Digital Transformation Examples: Three Industries Dominating Digital Transformation


Digital transformation examples can be found almost anywhere, in almost any industry. Amazon began as a disruptor to brick-and-mortar bookstores, eventually becoming one of the most obvious digital transformation examples as it went on to revolutionize online shopping.

5 ways to detect a phishing email – with examples

IT Governance

In this blog, we use real-life examples to demonstrate five clues to help you spot phishing scams. For example, emails from Google will read ‘’. Take this example of a scam mimicking PayPal: Image: WeLiveSecurity. A typical example looks like this: Source: MailGuard.

Anatomy of a spear phishing attack – with example scam

IT Governance

Let’s take a look at how it works, along with an example to help you spot the clues of an attack. An example of a spear phishing email. Here’s an example of a real spear phishing email. All the above are typical examples of emotional manipulation.

Blockchain for Identity Management: Early Examples

Data Breach Today

Early experiments are demonstrating how blockchain, the distributed and immutable ledger behind virtual currencies, potentially could play an important role in identity management, says Avivah Litan, a Gartner Research analyst

Planning a Bug Bounty Program? Follow Shopify's Example

Dark Reading

Four years, $1 million in payouts, and the identification of 950 bugs later, Shopify provides an excellent example for organizations looking to launch their own programs

Examples of data processing activities that require a DPIA

IT Governance

The Regulation doesn’t define what ‘high risk’ is, so this blog provides examples of processing activities that require a DPIA. Before we crack on with our examples, we should explain how you can identify high-risk data processing activities.

Another example of email misuse

IT Governance

Another week, another example of an email using the Cc (carbon copy) field instead of the Bcc (blind carbon copy) field. This time, it was West Ham United Football Club. . The email was sent to a group of supporters regarding ticket allocations for an away football match. .

Digital Transformation Examples: How Data Is Transforming the Hospitality Industry


The rate at which organizations have adopted data-driven strategies means there are a wealth of digital transformation examples for organizations to draw from. Digital Transformation Examples: Hospitality – Data, Data Everywhere.

An Example of Deterrence in Cyberspace

Schneier on Security

In 2016, the US was successfully deterred from attacking Russia in cyberspace because of fears of Russian capabilities against the US. I have two citations for this.

GDPR: lawful bases for processing, with examples

IT Governance

For example, when you process staff data for payroll purposes, contractual obligations will apply, as staff will have signed a contract of employment. What is a lawful basis for processing under the GDPR? Do you always need individuals’ consent to process their data?

Real-life examples of social engineering – part 2

IT Governance

Last month, I published an article looking at two examples of the use of social engineering in everyday life. I’d like to continue the theme of that article by talking about three other social engineering attacks that caused great damage. Diamonds, diamonds, DIAMONDS.

How to write an ISO 22301-compliant business continuity plan – with example template

IT Governance

Below is an example of a customisable business continuity plan template from the bestselling ISO22301 BCMS Documentation Toolkit. ISO 22301 certification requires organisations to demonstrate their compliance with appropriate documentation , including a business continuity plan.

MicroStrategy World: AI Best Practices and Real-World Examples

Perficient Data & Analytics

Christine Livingston, Chief Strategy for AI at Perficient spoke on AI best practices and gave some real world examples on how it would work. Where are analytics heading?

How to write a GDPR privacy notice – with documentation template example

IT Governance

Below is an example of a customisable privacy notice template available from IT Governance. Example of IT Governance’s GDPR privacy notice template. The post How to write a GDPR privacy notice – with documentation template example appeared first on IT Governance Blog.

How to write a GDPR privacy notice – with documentation template example

IT Governance

Below is an example of a customisable privacy notice template, available from the market-leading EU GDPR Documentation Toolkit. Example of the privacy notice template included in the EU GDPR Documentation Toolkit.

Pwned Passwords in Practice: Real World Examples of Blocking the Worst Passwords

Troy Hunt

For example, the list MAY include, but is not limited to: Passwords obtained from previous breach corpuses. Like "Nutella", for example! For example, Bittylicious: In February 2018 we integrated with the excellent HaveIBeenPwned service by @troyhunt to protect users from insecure passwords [link] — Bittylicious (@Bittylicious_) May 22, 2018.

Hacking on TV: 8 Binge-Worthy and Cringe-Worthy Examples

Dark Reading

From the psycho-drama Mr. Robot to portraying the outright dangers of ransomware taking down a hospital in Grey's Anatomy, hacking themes now run deep in today's TV shows

3 Brilliant Examples of Interactive Digital Marketing and Why They're Compliance Risks

Hanzo Learning Center

Every department in an organization is a potential source of risk that compliance professionals need to understand, measure, and prepare for. Sales and finance departments need to know the regulatory compliance basics and warning signs of bribery, corruption, money laundering, and fraud.

What belongs in a community web archive? New collecting guidelines and examples from Community Webs partners


Even as web archiving becomes more widely practiced, publicly available examples of collection development policies to guide these decisions can be hard to find and adapt for local use. by Sylvie Rollason-Cass, Web Archivist for Archive-It. What belongs in a web archive? And what doesn’t?

Here’s an Example of a Phishing Email I Received and What I Did About It: Cybersecurity Best Practices

eDiscovery Daily

The post Here’s an Example of a Phishing Email I Received and What I Did About It: Cybersecurity Best Practices appeared first on CloudNine.

