February, 2018

article thumbnail

Did Russia Affect the 2016 Election? It’s Now Undeniable

WIRED Threat Level

In the wake of the Mueller indictment of a Russian troll farm, any attempt to claim that the 2016 election wasn’t affected by Russian meddling is laughable.

Security 279
article thumbnail

US Data Breaches Hit All-Time High

Data Breach Today

Millions of Payment Cards and Social Security Numbers Exposed The number of data breaches reported by U.S. organizations reached an all-time high last year. In 2017, organizations that described how bad their breach was - and one-third did not - collectively lost 14 million payment cards and 158 million Social Security numbers, according to the Identity Theft Resource Center.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Perspective Check: InfoGov Short Cuts

Weissman's World

Sorry, kids, but there just aren’t any more short-cuts to good information governance than there are in serious mountaineering. The best I can tell you is to leverage the same sort of disciplined project management skills in infogov as you would in any other initiative you engage in. The post Perspective Check: InfoGov Short Cuts appeared first on Holly Group.

article thumbnail

Digital Preservation -- High Stakes for Finance and Insurance Companies

AIIM

It is time to think about Digital Preservation differently — as a dedicated capability that keeps long-term information alive and usable and trusted and easily found. The time to act is now. AIIM believes that digital preservation needs to be viewed through the prism of a set of Intelligent Information Management capabilities that are integral to delivering upon the Digital Transformation challenge of understanding, anticipating, and redefining internal and external customer experiences.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

'Living laboratories': the Dutch cities amassing data on oblivious residents

The Guardian Data Protection

In Eindhoven and Utrecht smart tech is tackling traffic, noise and crime. But with privacy laws proving futile and commercial companies in on the act, are the plans as benign as they seem? Stratumseind in Eindhoven is one of the busiest nightlife streets in the Netherlands. On a Saturday night, bars are packed, music blares through the street, laughter and drunken shouting bounces off the walls.

Privacy 112

More Trending

article thumbnail

Pro-Gun Russian Bots Flood Twitter After Parkland Shooting

WIRED Threat Level

In the wake of Wednesday's Parkland, Florida school shooting Russian bots have taken to Twitter to stoke the gun control debate.

Security 280
article thumbnail

SEC Releases Updated Cybersecurity Guidance

Data Breach Today

Regulator Demands More Risk Disclosure, Better Insider Trading Policies The U.S. Securities and Exchange Commission has released revised guidance "to assist public companies in preparing disclosures about cybersecurity risks and incidents." It includes new prohibitions on trading in corporate shares after a breach has been discovered but before investors have been notified.

article thumbnail

Great Data Scientists Don’t Just Think Outside the Box, They Redefine the Box

Bill Schmarzo - Dell EMC

Special thanks to Michael Shepherd, AI Research Strategist, Dell EMC Services, for his co-authorship. Learn more about Michael at the bottom of this post. Imagine you wanted to determine how much solar energy could be generated from adding solar cells to a particular house. This is what Google’s Project Sunroof does with Deep Learning. Enter an address and Google uses a Deep Learning framework to estimate how much money you could save in energy costs with solar cells over 20 years (see Figure 1)

article thumbnail

Information Security and Compliance Through the Prism of Healthcare and Retail

AIIM

Organizations must focus strategically on how to manage digital content and understand that: 1) end-users are consuming technology differently; 2) consumer devices are being increasingly used as “on-ramps” to digital workflows; and 3) how you secure the scan and capture process becomes increasingly important. Let’s explore how these concepts relate to two specific industries – healthcare and retail. 1 -- Healthcare at the practice level illustrates the challenges of matching small business IT re

Retail 113
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Facebook personal data use and privacy settings ruled illegal by German court

The Guardian Data Protection

Firm to appeal decision by Berlin regional court which upholds complaints that users not given informed consent Facebook’s default privacy settings and use of personal data are against German consumer law, according to a judgement handed down by a Berlin regional court. The court found that Facebook collects and uses personal data without providing enough information to its members for them to render meaningful consent.

article thumbnail

AI's Future in Cybersecurity

eSecurity Planet

Industry experts from Coalfire, IEEE and more discuss how AI is shaping the future of IT security.

article thumbnail

Bob Mueller’s Investigation Is Larger—and Further Along—Than You Think

WIRED Threat Level

We speak about the “Mueller probe” as a single entity, but it’s important to understand that there are no fewer than five separate investigations under the broad umbrella of the special counsel’s office.

Security 280
article thumbnail

Russia Will Meddle in US Midterm Elections, Spy Chief Warns

Data Breach Today

White House Inaction Questioned by Some Lawmakers The top U.S. intelligence official has warned Congress that Russia will attempt to meddle in the this year's U.S. midterm elections, a repeat of the country's alleged 2016 U.S. presidential election interference.

189
189
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Insights about the first three years of the Right To Be Forgotten requests at Google

Elie

The "Right To Be Forgotten" (RTBF) is the landmark European ruling that governs the delisting of personal information from search results. This ruling establishes a right to privacy, whereby individuals can request that search engines delist URLs from across the Internet that contain “inaccurate, inadequate, irrelevant or excessive” information surfaced by queries containing the name of the requester.

