Remove tag health-data
article thumbnail

GUEST ESSAY: The drivers behind persistent ransomware — and defense tactics to deploy

The Last Watchdog

The technology industry has met the dramatic rise in ransomware and other cyber attacks with an impressive set of tools to help companies mitigate the risks. Healthcare and public health, financial services, and IT organizations are frequent targets, although businesses of all sizes can fall victim to these schemes. Prevalence.

article thumbnail

The most valuable AI use cases for business

IBM Big Data Hub

Promote cross- and up-selling Recommendation engines use consumer behavior data and AI algorithms to help discover data trends to be used in the development of more effective up-selling and cross-selling strategies, resulting in more useful add-on recommendations for customers during checkout for online retailers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Some technology trends such as real-time data analytics are on-going, while others are more recent, such as blockchain. This discussion will include methods, tools, and techniques such as using personae and identifying use cases that have high business value, while minimizing project risks. This is a best-case scenario.

article thumbnail

Preparing for Litigation Before it Happens: eDiscovery Best Practices, Part Two

eDiscovery Daily

Craig Bayer, the principal of legal document management firm Optiable , put it best when he said to me that “A DMS is not an enterprise data organization solution.”. IG, or as it’s also known data governance, is basically a set of rules and policies that have to do with a company’s data. Data access.

IT 31
article thumbnail

Illinois Court Says Biometric Fingerprint is Violation of Privacy, Even Without Injury: Data Privacy Trends

eDiscovery Daily

The law has become a sticking point for a number of tech companies using facial recognition as a photo-sorting tool, and both Facebook and Google have faced lawsuits for alleged BIPA violations in their photo-tagging products. US , I’ve been saying that 2018 was the year of data privacy.

article thumbnail

Humanitarian Collaboration | ZDNet

Collaboration 2.0

Topics mobile , health care , advertising & promotion , marketing , oliver marks Blogger Info Oliver Marks Bio Contact Biography Oliver Marks Oliver Marks provides seasoned independent consulting guidance to companies on the effective planning of Enterprise 2.0 strategy, tactics, technology decisions and roll out.

article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

The cloud may help development and application teams move fast, but for security teams already dealing with alert fatigue, tool sprawl and legacy workflows, cloud adoption means a lot more stress. The company's website was defaced with a leering Yoba face, and the attackers claimed to have stolen some 7 1/2 terabytes of data.

Cloud 52