Gartner IT Expo: Augmented Analytics

Perficient Data & Analytics

Our MicroStrategy and BI Expert Jim Butz spoke at the Gartner IT Expo today on the power of augmented analytics. MicroStategy’s approach is to make it easy to embed insights in any channel and any application. Hovering over it gives you key information on Lee Bank.

Ransomware Crypto-Locks Port of San Diego IT Systems

Data Breach Today

Port Remains Open and Accessible to Ships, Officials Say Several days after the Port of San Diego was hit by a crypto-locking ransomware attack, incident response efforts remain underway and many port systems remain offline.

Growing IT-OT Integration: Addressing the Risks It Brings

Data Breach Today

IBM Security's Paul Garvey on Taking the Right Approach While IT and OT integration has brought about new levels of operational efficiency, it has also introduced serious cyber risks that conventional IT security approaches might fail to address, says IBM Security's Paul Garvey

Risk 130

Gartner IT Expo: Create Actionable Intelligence

Perficient Data & Analytics

Along with thyssenkrupp Elevator, they showed that off in a session on Creating Actionable Intelligence here at the Gartner IT Expo. This brings many challenges in understanding what’s happening in the business and acting on it. Did it all in MicroStrategy.

IT 59

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

Krebs on Security

There aren’t any corroborating accounts of this scoop so far, but it is both fascinating and terrifying to look at why threats to the global technology supply chain can be so difficult to detect, verify and counter. Least privilege is expensive to administer but it is effective.

IT 223

Blockchain for Identity Management: It's Years Away

Data Breach Today

Why It Doesn't Fix Long-Running Access Management Problems Technologists are wrangling with an identity puzzle: Is it possible to create a single digital identity that can be seamlessly and securely used at a bank, a hospital or consumer websites? It's the holy grail of identity.

Secure 2018 US Elections: It's Too Late

Data Breach Today

But here's how the company can get its act together in time for 2020 Facebook's Ex-CSO Says That Ship Has Sailed; Look to 2020 With less than three months to go until the U.S. midterm elections, Alex Stamos, until recently Facebooks's CSO, says there isn't time to properly safeguard this year's elections.

IT 143

Building the Relationship Between RM and IT

The Texas Record

Whether it’s creating and securing electronic records or establishing a process to capture records from social media sites, records managers often find themselves working closely with their Information Technology (IT) Departments. MW : “ Working with IT has been a mixed-bag.

IT modernization in Government

OpenText Information Management

IT modernization has always been high on the agenda of government CIOs. This gives the potential for great progress to be made if agencies view their IT modernization project as a … The post IT modernization in Government appeared first on OpenText Blogs.

Securing IoT: Is It Feasible?

Data Breach Today

consumers now own about 870 million IoT devices. In an interview, Al Pascual of Javelin Strategy & Research, discusses the challenges involved in securing the exploding IoT landscape

IoT 100

When Will GDPR Show Its Teeth?

Data Breach Today

The latest edition of the ISMG Security Report takes a look at the EU's General Data Protection Regulation, including the outlook for enforcement and common misconceptions about its provisions

GDPR 107

California's New Privacy Law: It's Almost GDPR in the US

Data Breach Today

But Tech Giants are Taking Aim at the Law, Which Can Be Amended Until 2020 California's legislature has quickly introduced and passed new privacy legislation, making the state's laws the strongest in the U.S.

AI-Augmented Security: Can Cyberattackers Counter It?

Data Breach Today

XM Cyber's Adi Ashkenazy on the Latest Trends Are cyberattackers working on ways to counter artificial intelligence-augmented security? And will the bad guys ever use AI-driven attacks? Adi Ashkenazy of XM Cyber offers an analysis

Managing 'Shadow IT' Risks in Healthcare Settings

Data Breach Today

Risk 149

Russian Indictments: 'It's About Time'

Data Breach Today

Cyber intelligence expert Tom Kellermann discusses the significance and impact of the announcement that 13 Russian nationals and three Russian entities were indicted Friday for allegedly meddling in the 2016 presidential election

IT 120

Banking Malware Targets Mexico; Will It Spread?

Data Breach Today

Kaspersky Lab has discovered a new form of malware it calls Dark Tequila that has been targeting users in Mexico and stealing bank credentials and other personal and corporate data. The malware can move laterally through a computer while it's offline, says Dmitry Bestuzhev, a Kasperksy researcher

IT 100

Crypto Agility: Its Importance to IoT

Data Breach Today

Ted Shorter of CSS on the Need to Update Cryptographic Keys What is crypto agility, and why is it so important to IoT? Ted Shorter of Certified Security Solutions offers an explanation

IoT 130

If It Ain’t Broke, Fix it Anyway

Weissman's World

When speaking of technology and information governance, we often are told that “if it ain’t broke, don’t fix it” – or in other words, don’t go looking for trouble where there isn’t any. The post If It Ain’t Broke, Fix it Anyway appeared first on Holly Group.

IT 156

It's Time to Move Endpoint Security to the Cloud

Data Breach Today

It's time to move your antivirus to the cloud Learn how to leverage a predictive security cloud model to get ahead of emerging attacks. Traditional endpoint security products are holding organizations back.

Cloud 130

Legacy Content Migration: The Crowd Has it Wrong

Weissman's World

A few weeks ago, I used this space to wonder how top-of-mind content migration is among organizations whose legacy solutions are more than 8 years old – which, it turns out, accounts for more than 75% of those in service.

Groups 190

The FDA's New Digital Health Cyber Unit: What Would It Do?

Data Breach Today

Cybersecurity Unit Would Be Part of a Center of Excellence for Digital Health The Food and Drug Administration plans to launch a new digital health "center of excellence" that includes a cybersecurity unit.