Privacy 107
article thumbnail

Going Down the Rabbit Hole

AIIM

When I was a young child, in an era when school papers had to be researched in libraries with card catalogs and shelves upon shelves of books, my father had the bright idea to purchase a complete set of Encyclopedia Britannica. Now, we lived on a tight budget and my mother wasn’t too thrilled with this splurge when a perfectly good library was so close to home.

article thumbnail

New UK data protection rules are a cynical attack on immigrants | Claude Moraes

The Guardian Data Protection

Non-nationals subject to an immigration procedure are to lose the right to access data held about them, in a discriminatory move that worries the European parliament In September, I warned in a Guardian opinion article that the Brexit process could have the effect of allowing the UK government to bring in more draconian and discriminatory immigration laws, harking back to the 70s and 80s.

article thumbnail

Don’t Follow the Money; Follow the Customer!

Bill Schmarzo - Dell EMC

“Mr. Schmarzo, we’ve noticed that your cholesterol count is at 210, so we have prescribed Fluvastatin and placed selected foods into your shopping basket to help you control your cholesterol. Complete the purchase by selecting ‘ here ’ and we’ll deliver the medication and groceries to your home today between 4:00 and 4:20pm. If you complete the full Fluvastatin prescription, then we’ll reduce your monthly healthcare insurance payment by 5%.”.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

What Rick Gates' Guilty Plea Means For Mueller’s Probe

WIRED Threat Level

Paul Manafort’s longtime deputy is cooperating with the special prosecutor, so we may soon have answers to these questions hovering around the Russia investigation.

Security 275
article thumbnail

Darknet Vendors Sell Counterfeit TLS Certificates

Data Breach Today

Pro Tip: Change TLS Certificates Regularly For Better Data Security Certificate Authorities continue to be tricked into issuing bogus TLS certificates. A study by Recorded Future found that there are at least three underground vendors that can supply fraudulent TLS certificates, which pose serious risks to data security and privacy.

Privacy 184
article thumbnail

I've Just Added 2,844 New Data Breaches With 80M Records To Have I Been Pwned

Troy Hunt

tl;dr - a collection of nearly 3k alleged data breaches has appeared with a bunch of data already proven legitimate from previous incidents, but also tens of millions of addresses that haven't been seen in HIBP before. Those 80M records are now searchable, read on for the full story: There's an unknown numbers of data breaches floating around the web.

article thumbnail

And the survey said. Make your voice heard on the future of Information Management

AIIM

There’s a lot going on in the content management space right now. The "scale" of information challenges is getting bigger by the day -- bigger files, more of them, in wildly varying formats and in demand across more and more applications and processes. Our State of the Industry survey this year is focused on better understanding these information management challenges.

ECM 106
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Immigration officials to continue to seek NHS England patient data

The Guardian Data Protection

Ministers reject calls to suspend practice amid fears it is stopping migrants seeking medical help Ministers have rejected a call from MPs to immediately suspend the disclosure of confidential NHS patient data to the Home Office to trace potential immigration offenders despite evidence it is deterring migrants in England from seeking medical help. A joint letter from Home Office and health ministers to the chair of the Commons health select committee discloses that 1,297 requests for non-clinica

IT 98
article thumbnail

Four important questions that AI can help retailers answer

OpenText Information Management

In my previous blog, I looked at how quickly Artificial Intelligence (AI) is rapidly becoming a part of the retail experience. Industry analysts agree that 2018 will be the year that AI brings top and bottom line benefits to innovative companies. So, where can AI most help retailers? Here’s four questions I think a combination … The post Four important questions that AI can help retailers answer appeared first on OpenText Blogs.

Retail 98
article thumbnail

WhatsApp Co-Founder Brian Acton Injects $50 Million in Newly Formed Signal Foundation

WIRED Threat Level

WhatsApp co-founder Brian Acton has taken on the leadership of the non-profit behind that popular encryption app—and given it a serious injection of cash.

article thumbnail

Anatomy of a Russian Information Warfare Campaign

Data Breach Today

Cost of Troll Farm: $15 Million. Impact: Priceless Want to meddle with a democracy? Just use its social media outlets against it to amplify already existing social divisions. That's the quick take on the indictment recently unsealed by Special Counsel Robert Mueller that accuses Russians of running an "active measures" campaign against the United States.

IT 184
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Strong, streamlined and secure: How to get the most out of centralized key management

Thales Cloud Protection & Licensing

With organizations around the world now deploying ever-increasing amounts of encryption solutions in an effort to ward off cybercrime, businesses are facing a combination of challenges. Whether it’s varying protection levels, differing operational techniques and policies, or juggling multiple keys, managing more than one encryption system can quickly turn into a complex web that demands time, expertise and money to manage effectively.

article thumbnail

Content Migration -- Go Manual? Or Find a Partner?

AIIM

Carefully think through the pros and cons of your approach to content migration. The advent of a new generation of modern content solutions and the desire of many organizations to reduce the number of content systems is driving organizations to look at how they can update their content management infrastructure. More and more organizational leaders face the need to migrate legacy content to a newer content suite, either in the cloud or on premise.

ECM 106
article thumbnail

The Tories claim the data protection bill will make us safer. That’s not true | Diane Abbott

The Guardian Data Protection

The government’s growing store of personal details allows automatic adjudication on crucial aspects of our lives Is your data safe? The answer must be no if this government manages to push through its data protection bill without important amendments. The Tory claim that the bill is necessary for protecting our data is false. Related: The DWP – a bureaucracy of outstanding brutality | Diane Taylor Related: The data protection bill is yet another legal threat to UK press freedom Continue reading.