article thumbnail

Russia-linked APT28 uses COVID-19 lures to deliver Zebrocy malware

Security Affairs

The APT28 group (aka Fancy Bear , Pawn Storm , Sofacy Group , Sednit , and STRONTIUM ) has been active since at least 2007 and it has targeted governments, militaries, and security organizations worldwide. The Zebrocy backdoor was mainly used in attacks targeting governments and commercial organizations engaged in foreign affairs.

Phishing 106
article thumbnail

Optimizing clinical trial site performance: A focus on three AI capabilities

IBM Big Data Hub

Despite advancements in the pharmaceutical industry and biomedical research, delivering drugs to market is still a complex process with tremendous opportunity for improvement. Additionally, biopharma companies may find themselves building out AI capabilities in-house sporadically and without overarching governance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Why ‘basic research’ is so vital to bringing digital transformation to full fruition

The Last Watchdog

An estimated 60% of research and development in scientific and technical fields is carried out by private industry, with academic institutions and government accounting for 20% and 10%, respectively, according to the Organization for Economic Cooperation and Development. NTT Group, for instance, typically spends more than $3.6

article thumbnail

Delivering ROI for Our Customers When it Matters Most

Reltio

The study reported that a composite customer investing in Reltio's MDM solution achieved a 366% return on investment (ROI) and a total net present value of $13 million over three years, with a payback on their investment within six months once operational.

MDM 52
article thumbnail

Law and Technology Move Center Stage

Positively RIM

Day 2 of the first ARMA/Sedona Executive Conference on Information Governance turned toward technology and law. Both presenters and attendees agreed: Big Data is ignored at one’s own peril, and it raises a multitude of questions and ethical dilemmas. Repeatedly, presenters emphasized that Big Data is not “more of the same”.

article thumbnail

Supreme Court Strikes Down Vermont Prescriber Privacy Law

Hunton Privacy

Vermont’s law was intended to limit the process of “detailing” whereby pharmaceutical manufacturers use prescriber-identifiable information to “ascertain which doctors are likely to be interested in a particular drug and how best to present a particular sales message.”

Privacy 40
article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

For entities covered by the new rules, the key requirements that the NIS II would impose are (i) a minimum list of technical and organisational measures to be taken, (ii) governance requirements for management bodies of essential and important entities, and (iii) an amended incident notification regime.