Card-Not-Present Fraud Costs Mount

Data Breach Today

A Juniper Research analysis of why card-not-present fraud will continue to grow leads this week's edition of the ISMG Security Report. Also featured: Updates on a Neiman Marcus breach lawsuit settlement and a German hacking incident

Tenable experts found 15 flaws in wireless presentation systems

Security Affairs

Experts at Tenable discovered 15 vulnerabilities in eight wireless presentation systems, including flaws that can be exploited to remotely hack devices. Wireless presentation systems are used to display content on a screen or through several devices, including mobile devices and laptops.

Card-Not-Present Fraud Growth: No End in Sight?

Data Breach Today

Card-not-present fraud will cost retailers worldwide $130 billion between 2018 and 2023, a new report from Juniper Research predicts. Steffen Sorrell, author of the study, explains the reasons behind this growth projection and describes what can be done to improve the fight against fraud

Critical Flaws Found in Eight Wireless Presentation Systems

Threatpost

Crestron, Barco wePresent, Extron ShareLink and more wireless presentation systems have an array of critical flaws. IoT Vulnerabilities Barco wePresent Crestron critical vulnerability Extron ShareLink wireless presentation system

IRMS Conference Presentation – Professional Development for DPOs

Managing Your Information

This presentation considered: Tkm is a training partner of the IRMS. The presentation was given at the IRMS conference on 21 May 2019. IRMS conference presentation professional development for DPOs Download. The post IRMS Conference Presentation – Professional Development for DPOs appeared first on Managing Your Information.

e-Records 2019 Call for Presentations

The Texas Record

We are now accepting presentation proposals from government organizations (state agencies, universities, or local governments), vendors and subject matter experts from various organizations. Presentations should deliver takeaways that are immediately useful to attendees’ work.

Past, present, and future of the Dark Web

Security Affairs

Considerations about past, present, and future of the Dark Web. The post Past, present, and future of the Dark Web appeared first on Security Affairs. Which is the difference between the Deep Web and Dark Web? These are intense days for the Dark Web.

Researchers presented an improved version of the WPA KRACK attack

Security Affairs

Now the experts presented a new variant of the attack technique at the Computer and Communications Security (CCS) conference. The post Researchers presented an improved version of the WPA KRACK attack appeared first on Security Affairs.

AI presents host of ethical challenges for healthcare

Information Management Resources

While artificial intelligence has tremendous potential for revolutionizing healthcare delivery, there are many possible pitfalls and ill-intended uses of this powerful technology. Artificial intelligence Machine learning Corporate ethics Health data Data ownership

MER 2019 – CALL FOR PRESENTERS

IG Guru

We are looking for presentations on solutions to the IG challenges created by new and emerging technologies, the latest legal and regulatory developments that affect IG programs and professionals, practical advice and guidance on traditional IG challenges, and relevant case studies […].

Flaws in SanDisk SSD Dashboard Present Malware & Data Loss Risks

Dark Reading

Organizations using the utility should immediately install the latest version of the software, security vendor Trustwave says

4 governance warning signs when reviewing presented analytics

Information Management Resources

Why it’s dangerous to always assume that presented data is representative, four warning signs that you’re dealing with sweetened data, and how you can generally guard against trickery. Data management Data discovery Data visualization

Expert presented a new attack technique to compromise MikroTik Routers

Security Affairs

The experts at Tenable Research presented the technique on October 7 at DerbyCon 8.0 The post Expert presented a new attack technique to compromise MikroTik Routers appeared first on Security Affairs.

Baltimore SharePoint User's Group Presentation

JKevinParker

Get the slides from my presentation on "Don't Make Me Think: Getting SharePoint to be Useful, Usable, and Used": Don't Make Us Think: Getting SharePoint to be Useful, Usable, and Used from Kevin Parker, CIP. Presentation SharePointLast night I had the privilege of speaking at the Baltimore SharePoint User's Group. I really enjoyed the interaction with these professionals.

