasters: Henrik Liliendahl, Chairman & CTO, Product Data Lake


I was educated in computer engineering but my first job was on the business side. Product data looks very different depending on the product you are talking about and manufacturers see products very differently from the merchants. “On On the technology side you can exploit cloud services and data lake concepts which means you can receive the data in the form that say, a manufacturer might submit it, but consume it in a way that a merchant might want to.”.

MDM 46

The Third Modern Data Management Summit: Making Data Work!


Speakers represented life sciences, healthcare, manufacturing, retail, consumer goods, financial services, consulting services, and hi-tech. Overall the event provided best in the industry networking opportunity and educational sessions that offered new ways for companies to think about their data in the new digital economy. Ankur Gupta, Sr. Product Marketing Manager, Reltio.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Ransomware infected systems at Xchanging, a DXC subsidiary

Security Affairs

Xchanging is a business process and technology services provider and integrator, which provides technology-enabled business services to the commercial insurance industry. Xchanging is primarily an insurance managed services business that operates on a standalone basis.”

List of data breaches and cyber attacks in August 2020 – 36.6 million records breached

IT Governance

Author of FastPOS malware revealed, pleads guilty Cyber insurance: The moral quandary of paying criminals who stole your data For six months, security researchers have secretly distributed an Emotet vaccine Please stop hard-wiring AWS credentials in your code.

NEW TECH: DataLocker introduces encrypted flash drive — with key pad

The Last Watchdog

DataLocker honed its patented approach to manufacturing encrypted portable drives and landed some key military and government clients early on; the company has continued branching out ever since. One sliver of the $90 billion, or so, companies are expected to spend this year on cybersecurity products and services is an estimated $85 million they will shell out for encrypted flash drives.

Phishing emails and malicious attachments responsible for 34% of cyber attacks

IT Governance

The gaming and public-sector industries were mostly affected by targeted attacks, whereas the insurance and telecom industries mostly suffered opportunistic attacks. Financial and manufacturing organisations were equally affected by both. Email is used organisation-wide and, with targeted attacks a growing concern, it is essential that organisations build awareness and educate their employees.

62% of organisations unaware of the GDPR

IT Governance

The finance and insurance (79%), information or communications (67%) and education (52%) sectors have the highest awareness of the GDPR. The finance and insurance sector is also the most likely to have put in place measures to comply with the GDPR, with 54% having done so. Construction (25%) and the production and manufacturing (27%) sectors are among the least aware of the GDPR.


China Publishes Draft Regulations on Protecting the Security of Key Information Infrastructure

Hunton Privacy

This post has been updated. . On July 10, 2017, the Cyberspace Administration of China published a new draft of its Regulations on Protecting the Security of Key Information Infrastructure (the “Draft Regulations”), and invited comment from the general public. The Cybersecurity Law of China establishes a new category of information infrastructure, called “key [or critical] information infrastructure,” and imposes certain cybersecurity obligations on enterprises that operate such infrastructure.

Top GRC Tools & Software for 2021

eSecurity Planet

LogicManager’s GRC solution has specific use cases across financial services, education, government, healthcare, retail, and technology industries, among others. Its features include: Compliance education & management. Insurance & claims management.

Top 10 Governance, Risk and Compliance (GRC) Vendors

eSecurity Planet

LogicManager’s GRC solution has specific use cases across financial services, education, government, healthcare, retail, and technology industries, among others. Its features include: Compliance education & management. Insurance & claims management.

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

It's one you can get involved in at almost any age ( I started both my kids coding at 6 years old ), it provides endless opportunities to learn for very little or even free (the vast majority of my own programming education has come via free online resources) and it transcends borders and socioeconomic barriers like few others (think of the opportunities it grants people in emerging markets). Borrowing for education can also be good debt. Patience. Frugality. Sacrifice.

U.S. Department of Transportation Issues Third Round of Guidance on Automated Vehicles

Data Matters

notes that state and local governments license drivers, register vehicles, enact and enforce traffic laws, conduct safety inspections, regulate insurance and liability, and build and maintain infrastructure. identifies two primary ways in which the private sector can promote consumer acceptance of automation technology: first, through transparency about vehicle safety performance; second, through public education campaigns.

List of data breaches and cyber attacks in September 2020 – 267 million records breached

IT Governance

The education sector accounted for 20 of the 102 publicly disclosed incidents listed this month – with the majority being ransomware. September saw students around the globe returning to classes, only to be met with an avalanche of cyber attacks.

Preparing for Litigation Before it Happens: eDiscovery Best Practices, Part Four

eDiscovery Daily

Since this could be years after the product was brought to market, the manufacturer and/or distributor may be responsible for an extended period of time for product defects of various types. In addition, industry specific regulations in areas such as gaming or insurance can vary from state to state. Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems.

Ebola and Other Health Emergencies Create Workplace Privacy Dilemmas

Hunton Privacy

Also, a very real risk exists that an infected employee on a manufacturing floor or otherwise in the chain of commerce could create a panicked boycott of the goods/services of their employer. It does not apply to employers – for instance, if an employer provides a self-insured health plan for employees, the plan, but not the employer, is subject to HIPAA.