Blockchain for Identity Management: Early Examples

Data Breach Today

Early experiments are demonstrating how blockchain, the distributed and immutable ledger behind virtual currencies, potentially could play an important role in identity management, says Avivah Litan, a Gartner Research analyst

Another example of email misuse

IT Governance

Another week, another example of an email using the Cc (carbon copy) field instead of the Bcc (blind carbon copy) field. This time, it was West Ham United Football Club. . The email was sent to a group of supporters regarding ticket allocations for an away football match. .

An Example of Deterrence in Cyberspace

Schneier on Security

In 2016, the US was successfully deterred from attacking Russia in cyberspace because of fears of Russian capabilities against the US. I have two citations for this.

Real-life examples of social engineering

IT Governance

Social engineering is something that we’ve all done, whether we’ve realised it or not. When we were children it’s likely that we played one parent off against the other to get our own way, telling each that the other had said we could do something we couldn’t – like have another packet of crisps.

MicroStrategy World: AI Best Practices and Real-World Examples

Perficient Data & Analytics

Christine Livingston, Chief Strategy for AI at Perficient spoke on AI best practices and gave some real world examples on how it would work. Where are analytics heading?

GDPR: lawful bases for processing, with examples

IT Governance

For example, when you process staff data for payroll purposes, contractual obligations will apply, as staff will have signed a contract of employment. What is a lawful basis for processing under the GDPR? Do you always need individuals’ consent to process their data?

How to write an ISO 22301-compliant business continuity plan – with example template

IT Governance

Below is an example of a customisable business continuity plan template from the bestselling ISO22301 BCMS Documentation Toolkit. ISO 22301 certification requires organisations to demonstrate their compliance with appropriate documentation , including a business continuity plan.

How to write a GDPR privacy notice – with documentation template example

IT Governance

Below is an example of a customisable privacy notice template available from IT Governance. Example of IT Governance’s GDPR privacy notice template. The post How to write a GDPR privacy notice – with documentation template example appeared first on IT Governance Blog.

3 Brilliant Examples of Interactive Digital Marketing and Why They're Compliance Risks

Hanzo Learning Center

Every department in an organization is a potential source of risk that compliance professionals need to understand, measure, and prepare for. Sales and finance departments need to know the regulatory compliance basics and warning signs of bribery, corruption, money laundering, and fraud.

How to write a GDPR privacy notice – with documentation template example

IT Governance

Below is an example of a customisable privacy notice template, available from the market-leading EU GDPR Documentation Toolkit. Example of the privacy notice template included in the EU GDPR Documentation Toolkit.

Pwned Passwords in Practice: Real World Examples of Blocking the Worst Passwords

Troy Hunt

For example, the list MAY include, but is not limited to: Passwords obtained from previous breach corpuses. Like "Nutella", for example! For example, Bittylicious: In February 2018 we integrated with the excellent HaveIBeenPwned service by @troyhunt to protect users from insecure passwords [link] pic.twitter.com/3Z6W99OqMQ — Bittylicious (@Bittylicious_) May 22, 2018.

Hacking on TV: 8 Binge-Worthy and Cringe-Worthy Examples

Dark Reading

From the psycho-drama Mr. Robot to portraying the outright dangers of ransomware taking down a hospital in Grey's Anatomy, hacking themes now run deep in today's TV shows

Meltdown/Spectre: The First Large-Scale Example of a 'Genetic' Threat

Dark Reading

These vulnerabilities mark an evolutionary leap forward, and companies must make fighting back a priority

Examples of companies who put their intranet on the internet

ChiefTech

Here are some more examples, both supermarkets in the UK, who make their employee ''intranet'' accessible (i.e. I''ve previously written about the Royal Mail''s externally accessible staff website (unfortunately, if you are outside the UK they have now geoblocked the content). not behind a login or VPN) over the public Web: Asda Green Room blog. Out Tesco , which also includes information about staff benefits and working at Tesco.

Social business is more than adding a social layer: A banking example

ChiefTech

For example, another second tier Australian bank is also talking about overhauling their core banking systems.

How Would YOU Describe the Mortgage Lender of the Future?

InfoGoTo

Alternatively, borrowers with more complex situations such as self-employed income or those purchasing a unique property, for example, may require extra personalization from the lender to help them find the best mortgage to fit their specific needs.

Artificial Intelligence Is Set to Rewrite the Rules of Insurance

InfoGoTo

For example, Progressive Insurance has handed out more than $700 million in discounts to customers who let the company track where and how they drive. Few industries stand to gain as much by adopting artificial intelligence as insurance.

AI Is Becoming a Trusted Sidekick for Legal and HR Departments

InfoGoTo

For example, starting with a knowledge base of language that is common to problematic contracts, machine learning algorithms can scour millions of similar contracts to find other warning signs that humans might miss.

Privacy Is Paramount in a Digital Workplace

InfoGoTo

These are just two examples of what IG must handle on a daily basis. For the past several years, one of the biggest challenges many organizations have faced is transitioning to a digital workplace.

Extending intranets to hard-to-reach staff: Controlled documents kiosk example

ChiefTech

The IBF list the following examples of hard-to-reach staff: factory workers retail staff field engineers building inspectors consultants sales teams flight and rail workers catering staff building inspectors call centre representatives insurance assessors.