Duo Labs presents CRXcavator Service that analyzes Chrome Extensions

Security Affairs

The post Duo Labs presents CRXcavator Service that analyzes Chrome Extensions appeared first on Security Affairs. Researchers at Duo Labs has launched a new service called CRXcavator that allows users to analyze Chrome extensions and deliver security reports on them.

Reminder: e-Records 2019 Call for Presentations

The Texas Record

If you are interested in presenting at the conference this year, please complete the presentation proposal form soon. The theme for this year’s e-Records Conference is Better Together in a Digital World: Security and Retention and will be held on Friday, November 15th at The Commons Learning Center in Austin, Texas. Thank you to everyone who has already submitted your speaking proposals.

Experts presented BOTCHAIN, the first fully functional Botnet built upon the Bitcoin Protocol

Security Affairs

Security experts Antonio Pirozzi and Pierluigi Paganini presented BOTCHAIN, the first fully functional Botnet built upon the Bitcoin Protocol. The post Experts presented BOTCHAIN, the first fully functional Botnet built upon the Bitcoin Protocol appeared first on Security Affairs.

A few hours after Apple released iOS 12.1, a researcher presented a Passcode Bypass issue

Security Affairs

a researcher presented a Passcode Bypass issue appeared first on Security Affairs. A few hours after Apple released iOS 12.1 the iPhone bug hunter Jose Rodriguez has found a new passcode bypass issue that could be exploited to see all contacts’ private information on a locked iPhone.

Contract data presents a unique GDPR challenge

Information Management Resources

Getting into compliance with the new rules will require a governance policy and framework that specifically addresses the unique challenges of information contained in contracts. GDPR Compliance Compliance systems

Top 10 Sales Dashboard Software: Presenting Useful Information on a Central Sales Dashboard

Cllax - Top of IT

The sales industry is continually looking for new ways to improve the sales process in terms of efficiency, ease of use increasing sales revenue. The industry is extremely competitive and. Software and Tools

Sales 56

2019 Conference Call for Presentations – NAID/PRISM (i-SIGMA)

IG Guru

If you have an idea for a session that would benefit those in the secure data destruction or records information management industries or an interest in presenting at the 2019 conference, now is the time to act. Answer the Call for Presentations: Suggest […].

5 top challenges the IoT presents to data transparency

Information Management Resources

There are several pressing issues related to the IoT and data transparency practices. These problems concern both businesses and consumers using IoT devices. Internet of things Data management Data strategy

e-Records Conference 2018: Call for Presentations

The Texas Record

We are now accepting presentation proposals from state government organizations (state agencies, universities or local governments), vendors and subject matter experts from various organizations to share both their challenges and successes with managing electronic records.

@CMSummit - My Presentation

John Battelle's Searchblog

Opening Slides by John Battelle, Monday June 7 View more presentations from CM Summit: Marketing in Real Time. PS - all the presentations are available on our CM Summit channel here Here's the deck I used to open the CM Summit yesterday. Enjoy!

e-Records Conference 2019: Call for Presentations Extended

The Texas Record

Update: The deadline for submitting a presentation proposal for the 2019 e-Records Conference has been extended to Friday, July 26, 2019. Check out our previous blog post or the event web page for all the up-to-date information. News eRecords eRecords2019

Group-IB presented latest cybercrime and nation-state hacking trends in Asia

Security Affairs

According to Group-IB’s report findings, Asia is one of the most actively attacked regions in the world, the company presented latest cybercrime trends. Hong Kong, 16.11.2018 – Group-IB, an international company that specializes in preventing cyber attacks, presented the findings of its latest Hi-Tech Crime Trends 2018 report at the FinTech Security Conference in Hong Kong organized by Binary Solutions Limited in partnership with Group-IB.

