April, 2018

article thumbnail

Facebook's Zuckerberg Pledges Worldwide GDPR Compliance

Data Breach Today

Second Congressional Hearing Probes Privacy Issues At a U.S. House hearing Wednesday, Facebook CEO Mark Zuckerberg said the company would eventually comply worldwide with the European Union's tough privacy law, the General Data Protection Regulation.

article thumbnail

How are the C-Suite failing cyber security?

IT Governance

Data breaches and cyber attacks are regularly in the headlines, so it will come as no surprise that all organisations are vulnerable to attack. Falling victim can result in financial loss, regulatory penalties, business disruption and reputational damage. The majority of cyber attacks are automated and indiscriminate, exploiting known vulnerabilities rather than targeting specific organisations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A closer look at the GDPR’s technical requirements

IT Governance

The EU General Data Protection Regulation (GDPR) will soon be in effect, but many organisations are still working towards compliance. One part of the Regulation tripping people up is Article 32: Security of processing. It describes the technical and organisational measures that organisations should have in place, but it’s densely written and uses unfamiliar terms: Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as we

GDPR 57
article thumbnail

Cambridge Analytica Could Also Access Private Facebook Messages

WIRED Threat Level

A Facebook permission allowed an app to read messages between 1,500 Facebook users and their friends until October 2015—data that Cambridge Analytica could have accessed.

Access 111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How to write a GDPR-compliant personal data breach notification procedure

IT Governance

An integral part of your EU General Data Protection Regulation (GDPR) compliance project is producing appropriate documentation, which includes a personal data breach notification procedure. If you’re just beginning your GDPR project, it’s unlikely that you’ll be fully compliant by 25 May 2018, when the Regulation is enforced. However, in our recent blog, GDPR priorities in the lead up to May , we suggested that your organisation should prioritise creating incident response and breach reporting

More Trending

article thumbnail

A Records Center is not an Archives: Transfer Forms!

The Schedule

[Note: This was a forum post to the Records Management Section list on SAA’s site that got a little out of hand. Rather than clog everyone’s mailbox, I decided to post it here. The fact that I can add Futurama GIFs to posts here, and not on SAA Connect, had absolutely nothing to do with this decision (he said, unconvincingly.). For your reference, the original question:].

article thumbnail

200,000 Cisco Network Switches Reportedly Hacked

Data Breach Today

What Remediation Steps Should Be Taken? Over 200,000 Cisco networks switches worldwide reportedly were hacked Friday, apparently affecting critical infrastructure of large internet service providers and data centers across the world, especially in Iran, Russia, the United States, China, Europe and India. What remediation steps should be taken?

189
189
article thumbnail

GDPR compliance for professional services firms: time to get on track

IT Governance

The General Data Protection Regulation (GDPR)’s compliance deadline is looming. Every organisation that processes personal data must be in compliance with the new law by 25 May or risk substantial regulatory fines from the Information Commissioner’s Office and legal action from aggrieved data subjects. If you haven’t already, your firm must start your compliance project straight away or risk being in non-compliance.

GDPR 58
article thumbnail

Current forecast: Cloudy with a chance of exposed data

Thales Cloud Protection & Licensing

By Peter Galvin, Chief Strategy & Marketing Officer, Thales eSecurity. Today, organizations are rapidly adopting cloud technology. Many organizations have implemented a cloud first philosophy, requiring that any new applications or IT investments start with the cloud. And not just one cloud, but organizations are investing in multiple clouds and SaaS applications.

Cloud 75
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Securing Elections

Schneier on Security

Elections serve two purposes. The first, and obvious, purpose is to accurately choose the winner. But the second is equally important: to convince the loser. To the extent that an election system is not transparently and auditably accurate, it fails in that second purpose. Our election systems are failing, and we need to fix them. Today, we conduct our elections on computers.

Security 101
article thumbnail

AI Can Help Cybersecurity—If It Can Fight Through the Hype

WIRED Threat Level

There are a ton of claims around AI and cybersecurity that don't quite add up. Here's what's really going on.

article thumbnail

How to check whether Facebook shared your data with Cambridge Analytica

The Guardian Data Protection

People who fear their information may have been used by Cambridge Analytica can go to a new help page Tell us how you’ve been affected by the Facebook data breach Facebook has started the process of notifying the approximately 87 million users whose data was harvested by the election consultancy Cambridge Analytica. The social network eventually hopes to inform every user who was affected with a warning at the top of their Facebook news feed.

article thumbnail

Malaysia's Central Bank Blocks Attempted SWIFT Fraud

Data Breach Today

Following the Unauthorized Transfer Attempt, Philippines Alerts Its Banks Malaysia's central bank, Bank Negara Malaysia, says it detected and successfully blocked an attack that attempted to steal funds via fraudulent SWIFT interbank money-moving messages. The attack against BNM led the central bank of the Philippines to issue an alert to banks in that country.

IT 185
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Record user policies and procedures manual

TAB OnRecord

Many RIM managers are tasked with finding ways to ensure their RIM programs are effectively and accurately used. The best way to accomplish this is to develop a policies and procedures manual for record users. This will ensure your organization reaps all of its RIM program benefits. It should outline what responsibilities, expectations, and authority [.

article thumbnail

Belgian Privacy Commission Issues Guidance on Data Protection Impact Assessments Under the GDPR

Data Matters

On 28 February 2018, the Belgian Commission for the Protection of Privacy (the “Privacy Commission”) published a recommendation setting out its approach to Data Protection Impact Assessments (“DPIAs”), and in doing so published a “White List” and a “Black List” of processing operations, pursuant to the General Data Protection Regulation (“GDPR”). Organisations subject to the GDPR are required to assess whether they need to undertake a DPIA when undertaking new processing operations.

