May, 2016

article thumbnail

750 days to go before the new data protection rules bite

Data Protector

How often do organisations get 750 days’ notice of new rules that may require them to make huge changes to comply? Well, it’s happened. The European Commission has just announced that the General Data Protection Regulation, a mighty piece of legislation that took over 4 years to negotiate, will come into force on 25 May 2918. What will it mean to most organisations?

article thumbnail

Cryptographic Agility

Imperial Violet

( These are notes that I wrote up from a talk that I gave at the National Academies Forum on Cyber Resilience. You can tell that it was in Washington, DC because of the “cyber”. I wasn't quite sure how technical to pitch this talk so it's relatively introductory; regular readers probably know all this. This isn't a transcript of what I said, but I try to hit the main points in my notes. ).

IT 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

It's an ?IoT world: The big shift to intelligent devices

Collaboration 2.0

Next week's 'IoTworld' conference promises to be the new hot spot in Silicon Valley, revitalizing an 'app' culture that has mostly run out of steam.

IoT 75
article thumbnail

European Parliament Calls on European Commission to Renegotiate Privacy Shield

Hunton Privacy

On May 26, 2016, the European Parliament approved a resolution calling for the European Commission to reopen negotiations with U.S. authorities on the EU-U.S. Privacy Shield (“Privacy Shield”), and to implement the recommendations of the Article 29 Working Party (“Working Party”) on the draft Privacy Shield adequacy decision. The Working Party had previously published its recommendations in an Opinion regarding the draft decision issued by the European Commission on adequacy of the protection pr

Privacy 70
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Lessons Learned Playing With Pricing

PerezBox

When we first started, our pricing by all accounts was absurdly low. In my last post I chronicled the details of our pricing journey at Sucuri. Developers were finding that the. Read More. The post Lessons Learned Playing With Pricing appeared first on PerezBox.

Sales 61

More Trending

article thumbnail

The Strategic, the Tactical, and Agile Records Management

Brandeis Records Manager

George Despres, CRM. Program Director for University Records Management, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). I’ve been asked in the past to provide budget estimates for five years into the future. My response is internal laughter, and tears. Understood, this is a typical practice, but the provision of a high-quality estimate for five years out, unless you are a quant evaluating special, massaged, projection data (a

article thumbnail

DB2 for z/OS: When Did You Last Check Your Checkpoint Frequency?

Robert's Db2

I have written in this blog a few entries about various DB2 for z/OS ZPARM parameters, including a post on DSMAX and another on EDM_SKELETON_POOL. Time for another such entry, this time focused on the parameters that determine when a DB2 subsystem will perform checkpoint processing. Checkpointing is an availability-enhancing mechanism that is related to DB2's deferred write functionality.

IT 48
article thumbnail

Time and tide waits for no man – IoT in Insurance

CGI

Time and tide waits for no man – IoT in Insurance. p.butler@cgi.com. Fri, 05/27/2016 - 07:25. Table. Time and tide waits for no man. This old saying could also be applied for what is happening in the insurance market with IoT and that given the drive behind IoT in both the consumer and business markets. Given what IoT enables both customers and insurers to understand about themselves and the things they interact with (in near real time) the impact will be huge and it's more likely to be a case

article thumbnail

Advocate General Advises EU’s Highest Court that IP Addresses are Personal Data

Hunton Privacy

On May 12, 2016, the Advocate General (“AG”) of the Court of Justice of the European Union (“CJEU”) issued an opinion stating that Internet Protocol (“IP”) addresses are personal data and data protection law should apply to IP addresses. Specifically, the AG urged the CJEU to rule that a dynamic IP address is personal data to the extent that an Internet access provider has additional data that in combination with the IP address would allow for the re-identification of the user.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Preservica, IRMS and ARA digital preservation training a great success!

