Remove Subscribe
article thumbnail

International Data Protection Day 2022

DLA Piper Privacy Matters

European Data Breach Survey 2022. This figure is taken from our latest annual General Data Protection Regulation (GDPR) Fines and Data Breach Survey of the 27 European Union Member states plus the UK, Norway, Iceland and Liechtenstein. We hope that this year we may be able to meet in person, professionally and for social events.

GDPR 98
article thumbnail

Create a lasting customer retention strategy

IBM Big Data Hub

Customer retention has become more difficult in recent years Working against this goal is the fact that the customer journey is more complicated today; it’s harder to meet customer expectations and keep current customers. Collect customer feedback Collect, analyze and distribute customer data through reviews and surveys.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 Major Benefits of Cloud-Native Application Development

eSecurity Planet

This article is sponsored by UST, which offers cloud service solutions trusted by major brands in healthcare, finance, retail, and more. To meet the organization’s growing demands, DevOps teams must depend on automation and efficient resource management. You can unsubscribe at any time.

Cloud 111
article thumbnail

List of data breaches and cyber attacks in October 2019 – 421 million records breached

IT Governance

NAISS (the Nigerian HIV/AIDS Indicator and Impact Survey) (80,000). US retailer Kroger reports ‘isolated incident’ involving pharmacy records (unknown). French fashion retailer Sixth June victim of payment card skimming scam (unknown). Canadian dental software firm ClearDent (60,000). In other news….

article thumbnail

Attacks against machine learning — an overview

Elie

This blog post survey the attacks techniques that target AI (artificial intelligence) systems and how to protect against them. explained why AI is key to building robust protection that meets user expectations and increasingly sophisticated attacks. first post. second post. covered the challenges related to training classifiers.

Mining 107
article thumbnail

Attacks against machine learning — an overview

Elie

This blog post survey the attacks techniques that target AI (artificial intelligence) systems and how to protect against them. explained why AI is key to building robust protection that meets user expectations and increasingly sophisticated attacks. first post. second post. covered the challenges related to training classifiers.

Mining 91