Scrappy 'Silence' Cybercrime Gang Refines Its Bank Attacks

Data Breach Today

Groups 141

White House Says It's Been 'Very Tough' on Russia

Data Breach Today

The White House is facing questions over what it's doing to deter Moscow Russia's US Election Interference: Trump Administration Defends Response After a U.S. indictment charged Russians with running a troll factory that interfered in U.S.

IT 172

Sharing HIPAA Fines With Victims: Will It Ever Happen?

Data Breach Today

IT 167

Dispostion and its Discontents

The Schedule

As many records managers note, recordkeeping decisions are in the news on a daily basis (with today’s accelerated news cycle, it often feels like an hourly basis!). ” It’s increasingly clear that one of the major areas of public discontent is around disposition.

IT 68

US offers its cyber warfare defense capabilities to NATO

Security Affairs

The United States will offer its offensive cyber capabilities to NATO to strengthen its defenses against threat actors like Russian ones. The post US offers its cyber warfare defense capabilities to NATO appeared first on Security Affairs.

Demystifying DevSecOps and Its Role in App Security

Data Breach Today

DevOps and the addition of the "Sec" or security element to it has led to significant progress in moving security up in the application development chain, says Gartner's Dale Gardner

IT 100

Transparency in eDiscovery? Save it for your clients

OpenText Information Management

Save it for your clients appeared first on OpenText Blogs. This article was first published in Legaltech News.

IT 148

HIPAA Security Rule Turns 20: It's Time for a Facelift

Data Breach Today

As the HIPAA security rule turns 20, it's time for regulators to make updates reflecting the changing cyberthreat landscape and technological evolution that's happened over the past two decades, says security expert Tom Walsh

IT 108

How to Secure US Elections - Before It's Too Late

Data Breach Today

Two cybersecurity veterans detail the specific steps the Trump administration must take now if it has any hope of safeguarding the U.S. midterm elections in November against Russian interference, whether via hack attacks or social media and propaganda campaigns

Essential guidance to implementing an effective IT Governance system

IT Governance

Faced with these increasing information security threats, organisations have an urgent need to adopt IT governance best practice strategies. What is IT governance? Drivers for adopting IT governance strategies.

Let's Call it "Collabication"

Hanzo Learning Center

When Does “Collaboration” Simply Become “Communication”? Humans have been communicating for thousands of years. The earliest cave paintings date back 40,000 years to the Ice Age. And just as Prehistoric Man has evolved, so have the methods by which we connect with one another

Refresher: Which IT Systems Are Regulated

Perficient Data & Analytics

If your company makes drugs, medical devices, or biologics (vaccines, blood and blood components, allergenics, somatic cells, gene therapy, tissues, and recombinant therapeutic proteins), it is regulated. This includes both IT systems you host on your own premises, as well as those available in the cloud. With this in mind, we’ll move on to the next post in this series on maintaining regulatory-compliant IT systems in the cloud.

IT 43

It’s Here…My Next Thought Leadership Paper

Getting Information Done

Kill Your File Shares: A Roadmap to Reducing Your Biggest Information Risk This is my sequel to last year’s paper, Not if, But When You Get Hacked: Measuring and Proactively Managing Information Risk.

Paper 142

Aadhaar Security: How Can It Be Fixed?

Data Breach Today

Security Critics Discuss the Gaps in the System After news of yet another apparent Aadhaar-related data breach, some security experts are once again calling for the government to substantially beef up security for the identification system

GDPR Enforcement Deadline: If You Blew It, What's Next?

Data Breach Today

What happens if organizations that must comply with GDPR have yet to achieve compliance, despite having had two years to do so before enforcement began? Don't panic, says cybersecurity expert Brian Honan, but do be pursuing a data privacy transparency and accountability action plan

GDPR 129

Cybersecurity Awareness Month Blog Series: It’s Cybersecurity Awareness Month – advice to SMBs

Thales Data Security

When it comes to cybersecurity, the difference between an enterprise organization and an SMB is just size. SMBs should start with knowing what information you have, where you’re keeping it and decide what you don’t want to share by accident. It’s not over yet.

Gimmal Extends its DoD 5015.2 Certified Records Management Certification to SharePoint 2016


Gimmal, the world’s leading provider of records management and information governance software, is excited to announce that Gimmal Records Management , which already provides DoD 5015.2-certified for Microsoft SharePoint 2010 and 2013, is now extending its certification to Microsoft 2016.

If it’s not free


How much is it worth to you to have access to the Internet on a plane trip? Apparently, less than they are charging for it. Is it because the service is too slow, or too expensive? But if an airline chose to compete by including this in the ticket price, would it drive traffic? How many people actually pay for this out of their own pockets, rather than charging it off to their employers? IT Information Value Interconnections Controls Internal controls Access

IT 28

Allscripts Lawsuit: What Makes It Different?

Data Breach Today

A class action lawsuit filed against Allscripts in the wake of a ransomware attack that recently disrupted patient care at hundreds of healthcare practices will spotlight a variety of critical security and legal issues, says Steven Teppler, the plaintiffs' attorney, in this in-depth interview

Mobile/Web App Security: How Do You Know it's Working?

Data Breach Today

Nick Holland and Chris Mizell of Arxan Technologies reflect on key findings from their recent Executive Roundtable on mobile security

IT 100

IT Security Vulnerability Roundup – September 2018

eSecurity Planet

A look at 12 of the many vulnerabilities disclosed over the past month

IT 80

Data Governance Is Dead — Meetings And Spreadsheets Killed It

IG Guru

Stan Christiaens Mar 26, 2018, 08:00am CommunityVoice Forbes Technology Council We all know that data governance has perception issues (to put it mildly). The post Data Governance Is Dead — Meetings And Spreadsheets Killed It appeared first on IG GURU.