Envisioning new and hidden realities with data and augmented reality—a digital “twin city” example


Envisioning new and hidden realities with data and augmented reality—a digital “twin city” example. For example, a supermarket that makes home grocery deliveries has empty vehicles returning from those deliveries. Another example could be cities taking advantage of data from cars, which are becoming an important information hub, to improve planning, traffic and maintenance. Take a modern film, for example.

Meltdown/Spectre: The First Large-Scale Example of a 'Genetic' Threat

Dark Reading

These vulnerabilities mark an evolutionary leap forward, and companies must make fighting back a priority

Examples of companies who put their intranet on the internet


Here are some more examples, both supermarkets in the UK, who make their employee ''intranet'' accessible (i.e. I''ve previously written about the Royal Mail''s externally accessible staff website (unfortunately, if you are outside the UK they have now geoblocked the content). not behind a login or VPN) over the public Web: Asda Green Room blog. Out Tesco , which also includes information about staff benefits and working at Tesco.

Social business is more than adding a social layer: A banking example


For example, another second tier Australian bank is also talking about overhauling their core banking systems.

Do you have any examples of where any sort of civic engagement outreach/campaigns affected legislation?


Do you have any examples of where any sort of civic engagement outreach/campaign affected legislation? I’m looking for more granular examples than a response like “the civil rights movement&# , but more so examples of specific petitions or letter writing campaigns that might have contributed to getting some sort of legislation passed. Hey gang- Huge BIG favor that might be really easy for you.

Two Contrarian Thinkers who went Unheeded

Troy Hunt

History Innovation Examples & Lessons contrarian Konrad Kellen Lansdowne letter Lord Lansdowne thinker unheeded Vietnam warLord Lansdowne.

Extending intranets to hard-to-reach staff: Controlled documents kiosk example


The IBF list the following examples of hard-to-reach staff: factory workers retail staff field engineers building inspectors consultants sales teams flight and rail workers catering staff building inspectors call centre representatives insurance assessors.

A Cautionary Tale for GDPR Article 5 Compliance


Take, for example, the experience of a taxi company in Denmark. For example, Article 5(1)(b) specifies that personal data may only be “collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes.”

The Evolution of Health IT is Affecting How People Think of Benefits and Insurance


One example is with recent Amazon Alexa updates where PHI can be communicated through Alexa in a HIPAA compliant way. The healthcare industry has increased access to health services and patient data with advances in health IT. These advances are impacting insurance benefit offerings. Read more here. News Amazon healthcare industry insurance benefit offerings

AI Is Becoming a Trusted Sidekick for Legal and HR Departments


For example, starting with a knowledge base of language that is common to problematic contracts, machine learning algorithms can scour millions of similar contracts to find other warning signs that humans might miss.

Hackers are Hurting the Internet of Things in More Ways Than you Think


Here are some examples of how cybercriminals use and abuse the IoT for anything but the good of your networks, systems, data, organization and consumers. There are more examples that parallel these, illustrating a more profound problem.

IoT 63

Artificial Intelligence Is Set to Rewrite the Rules of Insurance


For example, Progressive Insurance has handed out more than $700 million in discounts to customers who let the company track where and how they drive. Few industries stand to gain as much by adopting artificial intelligence as insurance.

Fileless Malware: Computer Infections Undress for Success


Together these technologies detect, for example, whether a supposed human being logs into systems and data all hours of the day like an automated attack would do, or logs into departments where they don’t work. Criminal hackers are stripping away the files that clothe malicious software and injecting code, commands and instructions for native Windows tools straight into your computer’s RAM to launch attacks undetected.

The end of LIBOR: Are you prepared?


For example, on mortgage loans the one-year LIBOR is typically used. What once could have been argued as being one of the most important benchmarks in banking, LIBOR (London InterBank Offered Rate), is coming to an end.

6 Health IT Conferences in 2019 That Might Actually Be Worth the Trip


Why you might want to show up: If you want to learn through real-world examples and bring home actionable information (and hear the CTO of the HHS speak), this might be the conference for you.

This is the old ChiefTech blog.: Internal blogging is just one example of open information sharing inside an organisation


Sunday, 24 June 2007 Internal blogging is just one example of open information sharing inside an organisation Linking to Seven Reasons for Your Company to Start an Internal Blog on , Jack Vinson reflects on a separate discussion about the value of blogging to knowledge management : " In a recent discussion on the ACT-KM discussion list, someone mentioned that blogging is just one means of communication - that it isnt the be-all, end-all of knowledge sharing.

Consumerization Is Going to Force Your Healthcare Data Management Strategy Hand


For example, the National Committee for Quality Assurance (NCQA) Healthcare Effectiveness Data and Information Set (HEDIS) is connected to value-based changes in payer reimbursement. A few years back, healthcare data management strategies generally stopped at the walls of clinical and revenue cycles. But the advent of patient-centered trends and the rise of healthcare consumerism has caused a shift that data management professionals can’t afford to ignore.

Insurer: Breach Undetected for Nine Years

Data Breach Today

Dominion National Says Recently Discovered Incident Dates Back to 2010 A dental and vision insurer's revelation that it recently discovered a 9-year-old data security incident offers an extreme example of the difficulty some organizations have in detecting data breaches

How the New EU Copyright Directive Will Impact Everyone Who Creates Online Content


For example, Article 11 of the EU Copyright Directive doesn’t specifically define the terms “news site” or “snippet,” leaving those details up to individual members.

Video 56

Two New Proposed Rules Would Increase Interoperability of Health Information


Examples of this include when a healthcare organization or vendor charges fees for exchanging information that make it cost prohibitive or when policies or contract terms are in place that prevent or dissuade the sharing of information.

CMS 70