Preservica

Over the course of 2015/16 the Preservica team has been pairing up with the Information and Records Management Society (IRMS) and ARA (UK) to deliver a series of practical workshops and webinars on digital preservation. Visiting seven cities across the UK, from London, to Edinburgh, to Dublin, over 200 IRMS and Archives and Records Association (ARA) members attended the workshop sessions, with a further 250 joining for the six ‘how to’ webinars.

article thumbnail

Live Streaming Security Games

ForAllSecure

Aside from our cool research , ForAllSecure also works on creating fun and engaging games to promote computer security. Just about every employee in our company has been involved in Capture the Flag exercises for the past several years, and we have been hosting these online events for our customers for about 3 years now. One of our big dreams is to see these types of contests gain in popularity, similar to how e-sports grew.

article thumbnail

[AIIM16] Don't Make Us Think: Getting SharePoint to be Useful, Usable, and Used

JKevinParker

I was a speaker at the 2016 AIIM Conference in New Orleans. AIIM has posted my presentation slides on SlideShare. [AIIM16] Don't Make Us Think: Getting SharePoint to Be Useful, Usable, and Used from AIIM.

article thumbnail

Office of the Privacy Commissioner announces first investigation under the address harvesting provisions

Privacy and Cybersecurity Law

Today, the Office of the Privacy Commissioner (OPC) announced its report of findings against Compu-Finder, a Quebec-based company that offers […].

Privacy 40
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

The Internet of Things (IoT) – creating a whole new ‘place’ in marketing

CGI

The Internet of Things (IoT) – creating a whole new ‘place’ in marketing. p.butler@cgi.com. Thu, 05/26/2016 - 04:36. Table. “The traditional model we all grew up with is obsolete”. Jim Stengel, global marketing officer, P&G. My mobile phone finally gave up last week. I’ve had it for ages. For such a ‘simple’ lifestyle device, the options are many. Sim-only or contract?

IoT 40
article thumbnail

EU Council Adopts the Network and Information Security Directive

Hunton Privacy

On May 17, 2016, the European Council adopted its position at first reading of the Network and Information Security Directive (the “NIS Directive”). The NIS Directive was proposed by the European Commission on February 7, 2013, as part of its cybersecurity strategy for the European Union, and is designed to increase cooperation between EU Member States on cybersecurity issues.

article thumbnail

Supreme Court Finds Consumers Must Prove Injury in Class Actions

Hunton Privacy

On May 16, 2016, the United States Supreme Court issued a decision in Spokeo Inc. v. Thomas Robins , holding 6-2 that the Ninth Circuit’s ruling applied an incomplete analysis when it failed to consider both aspects of the injury-in-fact requirement under Article III. Writing for the Court, Justice Samuel Alito found that a consumer could not sue Spokeo, Inc., an alleged consumer reporting agency that operates a “people search engine,” for a mere statutory violation without alleging actual injur

Risk 53
article thumbnail

CIPL Releases Outcomes Report of First GDPR Implementation Project Workshop in Amsterdam

Hunton Privacy

On March 16, 2016, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP co-hosted a one-day workshop in Amsterdam, Netherlands, together with the Dutch Ministry of Security and Justice, to kick off CIPL’s new long-term project on the implementation of the EU General Data Protection Regulation (“GDPR”). The project aims to address the need for a constructive and expert dialogue between industry, regulators and key policymakers with the following specific objectives:

GDPR 53
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Irish DPA Expected to Question EU Standard Contractual Clauses before Irish Courts

Hunton Privacy

On May 25, 2016, Max Schrems stated that the Irish Data Protection Commissioner (the “DPC”) is expected to bring legal proceedings before the Irish courts concerning international data transfers under EU Standard Contractual Clauses. In an unofficial statement to the Irish press, a representative of the DPC confirmed the DPC’s intention to seek declaratory relief in the Irish High Court and to recommend that the case be referred to the Court of Justice of the European Union (“CJEU”) for a prelim

article thumbnail

EU Member States to European Commission: Remove Barriers to Data Flows

Hunton Privacy

On May 23, 2016, half of the EU Member States sent a letter to the European Commission and the Netherlands (which holds the rotating presidency), seeking the removal of barriers to the free flow of data both within and outside the EU to benefit the EU from new data-driven technologies, according to Reuters and EurActive.com. The countries behind the letter include Belgium, Britain, Bulgaria, Czech Republic, Denmark, Estonia, Finland, Ireland, Latvia, Luxembourg, Lithuania, Poland, Slovenia and S

article thumbnail

FTC Orders Mobile Device Manufacturers to Provide Information about Security Updates for Study

