August, 2017

article thumbnail

Missing the GDPR deadline of May 2018: And then what?

Data Protector

As May 2018 looms, I’m aware of a growing number of companies that are seeking help with their GDPR compliance obligations. For most of them, it's a huge wake-up call. Many (me included) have been sent a stream of emails from self-styled “GDPR experts” containing dire warnings of ginormous fines for non-compliance. Many (me included) have been offered the opportunity to spend money on worthless qualifications from institutions I had never heard of to obtain some certificate of GDPR proficiency,

GDPR 120
article thumbnail

Security Keys

Imperial Violet

Security Keys are (generally) USB-connected hardware fobs that are capable of key generation and oracle signing. Websites can “enroll” a security key by asking it to generate a public key bound to an “appId” (which is limited by the browser based on the site's origin). Later, when a user wants to log in, the website can send a challenge to the security key, which signs it to prove possession of the corresponding private key.

Security 117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to trace ransomware payments end-to-end

Elie

Over the last two years, ransomware has been all over the news. Hardly a week goes by without a report of a large ransomware outbreak or the emergence of a new ransomware family. Despite all this attention, very little is known about how profitable ransomware is and who the criminals are that benefit from it. To answer these questions and expose the inner workings of the ransomware economy, our research team at Google, in partnership with.

article thumbnail

Big Data at NASA

IBM Big Data Hub

Data already is the new currency and is at the heart of everything digital. I like to repeat the adage, “Data becomes Information, becomes Knowledge, becomes Wisdom”. And “It’s all about the data”. So why do we send up probes, sensors or satellites — for the data?

Big data 100
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Join us and discover essential survival tips for modern records managers

TAB OnRecord

For our colleagues in Boston, Minneapolis and Chicago, we invite you to join us at an intimate learning opportunity. TAB’s Kurt Thies will be speaking at a series of AIIM Lunch-and-Learns titled, Redefining the Modern Records Manager. In a brief talk, Kurt will share TAB’s industry experience and several customer examples to show you how… Read More.

More Trending

article thumbnail

Automattic’s Push into Managed WordPress and It’s Potential Impacts to the Hosting Ecosystem

PerezBox

The Managed WordPress ecosystem welcomes a new entrant – Automattic. Today they officially announced that WordPress.com Business now supports plugins and third-party themes. I am fascinated by the move because. Read More. The post Automattic’s Push into Managed WordPress and It’s Potential Impacts to the Hosting Ecosystem appeared first on PerezBox.

IT 78
article thumbnail

No. Social Terrorists Will Not Win

John Battelle's Searchblog

The post No. Social Terrorists Will Not Win appeared first on John Battelle's Search Blog. A small group of social terrorists have hijacked the rational discourse led by society’s most accomplished, intelligent, and promising organizations. (cross posted from NewCo Shift ). Let’s start with this: Google is not a perfect company. It’s easy to cast it as an omniscient and evil villain, the leader of a millennium-spanning illuminati hellbent on world subjugation.

article thumbnail

Understanding the Mirai Botnet

Elie

The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by storm in late 2016 when it overwhelmed several high-profile targets with massive distributed denial-of-service (DDoS) attacks. In this paper, we provide a seven-month retrospective analysis of Mirai’s growth to a peak of 600k infections and a history of its DDoS victims.

IoT 86
article thumbnail

Begin your cognitive enterprise journey at DataWorks Summit Sydney

IBM Big Data Hub

The power of machine learning, data science and big data is no longer considered a hype or fad. It’s a reality and it’s impacting the bottom lines of businesses.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Mergers and acquisitions: How to evaluate the target company’s RIM program

TAB OnRecord

In any merger or acquisition, you must have an accurate picture of what you are getting as part of the deal. For records and information management teams, this means having a clear understanding of the target company’s RIM program and records collections. In a two-part blog post we share a set of assessment questions that… Read More. The post Mergers and acquisitions: How to evaluate the target company’s RIM program appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

UK seeks early deal with EU on post-Brexit data sharing

The Guardian Data Protection

Britain to argue that there should be no substantial regulatory changes as a result of leaving the EU The government is seeking to negotiate a deal over data sharing with Europe in which there are no substantial regulatory changes as a result of Brexit. The ambitious strategy emerged on Thursday in the last of a series of summer policy papers published by the Department for Exiting the European Union ahead of the next round of talks in Brussels on Monday.

Paper 80
article thumbnail

Google Begins Campaign Warning Forms Not Using HTTPS Protocol

PerezBox

August 2014, Google released an article sharing their thoughts on how they planned to focus on their “HTTPS everywhere” campaign (originally initiated at their Google I/O event). The premise of. Read More. The post Google Begins Campaign Warning Forms Not Using HTTPS Protocol appeared first on PerezBox.

article thumbnail

Hurricane Harvey Update

Gimmal

Below is a letter to our customer and partner community from Gimmal CEO, K. David Quackenbush.