GDPR 90
article thumbnail

Thales Executives Speak to Press about UK Cybersecurity Developments

Thales Cloud Protection & Licensing

Thales eSecurity’s CTO Jon Geater and Peter Carlisle , Thales eSecurity’s VP of Sales, EMEA, were recently featured in major news outlets espousing their opinions about internet-connected devices and the new Cyber Security Export Strategy. Geater, on new UK IoT security guidelines. Earlier this month, the UK government announced guidelines to make internet-connected devices safer.

article thumbnail

The Teens Who Hacked Microsoft's Videogame Empire—And Went Too Far

WIRED Threat Level

Among those involved in David Pokora's so-called Xbox Underground, one would become an informant, one would become a fugitive, and one would end up dead.

Security 112
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

A radical proposal to keep your personal data safe | Richard Stallman

The Guardian Data Protection

The surveillance imposed on us today is worse than in the Soviet Union. We need laws to stop this data being collected in the first place • Richard Stallman is president of the Free Software Foundation Journalists have been asking me whether the revulsion against the abuse of Facebook data could be a turning point for the campaign to recover privacy.

article thumbnail

Securing the News

Data Breach Today

Time Inc.'s Deputy CISO on the Challenge of Ensuring Content Security In this era of "fake news," Time Inc. Deputy CISO Preeti Palanisamy takes seriously the challenge of maintaining the integrity of journalism from content creation through production and eventual publication.

Security 184
article thumbnail

How modern RIM professionals are staying relevant – Part 3

TAB OnRecord

In parts one and two of this blog post we discussed the importance of records management professionals getting involved in the early stages of the information lifecycle, and the need to convey RIM principles in terms of business outcomes. The final segment of this three-part post covers the skills needed by RIM professionals to be [.] Read More. The post How modern RIM professionals are staying relevant – Part 3 appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

The Customer Journey Digital Transformation Workbook

Bill Schmarzo - Dell EMC

Digital Transformation is becoming a business mandate. Why? Figure 1: “Driving Business Strategies with Data Science: Big Data MBA” Because in our evolving world, successful digital transformation will be the difference whether a business survives or wilts in the modern economy. Consequently, Professor Sidaoui and I felt it was critical that we prepare our University of San Francisco students for a world where digital transformation was the business norm.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Post-quantum confidentiality for TLS

Imperial Violet

In 2016, my colleague, Matt Braithwaite, ran an experiment in Google Chrome which integrated a post-quantum key-agreement primitive ( NewHope ) with a standard, elliptic-curve one (X25519). Since that time, the submissions for the 1 st round of NIST’s post-quantum process have arrived. We thus wanted to consider which of the submissions, representing the new state of the art, would be most suitable for future work on post-quantum confidentiality in TLS.

Paper 88
article thumbnail

How to Check If Cambridge Analytica Could Access Your Facebook Data

WIRED Threat Level

Facebook has released a tool that lets you see if you were caught up in the Cambridge Analytica fiasco—and what other apps know about you know.

Access 111
article thumbnail

Mark Zuckerberg refuses to step down or fire staff over Facebook 'mistakes'

The Guardian Data Protection

Founder says he takes full responsibility for data breaches and will not ‘throw anyone else under the bus’ Mark Zuckerberg has rejected calls for heads to roll at Facebook over the Cambridge Analytica scandal, saying that he takes full responsibility. Speaking after Facebook’s fullest statement yet about the data breach, which the company now says resulted in 87m profiles being extracted from the platform, Zuckerberg insisted he remained the correct person to run the company.

article thumbnail

Thailand Seizes 'Hidden Cobra' Command-and-Control Servers

Data Breach Today

North Korea Suspected of Running 'GhostSecret' Attacks Against Banks, Others The Thai government has seized servers used to run the so-called GhostSecret cyber espionage campaign that targets organizations in the finance, healthcare and critical infrastructure sectors - and beyond. McAfee suspects the attacks are being launched by "Hidden Cobra" - a hacking group tied to North Korea.

article thumbnail

How Top Tech CFOs Solve Annual Planning’s Biggest Challenges

Gearing up for 2025 annual planning? Our latest eBook from the Operators Guild is your ultimate guide. Discover real-world solutions and best practices shared by top CFOs, drawn directly from discussions within OG’s vibrant online community. Learn from senior executives at high-growth tech startups as they outline financial planning strategies, align CEO and board goals, and coordinate budgets across departments.

article thumbnail

Six eco-friendly RIM tips that could save you money

TAB OnRecord

Protecting the environment can translate into an improved bottom line, from the cost savings associated with resource conservation, to benefits of increased consumer and shareholder confidence. In this blog we will be sharing six ways to incorporate environmentally friendly practices into your organization’s RIM processes. 1. The more you throw away, the more you can [.

article thumbnail

Obscure E-Mail Vulnerability

Schneier on Security

This vulnerability is a result of an interaction between two different ways of handling e-mail addresses. Gmail ignores dots in addresses, so bruce.schneier@gmail.com is the same as bruceschneier@gmail.com is the same as b.r.u.c.e.schneier@gmail.com. (Note: I do not own any of those email addresses -- if they're even valid.) Netflix doesn't ignore dots, so those are all unique e-mail addresses and can each be used to register an account.

article thumbnail

8 Ways Hackers Monetize Stolen Data

Dark Reading

Hackers are craftier than ever, pilfering PII piecemeal so bad actors can combine data to set up schemes to defraud medical practices, steal military secrets and hijack R&D product information.