Hunton Privacy

On May 9, 2016, the Federal Trade Commission announced it had issued Orders to File a Special Report (“Orders”) to eight mobile device manufacturers requiring them to, for purposes of the FTC’s ongoing study of the mobile ecosystem, provide the FTC with “information about how [the companies] issue security updates to address vulnerabilities in smartphones, tablets, and other mobile devices.

article thumbnail

EU General Data Protection Regulation Published in the EU Official Journal

Hunton Privacy

On May 4, 2016, the EU General Data Protection Regulation (“GDPR”) was published in the Official Journal of the European Union. Following the European Parliament’s vote to adopt the GDPR on April 14, 2016, and the signing of the final draft on April 27, 2016, the GDPR will enter into force 20 days following its publication in the Official Journal of the European Union.

GDPR 45
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

CII Issues Investor-Engagement Guide on Cyber Risk

Hunton Privacy

Recently, the Council of Institutional Investors (“CII”) issued a guide to shareholder engagement on cyber risk. The guide is intended to enable shareholders to ask appropriate questions of boards to gauge whether companies are taking proper steps to mitigate cyber risk. The guide poses the following five questions: How are the company’s cyber risks communicated to the board, by whom and with what frequency?

Risk 45
article thumbnail

European Data Protection Supervisor Publishes 2015 Annual Report

Hunton Privacy

On May 24, 2016, the European Data Protection Supervisor (“EDPS”) presented its Annual Report for 2015. The annual report provides an overview of the EDPS’ primary activities in 2015 and sets forth key priorities and challenges for 2016. During 2015, the EDPS focused on ensuring the adoption of a new and effective data protection framework, providing recommendations for the adoption of the General Data Protection Regulation (“GDPR”).

GDPR 40
article thumbnail

Managing the regulatory risks of cybersecurity: An evolving regulatory landscape

CGI

Managing the regulatory risks of cybersecurity: An evolving regulatory landscape. Anonymous. Fri, 05/27/2016 - 00:37. Financial institutions in the U.S. are well aware of the business risks related to cybersecurity but there are an increasing number of related regulatory risks that also need to be addressed. The combined and increased focus of the Securities Exchange Commission (SEC), the Financial Industry Regulatory Authority (FINRA) and the Commodity Futures Trading Commission (CFTC) on cyber

article thumbnail

Do you really know how your customers will behave?

CGI

Do you really know how your customers will behave? shobana.lv@cgi.com. Fri, 05/27/2016 - 00:51. As technology changes, so do customer behaviors, and so must our business processes. (I use the term customer loosely here to represent the larger set of consumers, employees, citizens and other stakeholders that may be among your target audiences.). When the majority of your customers have decided that digital is their preferred way to interact with your organization, the tipping point for digital tr

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Will Spokeo Undermine CAFA?

Hunton Privacy

As we previously reported , the Supreme Court’s decision in Spokeo v. Robins has been nearly universally lauded by defense counsel as a new bulwark against class actions alleging technical violations of federal statutes. It may be that. But Spokeo also poses a significant threat to defendants by defeating their ability to remove exactly the types of cases that defendants most want in federal court.

article thumbnail

UK ICO Issues Priorities for GDPR Preparation

Hunton Privacy

On May 24, 2016, the UK Information Commissioner’s Office (“ICO”) published priorities for preparing for the EU General Data Protection Regulation (“GDPR”). The ICO’s priorities for issuing guidance to assist organizations with GDPR preparation are split into three phases. Phase 1 – Familiarization and Key Building Blocks. This phase focuses on issuing guidance to help organizations understand the key differences between the EU Data Protection Directive and the GDPR.

GDPR 40
article thumbnail

LIVE STREAMING SECURITY GAMES

ForAllSecure

Aside from our cool research , ForAllSecure also works on creating fun and engaging games to promote computer security. Just about every employee in our company has been involved in Capture the Flag exercises for the past several years, and we have been hosting these online events for our customers for about 3 years now. One of our big dreams is to see these types of contests gain in popularity, similar to how e-sports grew.