This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
There’s a disturbing trend in the information governance profession that needs to stop now, namely the tendency to apologize for the work we’re doing. “Let me email that document to you.” – “I’m sorry, but please paste in the link to the digital document instead.” “I need to make a copy of this for my […]. The post Governance is <del>Always</del> Never Having to Say You’re Sorry appeared first on Holly Group.
On May 16, 2017, the Governor of the State of Washington, Jay Inslee, signed into law House Bill 1493 (“H.B. 1493”), which sets forth requirements for businesses who collect and use biometric identifiers for commercial purposes. The law will become effective on July 23, 2017. With the enactment of H.B. 1493, Washington becomes the third state to pass legislation regulating the commercial use of biometric identifiers.
As technology advances, more weaknesses and vulnerabilities appear that hackers can use to take advantage of their victims, like phishing, voice hacking and more. Identity theft is one of the most damaging forms of cybercrime, and voice hacking is a subset of that. This kind of attack involves collecting or stealing audio samples that can … + Read More.
The year is 2017 and we continue to give advice on the process of creating passwords. This must stop. The phrase “These are the tips to creating a secure password” Read More. The post Password Management appeared first on PerezBox.
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
All of these attacks have similarities in terms of attack strategies, and a shift in focus to operational business disruption vs. data theft as the goal or leverage for monetizing the attack. First, the Mirai botnet, in late 2016, affected internet access for some hundreds of thousands of systems. The attack vector focused on home consumer devices, items that typically aren’t really configured securely, or administrated professionally.
The post Uber Does Not Equal The Valley appeared first on John Battelle's Search Blog. Now that the other shoe has dropped, and Uber’s CEO has been (somewhat) restrained, it’s time for the schadenfreude. Given Uber’s remarkable string of screwups and controversies, it’s coming in thick , in particular from the East coast. And while I believe Uber deserves the scrutiny — there are certainly critical lessons to be learned — the hot takes from many media outlets are starting to get lazy.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
The post Uber Does Not Equal The Valley appeared first on John Battelle's Search Blog. Now that the other shoe has dropped, and Uber’s CEO has been (somewhat) restrained, it’s time for the schadenfreude. Given Uber’s remarkable string of screwups and controversies, it’s coming in thick , in particular from the East coast. And while I believe Uber deserves the scrutiny — there are certainly critical lessons to be learned — the hot takes from many media outlets are starting to get lazy.
To hear some people tell it, the future of information governance is a complex, frightening place to ponder. The volume of information we have to deal with is exploding, the mix of technologies we need to keep track of is changing, and just what do we call all this, anyway?! Well, I have good news: […]. The post 5 Steps to Information Governance Success appeared first on Holly Group.
On June 20, 2017, the German Federal Ministry of Transport and Digital Infrastructure issued a report on the ethics of Automated and Connected Cars (the “Report”). The Report was developed by a multidisciplinary Ethics Commission established in September 2016 for the purpose of developing essential ethical guidelines for the use of automated and connected cars.
Startups are the innovation engine of the high-tech industry. Those who’ve participated in them have experienced the thrill and at times the disappointment of navigating uncharted territories of new ideas. Others have benefited from the fruits of these risk-takers’ labor by using the products they created. What’s it like to contribute at an early stage of a startup?
It’s only recently that I have grown a deeper appreciation for personal brands. Prior to 2010, the idea of establishing a personal brand was a foreign concept to me. In. Read More. The post Establish a Personal Brand appeared first on PerezBox.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
I am honored to share that ForAllSecure has been named to MIT Technology Review’s 2017 list of 50 Smartest Companies. According to the MIT Tech Review team, to make the list, a company must exhibit technological leadership and business acumen, which set them apart from competitors. Nanette Byrnes, senior editor for MIT Tech Review business shared: “Public and private, large and small, based in countries around the globe, this group of companies is creating new opportunities and pounc
On 5/17/2017 I presented to the Northern Virginia Chapter of ARMA on "Considerations for ERM Implementations". I created this talk with all the highlights I would make if I had only one shot to provide some lessons learned on ERM solution projects. Records Management is an essential component of every organization's Information Management capabilities.
When speaking of technology and information governance, we often are told that “if it ain’t broke, don’t fix it” – or in other words, don’t go looking for trouble where there isn’t any. But when it comes to disaster recovery and, especially, continuity of operations, I vehemently disagree. These two disciplines exist specifically to ensure […].
Recently, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP issued a white paper on Recommendations for Implementing Transparency, Consent and Legitimate Interest under the GDPR (the “White Paper”). The White Paper sets forth guidance and recommendations on the key concepts of transparency, consent and legitimate interest under the EU General Data Protection Regulation (“GDPR”).