73
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

First Enforcement Actions Brought Pursuant to China’s Cybersecurity Law

Hunton Privacy

In the wake of China’s Cybersecurity Law going into effect on June 1, 2017, local authorities in Shantou and Chongqing have brought enforcement actions against information technology companies for violations of the Cybersecurity Law. These are, reportedly, the first enforcement actions brought pursuant to the Cybersecurity Law. Recently, Chongqing’s municipal Public Security Bureau’s cybersecurity team identified a violation of the Cybersecurity Law during a routine inspection.

article thumbnail

Protect your customer data with relevant test data

IBM Big Data Hub

At a time when data breaches and personalized, sensitive data leaks are receiving great focus, individuals and governments alike are pushing hard on the business community to do more to protect citizens' rights and the sensitive customer data these companies maintain.

article thumbnail

Black Hat 2017: Inside the NOC

Outpost24

With the thump of techno all around us and traces of network traffic on giant screens providing the only light, the Pwnie Express team spent the tail end of July in the Black Hat Network Operations Center (NOC). Before continuing to read this post, put your headphones on and blast The Prodigy's Voodoo People with your lights off and you'll start to feel the vibe.

IoT 63
article thumbnail

Reader Favorites August 2017: Our Most Popular RIM Resources

TAB OnRecord

The most popular RIM resources of the past month cover both electronic records and paper records. To start, we have a white paper to help you choose the right metrics to measure ROI for your EDRMS system. Our mobile shelving buyer's guide provides an overview of key factors think about when purchasing a system. For… Read More. The post Reader Favorites August 2017: Our Most Popular RIM Resources appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Phishing and Ransomware Leads Security Concerns for Organizations

PerezBox

The SANS Institute recently released their 2017 Threat Landscape Survey: User on the Front Line in which they interviewed 263 IT and security professional on the things that keep them. Read More. The post Phishing and Ransomware Leads Security Concerns for Organizations appeared first on PerezBox.

article thumbnail

People Aren't Necessarily Librarians

Gimmal

I learned the Dewy Decimal system in fourth grade, but I'm not sure they teach that any longer! With modern software, card catalogs and manual sorting are a thing of the past in libraries, and that ease of access should flow through to the digital workplace.

article thumbnail

Colombia Designates U.S. as “Adequate” Data Transfer Nation

Hunton Privacy

On August 14, 2017, the Colombian Superintendence of Industry and Commerce (“SIC”) announced that it was adding the United States to its list of nations that provide an adequate level of protection for the transfer of personal information, according to a report from Bloomberg BNA. The SIC, along with the Superintendence of Finance, is Colombia’s data protection authority, and is responsible for enforcing Colombia’s data protection law.

IT 64
article thumbnail

Experts answer your top data science and machine learning questions

IBM Big Data Hub

There’s no doubt data science and machine learning are main areas of focus for enterprises to better their business. However, talking about data science and machine learning isn’t the same as making it a reality.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Data processors under the GDPR

Privacy and Cybersecurity Law

In our monthly GDPR Updates we discuss various key issues of the General Data Protection Regulation, (EU) 2016/679 (the GDPR), […].

GDPR 52
article thumbnail

How to trace ransomware payments end-to-end - an overview

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

Db2 12 for z/OS SQL Enhancements: Advanced Triggers

Robert's Db2

In this, the fourth of a set of four entries covering SQL enhancements introduced with Db2 12 for z/OS, I will describe new trigger capabilities delivered by way of what are called "advanced triggers" (the kind of trigger that you could define prior to Db2 12 -- and which you can still create in a Db2 12 system -- is now referred to as a "basic trigger").

IT 48
article thumbnail

Why Office 365 Is the Ideal SAP Archiving Platform

Gimmal

As HANA adoption continues to mount , archiving is becoming an increasingly more essential component to any SAP content management strategy. One major reason for planning is that HANA doesn’t scale like traditional systems.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

UK Government Expected to Present Data Protection Bill in September 2017

Hunton Privacy

Media sources have reported that the UK Department for Culture, Media & Sport has confirmed its plans to present its Data Protection Bill to Parliament when MPs return to Parliament in early September. The Bill follows commitments made in the Queen’s Speech in June, and will effectively copy the EU General Data Protection Regulation (“GDPR”) into the UK statute book.

article thumbnail

Companies that share data can’t ignore governance

IBM Big Data Hub

Some people think of master data management (MDM) purely as a platform for organizing and mobilizing enterprise information. While this is true, leading companies view MDM more as a philosophy or a set of best practices, not just a suite of software tools.

MDM 68
article thumbnail

One Way to Innovate

Getting Information Done

This was a guest blog post at Leaders Press On: I had dinner this summer with someone I respect as a thought leader and innovator. We had a great conversation and discussion about a new project I am working on to disrupt the traditional model for IT and Information Governance consulting. As we talked and bounced ideas off each other, an innovative creative synergy emerged that resulted in some new and novel ideas.