When Encryption Meets Flash Arrays

Thales Data Security

Fortunately, meeting the customer requirements is possible using a key sharing paradigm but requires close collaboration between the application and storage array vendors. The post When Encryption Meets Flash Arrays appeared first on Data Security Blog | Thales e-Security.

Archives Records 2018 RMS Annual Meeting

The Schedule

Nearly 200 peers came together last Friday in Washington, DC, for the joint meeting of the Acquisitions & Appraisal and Records Management Sections.

Meet Our Digital Marketing & MicroStrategy Experts at NRF 2019

Perficient Data & Analytics

If you’re attending NRF 2019 , be sure to stop by the MicroStrategy booth (#1955) to meet with Perficient experts Jim Butz, MicroStrategy Practice General Manager, and Kevin Bauer, Digital Marketing Practice Director, as they showcase demos and retail expertise.

Demo 56

Critical Zoom Flaw Lets Hackers Hijack Conference Meetings

Threatpost

Hackers can spoof messages, hijack screen controls and kick others out of meetings. Vulnerabilities Web Security patch Spoofing unauthorized command execution vulnerability zoom

The role of blockchain in helping organizations meet GDPR compliance

Information Management Resources

Many have begun to consider whether the technology could be used to improve customer data management processes, as they relate to the upcoming EU mandate. GDPR Blockchain Data management Data privacy Data security

Regulatory Update: NAIC Fall 2018 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Fall 2018 National Meeting (Fall Meeting) in San Francisco, California, from November 15 to 18, 2018. This post summarizes the highlights from this meeting. In light of this, the (A) Committee granted an extension of the model law development request to the Spring 2019 National Meeting. The post Regulatory Update: NAIC Fall 2018 National Meeting appeared first on Data Matters Privacy Blog.

Compliance Meets Social APIs

Hanzo Learning Center

The Surprising Irony at the Intersection of Compliance and Social APIs. Compliance article

Seven Data Security Challenges You Must Meet to Comply with GDPR

Thales Data Security

The post Seven Data Security Challenges You Must Meet to Comply with GDPR appeared first on Data Security Blog | Thales eSecurity. The enactment of the European Union’s General Data Protection Regulation (GDPR) is a significant milestone for virtually every international business.

Data Governance Is Dead — Meetings And Spreadsheets Killed It

IG Guru

The post Data Governance Is Dead — Meetings And Spreadsheets Killed It appeared first on IG GURU. Stan Christiaens Mar 26, 2018, 08:00am CommunityVoice Forbes Technology Council We all know that data governance has perception issues (to put it mildly).

Meet new Archive-It and Web Group teammates

Archive-It

Announcements Meet the Archive-It Teamby the Archive-It team. Archive-It and the Internet Archive’s Web Group welcomed three new teammates this fall.

Ransomware Meets 'Grey's Anatomy'

Dark Reading

Fictional Grey Sloan Memorial Hospital is locked out of its electronic medical records, but in the real world, healthcare organizations face even greater risks

Conversation with TSLAC Archivist About Meeting Minutes

The Texas Record

With The Open Meetings Act (Texas Government Code – GOV’T § 551.021.) At its root, my work involves figuring out what something is and translating that information into something others can use to determine if materials meet one’s needs.

Meeting GDPR’s toughest challenges

Information Management Resources

GDPR in fact consists of many new requirements for data security and data privacy for any organization.

5 Reasons to Meet Hanzo at Legaltech - January 29 -31, 2019

Hanzo Learning Center

That is why we’d like to invite you to meet in the suite. It’s time for Legaltech, the the largest and most important legal technology event of the year. Hanzo, will be demonstrating its pioneering technology in dynamic web archiving for compliance and ediscovery professionals.

Trump – Putin meeting: “I don’t see any reason” for Russia to interfere with the US presidential election

Security Affairs

Today the controversial meeting between Russian President Vladimir Putin and US President Donald Trump was held in Helsinki, but as expected Russian President denied any interference with the 2016 US election.

Regulatory Update: NAIC Summer 2018 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Summer 2018 National Meeting in Boston, Massachusetts, from August 4 to 7, 2018. This post summarizes the highlights from this meeting. At the Summer Meeting, the Working Group agreed to expose the Trades Letter for a 45-day comment period. The Working Group hopes to consider the adoption of the guidance document at the NAIC’s Fall 2018 National Meeting.

Meet Antifa's Secret Weapon Against Far-Right Extremists

WIRED Threat Level

Megan Squire doesn’t consider herself to be antifa and pushes digital activism instead, passing along information to those who might put it to real-world use—who might weaponize it. Security

Most organizations off to slow start at meeting GDPR requirements

Information Management Resources

While many organizations understand the importance of GDPR, a large number are still not taking their data seriously in terms of the technologies and processes they have in place, says Penny Jones. GDPR Compliance Compliance systems

Meet Your 2018-2019 Records Management Section Steering Committee

The Schedule

The Records Management Section (RMS) Steering Committee exists to direct and focus the annual business of the section, as well as to foster connections and professional growth amongst section members.

Meet Jonathan Albright, The Digital Sleuth Exposing Fake News

WIRED Threat Level

Buried in media scholar Jonathan Albright's research was proof of a massive political misinformation campaign. Now he's taking on the the world's biggest platforms before it's too late. Backchannel Security

Identifying E-signature Requirements to Accelerate Digital Adoption and Meet Global Compliance

AIIM

In a recent AIIM webinar, Craig Le Clair, Forrester VP and Principle Analyst, and Florian Vondal, Allianz Solution Architect, took a closer look at the “esign of the times” and what must be considered when attempting to accelerate e-signature adoption enterprise-wide and meet global compliance.

