When Encryption Meets Flash Arrays

Thales Data Security

Fortunately, meeting the customer requirements is possible using a key sharing paradigm but requires close collaboration between the application and storage array vendors. The post When Encryption Meets Flash Arrays appeared first on Data Security Blog | Thales e-Security.

Archives Records 2018 RMS Annual Meeting

The Schedule

Nearly 200 peers came together last Friday in Washington, DC, for the joint meeting of the Acquisitions & Appraisal and Records Management Sections.

Conversation with TSLAC Archivist About Meeting Minutes

The Texas Record

With The Open Meetings Act (Texas Government Code – GOV’T § 551.021.) At its root, my work involves figuring out what something is and translating that information into something others can use to determine if materials meet one’s needs.

Meet 5 Women Shaping Microsoft's Security Strategy

Dark Reading

Profiles of some of the women currently leading Microsoft security operations - and their efforts to drive inclusivity

The role of blockchain in helping organizations meet GDPR compliance

Information Management Resources

Many have begun to consider whether the technology could be used to improve customer data management processes, as they relate to the upcoming EU mandate. GDPR Blockchain Data management Data privacy Data security

Trump – Putin meeting: “I don’t see any reason” for Russia to interfere with the US presidential election

Security Affairs

Today the controversial meeting between Russian President Vladimir Putin and US President Donald Trump was held in Helsinki, but as expected Russian President denied any interference with the 2016 US election.

Data Governance Is Dead — Meetings And Spreadsheets Killed It

IG Guru

The post Data Governance Is Dead — Meetings And Spreadsheets Killed It appeared first on IG GURU. Stan Christiaens Mar 26, 2018, 08:00am CommunityVoice Forbes Technology Council We all know that data governance has perception issues (to put it mildly).

Seven Data Security Challenges You Must Meet to Comply with GDPR

Thales Data Security

The post Seven Data Security Challenges You Must Meet to Comply with GDPR appeared first on Data Security Blog | Thales eSecurity. The enactment of the European Union’s General Data Protection Regulation (GDPR) is a significant milestone for virtually every international business.

Compliance Meets Social APIs

Hanzo Learning Center

The Surprising Irony at the Intersection of Compliance and Social APIs. Compliance article

Ransomware Meets 'Grey's Anatomy'

Dark Reading

Fictional Grey Sloan Memorial Hospital is locked out of its electronic medical records, but in the real world, healthcare organizations face even greater risks

Regulatory Update: NAIC Summer 2018 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Summer 2018 National Meeting in Boston, Massachusetts, from August 4 to 7, 2018. This post summarizes the highlights from this meeting. At the Summer Meeting, the Working Group agreed to expose the Trades Letter for a 45-day comment period. The Working Group hopes to consider the adoption of the guidance document at the NAIC’s Fall 2018 National Meeting.

Meeting GDPR’s toughest challenges

Information Management Resources

GDPR in fact consists of many new requirements for data security and data privacy for any organization.

Meet Your 2018-2019 Records Management Section Steering Committee

The Schedule

The Records Management Section (RMS) Steering Committee exists to direct and focus the annual business of the section, as well as to foster connections and professional growth amongst section members.

Most organizations off to slow start at meeting GDPR requirements

Information Management Resources

While many organizations understand the importance of GDPR, a large number are still not taking their data seriously in terms of the technologies and processes they have in place, says Penny Jones. GDPR Compliance Compliance systems

Identifying E-signature Requirements to Accelerate Digital Adoption and Meet Global Compliance


In a recent AIIM webinar, Craig Le Clair, Forrester VP and Principle Analyst, and Florian Vondal, Allianz Solution Architect, took a closer look at the “esign of the times” and what must be considered when attempting to accelerate e-signature adoption enterprise-wide and meet global compliance.

Meet Antifa's Secret Weapon Against Far-Right Extremists

WIRED Threat Level

Megan Squire doesn’t consider herself to be antifa and pushes digital activism instead, passing along information to those who might put it to real-world use—who might weaponize it. Security

ARMA Houston meeting: How to seamlessly manage information through acquisition and divestitures

TAB OnRecord

The post ARMA Houston meeting: How to seamlessly manage information through acquisition and divestitures appeared first on TAB Records Management Blog | TAB OnRecord.

Tips 78

Meet Jonathan Albright, The Digital Sleuth Exposing Fake News

WIRED Threat Level

Buried in media scholar Jonathan Albright's research was proof of a massive political misinformation campaign. Now he's taking on the the world's biggest platforms before it's too late. Backchannel Security

Cyber resilience in the Scottish public sector: meeting the Cyber Essentials certification deadline

IT Governance

In addition to meeting the requirements of Cyber Essentials, organisations must undergo an internal assessment and internal scan conducted on-site by the certification body.

How Identity and Access Management helps meet the data protection requirements of GDPR

OpenText Information Management

GDPR has changed the way that companies with European … The post How Identity and Access Management helps meet the data protection requirements of GDPR appeared first on OpenText Blogs.

AI-enhanced search meets enhanced workflow with Decisiv 8.1

OpenText Information Management

part of OpenText Release 16 EP3—is not only … The post AI-enhanced search meets enhanced workflow with Decisiv 8.1 Finding the content you need is paramount when trying to complete tasks and make informed decisions. That’s why OpenText™ Decisiv™ augments enterprise search with the power of artificial intelligence.

Trump-Putin Meeting was the root cause of a spike of cyber attacks against Finland

Security Affairs

F5 experts observed a spike in the attacks in the days prior to the Trump-Putin meeting on July 16 that was held in Helsinki, Finland. As expected, attacks against Finland skyrocketed days before the meeting. Which were the other top targeting countries during the Helsinki meeting?