Insecure Home IoT Devices a Clear and Present Danger to Corporate Security

Dark Reading

Avast-sponsored study shows wide prevalence of IoT devices, many with weak credentials and other security vulnerabilities

Study 82

The past, present and future of data warehouse appliances

IBM Big Data Hub

The IBM Integrated Analytics System (IIAS), is a unique, cloud-ready appliance and machine learning platform wields the power of an in-memory, massively parallel processing database engine with embedded Spark.

GDPR presents perfect opportunity to rethink data architecture

Information Management Resources

The new mandate truly creates an opportunity to restrategize and modernize systems by unifying the view or access to data assets and enforcing stricter guidelines for data protection. GDPR Data architecture Data privacy Data security

Merging Time: Past & Present Combined

Archives Blogs

This year, there are nineteen of these past-and-present combined images adorning the gallery walls. Once suitable present-day shots have been taken, they are manipulated to match the focal length and angle of the original photographs.

@CMSummit - Mary Meeker's Internet Trends Presentation

John Battelle's Searchblog

The most tweeted Slideshare of the show so far is Mary's presentation. Internet Trends 2010 by Morgan Stanley Research View more presentations from CM Summit: Marketing in Real Time Here it is for your reading pleasure!

Analytics experts discuss AI's present and future

IBM Big Data Hub

Where is AI headed? How should you be thinking about AI? What should you be doing with AI? To answer these questions, we recently convened a round table of tech influencers to discuss some of the most burning issues arising from AI — starting with why we should think of it as “augmented intelligence” rather than “artificial intelligence

How to protect your digital privacy from new Christmas presents

The Guardian Data Protection

Just unwrapped a gift of an internet-connected device? Don’t just turn it on and plug it in – you might be giving the manufacturer all sorts of information you don’t need to Jeff Bezos knows when you’ve been sleeping, he knows when you’re awake, he knows when you’ve been bad or good, because you didn’t change the default privacy settings on the Amazon smart speaker you set up in your bedroom, for goodness’ sake.

Jamf After Dark podcast: Past, present and future

Jamf

The Jamf podcast gives you an inside look at the people, teams and processes that make Jamf what it is. See what episodes we launched in 2018 and what you can expect in 2019

Connected Cars Present Great Opportunity for Car Rental Companies

Perficient Data & Analytics

telematics) has been around for some time, but only recently has the car rental industry truly exploited the massive opportunity it presents. Similar to mobility, connected car technology (e.g., The Internet of Things (IoT) has allowed companies to leverage new technology that better manages their fleets of cars. It’s also helping businesses, such as those that rent trucks for construction and landscaping, to closely monitor the performance and safety of their vehicles and drivers.

Blockchain Technology: SEC Commissioner Peirce Presents an Opportunity to Rethink Regulation

Data Matters

Digital asset trading platforms present novel regulatory considerations for secondary trading and custody. The post Blockchain Technology: SEC Commissioner Peirce Presents an Opportunity to Rethink Regulation appeared first on Data Matters Privacy Blog. On February 8, 2019, U.S.

The Future of War (From Jan., 1993 to the Present)

John Battelle's Searchblog

( image is a shot of my copy of the first Wired magazine, signed by our founding team ). I just read this NYT piece on the United States’ approach to unmanned warfare: Do Drones Undermine Democracy?

20th Anniversary of Leading Personnel Show – DocuWare Presents HR Solutions

Docuware

Europe´s leading trade fair for HR management, digitization and leadership will be celebrating a big milestone.

NARA’s Past, Present, and Future Leadership in SNAC (Social Networks and Archival Context): Always Collaborating, Always Cooperating

Archives Blogs

During the past year and a half, the NARA SNAC Liaisons presented information sessions and system demonstrations as close as the Smithsonian’s Archives of American Art where the Smithsonian’s Technical Group had a presentation by Liaison Dina Herbert.

Articles and Presentations

ChiefTech

I'm still in the process of migrating content from my old blog - for a consolidated list of my articles, presentations and papers please see this page