Remove 10
Remove 2018 Remove Examples Remove Manufacturing Remove Meeting Remove Security
article thumbnail

Envisioning new and hidden realities with data and augmented reality—a digital “twin city” example

CGI

Envisioning new and hidden realities with data and augmented reality—a digital “twin city” example. Wed, 01/10/2018 - 15:25. Also growing at the same time is the need to store, secure, access and analyze this data. Take a modern film, for example. Using data to create new value chains.

Mining 78
article thumbnail

Treasury Releases New CFIUS Regulations

Data Matters

Department of the Treasury (Treasury) issued final and interim regulations implementing the Foreign Investment Risk Review Modernization Act of 2018 (FIRRMA), which expands the jurisdiction of the Committee on Foreign Investment in the United States (CFIUS) to review foreign investments and mitigate any potential national security concerns.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OCR Provides Insight into Enforcement Priorities and Breach Trends

HL Chronicle of Data Protection

Regulators, industry experts, and researchers provided insight into health privacy and security enforcement trends, emerging threats, and new tools at a recent conference focused on the Health Insurance Portability and Accountability (HIPAA) regulatory framework. million settlement in 2018. Emerging Trends in Breaches.

Risk 40
article thumbnail

U.S. Department of Transportation Issues Third Round of Guidance on Automated Vehicles

Data Matters

Most recently, on October 4, 2018, DOT issued Preparing for the Future of Transportation: Automated Vehicles 3.0 (AV 3.0), its third round of guidance on the topic. Like its 2017 predecessor, “Automated Driving Systems 2.0: A Vision for Safety,” AV 3.0 adopt a consistent terminology defined through voluntary technical standards.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

Here, Motherboard talks about personal data being sold for less than $10 a pop in a case that sounds eerily similar to the previously mentioned Medicare one. But there's been one claim more than any other that's really caught my eye, and it's this one: Troy, meet @UIDAI and @NandanNilekani. agarwal_mohit) January 5, 2018.

Security 111
article thumbnail

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

pic.twitter.com/4NK5GAm1z2 — Troy Hunt (@troyhunt) December 24, 2018. So here it is - 10 Personal Financial Lessons for Technology Professionals. I don't just mean at the crazy rich end of the scale (4 of the world's top 10 richest people did it in tech - Bezos, Gates, Zuckerberg and Ellison), but at all levels of our profession.

Education 111
article thumbnail

A Shortage in Common Sense: The Myth of the Talent Gap

The Falcon's View

Between September 2017 and August 2018, U.S. For example, it's very common to find "DevSecOps" positions that are acutely focused on DevOps automation. Or, sometimes they're just recast application security roles that got a trendy bump to "DevSecOps." And now, the kicker: You shouldn't be hiring this many security people anyway!