Crestron Touchscreens Could Spy on Hotel Rooms and Meetings

WIRED Threat Level

The technology company Crestron makes touchscreen panels and other equipment for places like conference rooms, which a researcher found can be turned into hidden microphones and webcams. Security

ISO 27001 staff awareness training – meeting the requirements

IT Governance

ISO 27001 is the international standard that describes best practices for an information security management system (ISMS). It recognises that, although technological defences are essential, they will have limited use if staff don’t understand their information security responsibilities.

4 steps for meeting GDPR-ready identity governance

Information Management Resources

Many of the new data protection requirements can be sustainably and cost-effectively adhered to by leveraging existing tools and processes that are already deployed in a typical organization. GDPR Compliance Data security Compliance systems

Great Content, Meet Great Targeting (And Reach)

John Battelle's Searchblog

The post Great Content, Meet Great Targeting (And Reach) appeared first on John Battelle's Search Blog. The post Great Content, Meet Great Targeting (And Reach) appeared first on John Battelle's Search Blog.

Meet 'Bro': The Best-Kept Secret of Network Security

Dark Reading

This often overlooked open source tool uses deep packet inspection to transform network traffic into exceptionally useful, real-time data for security operations

Will the UK Meet the EU Adequacy Test?

HL Chronicle of Data Protection

The reason for that is that the procedure followed by the European Commission before granting this status is extremely thorough, and the conditions required to meet the adequacy test are exceedingly high.

Meet the psychologist at the center of Facebook's data scandal

Information Management Resources

On Friday, Alex Spectre was suspended by the firm for his earlier work mining data on what was reported to be as many as 50 million Facebook users and sharing it with Cambridge Analytica. Data privacy Data security Facebook

Trump-Kim Meeting Was a Magnet For Russian Cyberattacks

Dark Reading

Attacks directed at targets in Singapore went through the roof earlier this week

Mark Zuckerberg to face tax questions in Macron meeting

The Guardian Data Protection

French president said to be seeking frank exchange with tech bosses including Facebook CEO Fresh from apologising to European lawmakers in Brussels , Mark Zuckerberg is holding talks with Emmanuel Macron in which he is expected to face renewed pressure over his company’s tax policies.

How the PCI DSS can help you meet the requirements of the GDPR

IT Governance

If deployed to the rest of the business – without extending the cardholder data environment – these same controls and processes could provide organisations with a head start in meeting the sixth principle of the GDPR (integrity and confidentiality).


Checklist to ensure data security steps meets compliance requirements

Information Management Resources

To protect the information an organization holds, it is critical to follow a data governance model. There are four pillars to this: define, implement, enforce and revisit. Data security Cyber security GDPR Compliance Cyber attacks

Facebook's Sandberg meets attorneys general behind closed doors

Information Management Resources

Attorneys general from New York to Missouri have launched probes into the firm's customer data practices. Thirty-four states asked Facebook in March to answer questions over its data-sharing and privacy practices. Data privacy Data security Facebook

Taps ‘n’ Apps: Craft Beer Meets the Cloud


Note : this post contains links to every craft brewery in British Columbia and Alberta that I could find. Sadly, I have yet to sample all of their wares.

Meet Chronicle: Alphabet's New Cybersecurity Business

Dark Reading

Google parent company Alphabet introduces Chronicle, which will combine a security analytics platform and VirusTotal

Ping: "Facebook and Twitter meet iTunes" Except.

John Battelle's Searchblog

as far as I can tell, they in fact don't ever meet. You can't leverage your networks on Facebook and Twitter in Ping. It's another closed Apple system, another Apple universe in a gilded gift box. It's not that Apple hates the web, it's just that Apple is better than the web.

Mozilla Tests DNS over HTTPS: Meets Some Privacy Pushback


Mozilla is testing a method of securing DNS traffic via HTTPS, but is faced with some privacy resistance. Privacy Web Security DNS Hijacking DNS over HTTPS DNS poisoning DNS Spoofing DoH HTTPS man-in-the-middle attack MitM Mozilla Trusted Recursive Resolver via DNS over HTTPs

Cryptocurrency Meets Muni-Bond Market Under Berkeley Venture

Information Management Resources

The California city mulls using blockchain technology to support public fund raising. Blockchain Bonds

Game of Thrones meets the world of privacy. See who our poll reveals as privacy’s GoT nasties and heroes.

Privacy Surgeon

Game of Thrones is filled with intrigue, deception, redemption, conflict, heroism and deal-cutting. That sounds scarily like the world of privacy. So – we wondered – who are characters in the privacy world that most resemble those in Game of Thrones?

Cisco Patches Critical Playback Bugs in WebEx Players


Cloud Security Vulnerabilities Web Security chrome Cisco patch Cisco systems Cisco WebEx Meeting Server Cisco WebEx Meetings CVE-2017-12367 CVE-2017-12368 CVE-2017-12369 CVE-2017-12370 CVE-2017-12371 CVE-2017-12372 Firefox Google Project Zero Playback Bugs WebEx Business SuiteA Cisco Systems security advisory is urges users of its WebEx platform to patch six vulnerabilities that could allow attackers to execute remote code.

SAA 2017 Annual Meeting – Alike/Different

Archives Blogs

Last July, I was among the many archivists who, seduced by legends of the land of milk and honey food trucks and microbreweries, braved the Oregon Trail to attend the 2017 Society of American Archivists conference in Portland OR. The Oregon Trail – video game version.

Trump might ask Putin to extradite the 12 Russian intelligence officers

Security Affairs

A few hours before the upcoming meeting between Donald Trump and Vladimir Putin, the US President said he might ask the extradition to the US of the 12 Russian intelligence officers accused of being involved in attacks against the 2016 presidential election.