AI-enhanced search meets enhanced workflow with Decisiv 8.1

OpenText Information Management

part of OpenText Release 16 EP3—is not only … The post AI-enhanced search meets enhanced workflow with Decisiv 8.1 Finding the content you need is paramount when trying to complete tasks and make informed decisions. That’s why OpenText™ Decisiv™ augments enterprise search with the power of artificial intelligence.

How Identity and Access Management helps meet the data protection requirements of GDPR

OpenText Information Management

GDPR has changed the way that companies with European … The post How Identity and Access Management helps meet the data protection requirements of GDPR appeared first on OpenText Blogs.

Ricoh unveils Intelligent Devices and innovative technologies to meet the evolving needs of the digital workplace

Document Imaging Report

MALVERN, PA, January 21, 2019 – Ricoh today announced its first series of intelligent multifunction printers (MFPs) built with innovative technologies to meet the constantly changing needs of digital workplaces – today and in the future.

Experts discovered a severe command injection flaw in Cisco Webex Meetings Desktop

Security Affairs

Researchers discovered a “high” severity command injection vulnerability, tracked as CVE-2018-15442, in Cisco Webex Meetings Desktop. The vulnerability affects all Cisco Webex Meetings Desktop App releases prior to 33.6.0,

Cyber resilience in the Scottish public sector: meeting the Cyber Essentials certification deadline

IT Governance

In addition to meeting the requirements of Cyber Essentials, organisations must undergo an internal assessment and internal scan conducted on-site by the certification body.

Great Content, Meet Great Targeting (And Reach)

John Battelle's Searchblog

The post Great Content, Meet Great Targeting (And Reach) appeared first on John Battelle's Search Blog. The post Great Content, Meet Great Targeting (And Reach) appeared first on John Battelle's Search Blog.

ISO 27001 staff awareness training – meeting the requirements

IT Governance

ISO 27001 is the international standard that describes best practices for an information security management system (ISMS). It recognises that, although technological defences are essential, they will have limited use if staff don’t understand their information security responsibilities.

4 steps for meeting GDPR-ready identity governance

Information Management Resources

Many of the new data protection requirements can be sustainably and cost-effectively adhered to by leveraging existing tools and processes that are already deployed in a typical organization. GDPR Compliance Data security Compliance systems

Meet the psychologist at the center of Facebook's data scandal

Information Management Resources

On Friday, Alex Spectre was suspended by the firm for his earlier work mining data on what was reported to be as many as 50 million Facebook users and sharing it with Cambridge Analytica. Data privacy Data security Facebook

Crestron Touchscreens Could Spy on Hotel Rooms and Meetings

WIRED Threat Level

The technology company Crestron makes touchscreen panels and other equipment for places like conference rooms, which a researcher found can be turned into hidden microphones and webcams. Security

Initial patch for Webex Meetings flaw WebExec was incomplete. Cisco fixed it again

Security Affairs

The flaw affects Cisco Webex Meetings Desktop and has been rated as a “high” severity command injection vulnerability. The CVE-2018-15442 flaw affects all Cisco Webex Meetings Desktop App releases prior to 33.6.0, The post Initial patch for Webex Meetings flaw WebExec was incomplete.

Meet 'Bro': The Best-Kept Secret of Network Security

Dark Reading

This often overlooked open source tool uses deep packet inspection to transform network traffic into exceptionally useful, real-time data for security operations

ARMA Houston meeting: How to seamlessly manage information through acquisition and divestitures

TAB OnRecord

The post ARMA Houston meeting: How to seamlessly manage information through acquisition and divestitures appeared first on TAB Records Management Blog | TAB OnRecord.

Tips 78

[Podcast] Who is AIIM? Meet the People that Make up the AIIM Community

AIIM

Who is AIIM ? Well, that's a challenging question considering AIIM is an organization. But, when we take a step back, it's easier to see that AIIM does have a persona. It's you, me, and the other 155,000 global information professionals worldwide that make up the AIIM Community.

Will the UK Meet the EU Adequacy Test?

HL Chronicle of Data Protection

The reason for that is that the procedure followed by the European Commission before granting this status is extremely thorough, and the conditions required to meet the adequacy test are exceedingly high.

Mark Zuckerberg to face tax questions in Macron meeting

The Guardian Data Protection

French president said to be seeking frank exchange with tech bosses including Facebook CEO Fresh from apologising to European lawmakers in Brussels , Mark Zuckerberg is holding talks with Emmanuel Macron in which he is expected to face renewed pressure over his company’s tax policies.

Taps ‘n’ Apps: Craft Beer Meets the Cloud

PHIGs

Note : this post contains links to every craft brewery in British Columbia and Alberta that I could find. Sadly, I have yet to sample all of their wares.

Checklist to ensure data security steps meets compliance requirements

Information Management Resources

To protect the information an organization holds, it is critical to follow a data governance model. There are four pillars to this: define, implement, enforce and revisit. Data security Cyber security GDPR Compliance Cyber attacks

Trump-Kim Meeting Was a Magnet For Russian Cyberattacks

Dark Reading

Attacks directed at targets in Singapore went through the roof earlier this week