Workflow Solutions Let You Reimagine What’s Possible

InfoGoTo

For example, the time needed to onboard a new employee can be dramatically shortened with rules that simultaneously notify facilities managers of the need for a desk, alert IT to provide a computer, and enroll the new hire in the organization’s benefits and training programs. For example, when a customer is added to the sales database, their information can be recorded in the marketing automation system, triggering it to send a thank-you with a coupon for the next purchase.

China’s Data Protection Laws Go Further Than GDPR

InfoGoTo

For example, this January more than 200 million Chinese resumes were hacked, according to the South China Morning Post. Though much of the news concerning China and data protection in recent months has featured Chinese threat actors, the country’s citizens are often targets, too. China’s data protection laws have been presented as a response to the data security threats facing the nation.

Two Contrarian Thinkers who went Unheeded

Troy Hunt

History Innovation Examples & Lessons contrarian Konrad Kellen Lansdowne letter Lord Lansdowne thinker unheeded Vietnam warLord Lansdowne.

How Artificial Intelligence Will Yield a Gusher of Benefits for Energy Companies

InfoGoTo

For example, an engineer could say “show the operational history of all wells in the North Central United States that exceeded their life expectancy by more than 20%.” The oil and gas industries have a long record of meticulous record-keeping , but until recently those records were, by necessity, captured on paper and film.

Public Shaming of Companies for Bad Security

Schneier on Security

Troy Hunt makes some good points , with good examples. psychologyofsecurity securityengineering securitypolicies

This is the old ChiefTech blog.: Internal blogging is just one example of open information sharing inside an organisation

ChiefTech

Sunday, 24 June 2007 Internal blogging is just one example of open information sharing inside an organisation Linking to Seven Reasons for Your Company to Start an Internal Blog on CIO.com , Jack Vinson reflects on a separate discussion about the value of blogging to knowledge management : " In a recent discussion on the ACT-KM discussion list, someone mentioned that blogging is just one means of communication - that it isnt the be-all, end-all of knowledge sharing.

Former Insider Indicted for Criminal HIPAA Violations

Data Breach Today

Latest Rare Example of Prosecutors Pursuing a HIPAA Case A federal grand jury in Pennsylvania has indicted a former patient coordinator on several counts of wrongfully obtaining and disclosing the health information of others.

Database of 24 Million Mortgage, Loan Records Left Exposed Online

Dark Reading

Breach latest example of how misconfigurations, human errors undermine security in a big way, experts say

Super Micro: Audit Didn't Find Chinese Spying Chip

Data Breach Today

Bloomberg, however, has stood by its story despite no physical example of the malicious chip turning up

Researchers Made Google's Image Recognition AI Mistake a Rifle For a Helicopter

WIRED Threat Level

To safeguard AI, we’re going to need to solve the problem of ‘adversarial examples.’. Security

This is the old ChiefTech blog.: Marching the intranet retreat

ChiefTech

Monday, 28 May 2007 Marching the intranet retreat Another example of the march of the wikis into the intranet zone, this time Thomas Nelson publishing has switched from a "static" intranet to a wiki (care of Michael Sampson ). Another example, and a little closer to home, I noticed that Ark Group in Australia have an intranet tour during August in Sydney that includes a demonstration of Janssen-Cilag s wiki-based intranet. This is the old ChiefTech blog.

This is the old ChiefTech blog.: OK, RSS may not be in so bad a place after all

ChiefTech

Wednesday, 17 January 2007 OK, RSS may not be in so bad a place after all eWeek provides examples of companies where RSS Offers Relief from Enterprise E-Mail Overload (care of Moonwatcher ), offering a more positive view than weve heard in my last post. For example at Procter & Gamble they are using a very Enterprise 2.0 This is the old ChiefTech blog. Nice of you to drop in and visit. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009.

Take Your Security With You From On-Premises to the AWS Cloud

Data Breach Today

Get expert insight on use cases, plus informative real-world examples plus more about how the cloud services hub/Transit VPC Solution leverages the cloud's scalable network to provide security services throughout the enterprise.

Video 165

How Machine Learning Transforms Fraud Management

Data Breach Today

Digital Security: Preventing Unauthorized Access to Company Data

InfoGoTo

Address social engineering, for example, by educating employees about phishing attacks. Modern cyberthreats cost companies in many ways. Major data breaches have led some chief executives to resign from their organizations. Brand damage, fines, lost business and revenues, and dips in stock prices are only tip of the breach-aftermath iceberg. Organizations must recognize and mitigate the threats that affect their digital security most.

Non-Human Resources for the HR Professional: Harnessing the Data

InfoGoTo

For example, they could standardize common policies and interactions, such as performance tracking. Can you pinpoint the most important aspect of your professional skill set?

Philips, BD Yet Again Issue Medical Device Security Alerts

Data Breach Today

Experts Say Companies Offer Good Examples of Transparency Philips and Becton Dickinson have each issued multiple alerts this year regarding cybersecurity flaws in some of their medical devices.

The view from the trenches. | ZDNet

Collaboration 2.0

strategy and tactics, here’s an example of some realities from a client side perspective. strategy and tactics, here’s an example of some realities from a client side perspective.

Key Skills for Records Managers: Working Productively With IT

InfoGoTo

For example, a master data management project requires close coordination between teams on both sides. For example, RIM may specify a certain level of security for some documents.

Broadcast or communicate? | ZDNet

Collaboration 2.0

A fascinating example for me is that while most of the world was busy building out telephone communications infrastructure, the Soviets chose to focus on installing loudspeakers everywhere.