Remove Examples Remove Government Remove Healthcare Remove Security
article thumbnail

The Value of Data Governance and How to Quantify It

erwin

erwin recently hosted the second in its six-part webinar series on the practice of data governance and how to proactively deal with its complexities. Led by Frank Pörschmann of iDIGMA GmbH, an IT industry veteran and data governance strategist, the second webinar focused on “ The Value of Data Governance & How to Quantify It.”.

article thumbnail

Pharmaceutical companies exploited by phishing scam targeting job seekers

IT Governance

Earlier this month, two major pharmaceutical giants issued warnings about phishing emails targeting job hunters. Unfortunately, red flags like that are ignored in all kinds of phishing scams, and this scheme is a perfect example of why that happens. For example, most ransomware attacks are spread via phishing emails.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Metadata Management, Data Governance and Automation

erwin

erwin released its State of Data Governance Report in February 2018, just a few months before the General Data Protection Regulation (GDPR) took effect. Download Free GDPR Guide | Step By Step Guide to Data Governance for GDPR?. Data governance maturity includes the ability to rely on automated and repeatable processes.

Metadata 102
article thumbnail

Security in a World of Physically Capable Computers

Schneier on Security

Stories like the recent Facebook hack , the Equifax hack and the hacking of government agencies are remarkable for how unremarkable they really are. Security is not a problem the market will solve. Security is not a problem the market will solve. The government needs to step in and regulate this increasingly dangerous space.

article thumbnail

Cambridgeshire crowned the UK’s cyber crime capital

IT Governance

Figures from the ONS (Office of National Statistics) show that security incidents in Cambridgeshire increased from 2,789 in 2016 to 4,155 in 2018. For example, the pharmaceutical giant AstraZeneca, which is based in Cambridge, was last year imitated in a sophisticated phishing scam targeting job seekers.

article thumbnail

Q&A: The drivers behind the stark rise — and security implications — of ‘memory attacks’

The Last Watchdog

Related: Memory hacking becomes a go-to tactic These attacks are referred to in the security community as “fileless attacks” or “memory attacks.” Warfare is not just with the guns anymore, it’s a cyber attack, and not just on critical infrastructure or government agencies, but on other big stakeholders, as well.

Security 154
article thumbnail

Delivering responsible AI in the healthcare and life sciences industry

IBM Big Data Hub

With today’s new generative AI products, trust, security and regulatory issues remain top concerns for government healthcare officials and C-suite leaders representing biopharmaceutical companies, health systems, medical device manufacturers and other organizations. Mandate that outputs be auditable and explainable.