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
DB2 12 for z/OS, which became generally available in October of 2016, delivered a number of key enhancements pertaining to SQL statements. Over the course of a few blog entries, I'll describe some of my favorites among these enhancements. This first post in the series will cover piece-wise DELETE. First, the backdrop: suppose you have a need to remove a large number of rows from a table, using SQL (I say, "using SQL," because a utility-based alternative, REORG with DISCARD, is not always feasibl
This post summarizes how prevalent encrypted web traffic interception is and how it negatively affects online security according to a study we published at NDSS 2017.
By: Andrew Hay. Unless you’ve been away from the Internet earlier this week, you’ve no doubt heard by now about the global ransomware outbreak that started in Ukraine and subsequently spread West across Western Europe, North America, and Australia yesterday. With similarities reminiscent to its predecessor WannaCry, this ransomware attack shut down organizations ranging from the Danish shipping conglomerate Maersk Line to a Tasmanian-based Cadbury chocolate factory.
Adopting instant payments doesn’t have to disrupt everything. shobana.lv@cgi.com. Fri, 06/30/2017 - 03:41. The world is moving to instant everything. In the payments arena, this means that the old world of multi-day or multi-intraday payment clearing is disappearing forever. This is great news for the consumer, but a major challenge for the bank, requiring expensive accommodation as part of an already crowded change agenda.
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
It all started in the beginning of the year. My school sent out a call to parents and guardians to see who would be interested in coming to our school’s career day. Guest speakers were sought to provide students with meaningful experiences that motivate and promote career/college readiness. There had already been curiosity centering on the media center.
On June 7, 2017, the European Commission published a paper signalling the EU’s intention to increase its role in directing cybersecurity policy and responses across its member states. The increasing threat posed by cyber attacks is highlighted in the EU Commission’s Reflection Paper on the Future of European Defence , which builds its case for closer union in respect of defense efforts.
In his book The New Know: Innovation Powered by Analytics, Thornton May explores the consequences of living and and business in the era of information abundance. His perspective is summarized in pdf of of the first chapter. I have written and spoken about the impact of information abundance for many years. By itself, info abundance is simply a positive spin on information overload.
By Ashton Morrow, Delta Airlines, June 6, 2017. Delta was honored with the Best Radio Frequency Identification Technology (RFID) Implementation award from RFID Journal in May. This award recognizes the airline’s industry-leading baggage handling strategy. It uses RFID chips embedded in individual bag tags to gather information throughout the bag’s journey, giving customers more transparency and reducing the number of mishandled bags. “It’s an incredible honor that Delta&
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
The Government of Canada has repealed the coming into force of the private right of action for violations of Canada’s Anti-Spam Legislation (CASL). The Government has listened to concerns raised by businesses, charities and the not-for-profit sector about the implementation of CASL, which would have permitted individuals to sue for violations of the law.
by Sylvie Rollason-Cass. Are you a public librarian interested in expanding your local history collections to include web archives? If so, you’re in luck! The Internet Archive is accepting applications from public librarians to participate in a program of continuing education, training, and services to enable public libraries to build collections of historically-valuable, web published materials documenting their local communities.
How to set up your multi-source integrator (MSI) for success. shobana.lv@cgi.com. Wed, 06/28/2017 - 02:53. As IT delivery evolves from an on-premises model to a hybrid model combining cloud and traditional IT, organizations are using a variety of sourcing approaches, from full outsourcing to multisourcing to brokerage. In my previous blog— Four things to look for in a multi-source services integrator (MSI) —I shared essential criteria to use when choosing an integrator for a multi-source IT serv
On June 26, 2017, Airway Oxygen, a provider of oxygen therapy and home medical equipment, reported that it was the subject of a ransomware attack affecting 500,000 patients’ protected health information. The attack is the second largest health data breach recorded by the Office for Civil Rights (“OCR”) this year, and the largest ransomware incident recorded by OCR since it began tracking incidents in 2009.
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
I am honored to share that ForAllSecure has been named to MIT Technology Review’s 2017 list of 50 Smartest Companies. According to the MIT Tech Review team, to make the list, a company must exhibit technological leadership and business acumen, which set them apart from competitors. Nanette Byrnes, senior editor for MIT Tech Review business shared: “Public and private, large and small, based in countries around the globe, this group of companies is creating new opportunities and pounc
By Diana Hage Delta’s announcement of its rollout of RFID for passenger baggage handling is aimed squarely at improving the customer experience of its travelers. Delta aims to reliably deliver every bag on every flight. By providing customers with improved real-time tracking of luggage throughout the travel experience, it will provide peace of mind, convenience, … Improving the Travel Experience Read More ».
How to protect and ensure the availability of long-term digital business information was a hot topic of conversation at three events Preservica attended in May. This theme is a clear reflection of the IGI 2017 Benchmark research, which revealed that 80% of companies aim to realize direct business value from their long-term digital information. The research validated that nearly all (90%) organizations must preserve and protect their vital information to meet with legal, statutory and regulatory
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content