article thumbnail

Delivering responsible AI in the healthcare and life sciences industry

IBM Big Data Hub

With today’s new generative AI products, trust, security and regulatory issues remain top concerns for government healthcare officials and C-suite leaders representing biopharmaceutical companies, health systems, medical device manufacturers and other organizations.

article thumbnail

Honoring Women in Tech: Challenging IT Industry Perceptions

erwin

Libby has been a Data Governance Specialist for about 20 years and has always worked in some capacity in healthcare and healthcare information technology. She began her career in the healthcare industry managing large physician practices where she quickly realized that data could increase productivity as well as patient outcomes.

IT 85
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Value of Data Governance and How to Quantify It

erwin

erwin recently hosted the second in its six-part webinar series on the practice of data governance and how to proactively deal with its complexities. Led by Frank Pörschmann of iDIGMA GmbH, an IT industry veteran and data governance strategist, the second webinar focused on “ The Value of Data Governance & How to Quantify It.”.

article thumbnail

Mozilla Drops Onerep After CEO Admits to Running People-Search Networks

Krebs on Security

.” KrebsOnSecurity also reported that Shelest’s email address was used circa 2010 by an affiliate of Spamit , a Russian-language organization that paid people to aggressively promote websites hawking male enhancement drugs and generic pharmaceuticals. government. Shelest denied ever being associated with Spamit.

article thumbnail

China-linked hackers target government agencies by exploiting flaws in Citrix, Pulse, and F5 systems, and MS Exchange

Security Affairs

CISA published an advisory on China-linked groups targeting government agencies by exploiting flaws in Microsoft Exchange, Citrix, Pulse, and F5 systems. Chinese state-sponsored hackers have probed US government networks looking for vulnerable networking devices that could be compromised with exploits for recently disclosed vulnerabilities.

article thumbnail

North Korea-linked Lazarus APT targets the COVID-19 research

Security Affairs

The attacks aimed at a Ministry of Health and a pharmaceutical company involved in the development of the COVID-19 vaccine. The systems at the pharmaceutical company were targeted with the BookCode malware, while in the attack against a Ministry of Health the APT group used the wAgent malware. .

article thumbnail

Intelligent Search – Strategies to Find What You Need

AIIM

Regardless of your industry, managing information intelligently requires the ability to find, store, and use information effectively and flexibly in order to get good results. Enterprise organizations in all industries must work to make Intelligent Search an essential organizational skill. Using that information in ways that matter.