June, 2017

article thumbnail

Governance is Always Never Having to Say You’re Sorry

Weissman's World

There’s a disturbing trend in the information governance profession that needs to stop now, namely the tendency to apologize for the work we’re doing. “Let me email that document to you.” – “I’m sorry, but please paste in the link to the digital document instead.” “I need to make a copy of this for my […]. The post Governance is <del>Always</del> Never Having to Say You’re Sorry appeared first on Holly Group.

article thumbnail

Washington Becomes Third State to Enact Biometric Privacy Law

Hunton Privacy

On May 16, 2017, the Governor of the State of Washington, Jay Inslee, signed into law House Bill 1493 (“H.B. 1493”), which sets forth requirements for businesses who collect and use biometric identifiers for commercial purposes. The law will become effective on July 23, 2017. With the enactment of H.B. 1493, Washington becomes the third state to pass legislation regulating the commercial use of biometric identifiers.

Privacy 87
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What You Need to Know About Voice Hacking

Productivity Bytes

As technology advances, more weaknesses and vulnerabilities appear that hackers can use to take advantage of their victims, like phishing, voice hacking and more. Identity theft is one of the most damaging forms of cybercrime, and voice hacking is a subset of that. This kind of attack involves collecting or stealing audio samples that can … + Read More.

article thumbnail

Password Management

PerezBox

The year is 2017 and we continue to give advice on the process of creating passwords. This must stop. The phrase “These are the tips to creating a secure password” Read More. The post Password Management appeared first on PerezBox.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

What do the Mirai botnet, the WannaCry ransomware blitz, and the EternalRocks worm have in common?

Outpost24

All of these attacks have similarities in terms of attack strategies, and a shift in focus to operational business disruption vs. data theft as the goal or leverage for monetizing the attack. First, the Mirai botnet, in late 2016, affected internet access for some hundreds of thousands of systems. The attack vector focused on home consumer devices, items that typically aren’t really configured securely, or administrated professionally.

More Trending

article thumbnail

5 Steps to Information Governance Success

Weissman's World

To hear some people tell it, the future of information governance is a complex, frightening place to ponder. The volume of information we have to deal with is exploding, the mix of technologies we need to keep track of is changing, and just what do we call all this, anyway?! Well, I have good news: […]. The post 5 Steps to Information Governance Success appeared first on Holly Group.

article thumbnail

Germany Issues Ethics Report on Automated and Connected Cars

Hunton Privacy

On June 20, 2017, the German Federal Ministry of Transport and Digital Infrastructure issued a report on the ethics of Automated and Connected Cars (the “Report”). The Report was developed by a multidisciplinary Ethics Commission established in September 2016 for the purpose of developing essential ethical guidelines for the use of automated and connected cars.

Privacy 66
article thumbnail

Uber Does Not Equal The Valley

John Battelle's Searchblog

The post Uber Does Not Equal The Valley appeared first on John Battelle's Search Blog. Now that the other shoe has dropped, and Uber’s CEO has been (somewhat) restrained, it’s time for the schadenfreude. Given Uber’s remarkable string of screwups and controversies, it’s coming in thick , in particular from the East coast. And while I believe Uber deserves the scrutiny — there are certainly critical lessons to be learned — the hot takes from many media outlets are starting to get lazy.

IT 55
article thumbnail

What’s It Like to Join a Startup’s Executive Team?

Lenny Zeltser

Startups are the innovation engine of the high-tech industry. Those who’ve participated in them have experienced the thrill and at times the disappointment of navigating uncharted territories of new ideas. Others have benefited from the fruits of these risk-takers’ labor by using the products they created. What’s it like to contribute at an early stage of a startup?

IT 53
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Establish a Personal Brand

PerezBox

It’s only recently that I have grown a deeper appreciation for personal brands. Prior to 2010, the idea of establishing a personal brand was a foreign concept to me. In. Read More. The post Establish a Personal Brand appeared first on PerezBox.

IT 53
article thumbnail

DB2 12 for z/OS SQL Enhancements: Piece-Wise DELETE

Robert's Db2

DB2 12 for z/OS, which became generally available in October of 2016, delivered a number of key enhancements pertaining to SQL statements. Over the course of a few blog entries, I'll describe some of my favorites among these enhancements. This first post in the series will cover piece-wise DELETE. First, the backdrop: suppose you have a need to remove a large number of rows from a table, using SQL (I say, "using SQL," because a utility-based alternative, REORG with DISCARD, is not always feasibl

IT 48
article thumbnail

If It Ain’t Broke, Fix it Anyway

Weissman's World

When speaking of technology and information governance, we often are told that “if it ain’t broke, don’t fix it” – or in other words, don’t go looking for trouble where there isn’t any. But when it comes to disaster recovery and, especially, continuity of operations, I vehemently disagree. These two disciplines exist specifically to ensure […].

IT 120
article thumbnail

CIPL Issues Recommendations for Implementing Transparency, Consent and Legitimate Interest under the GDPR

Hunton Privacy

Recently, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP issued a white paper on Recommendations for Implementing Transparency, Consent and Legitimate Interest under the GDPR (the “White Paper”). The White Paper sets forth guidance and recommendations on the key concepts of transparency, consent and legitimate interest under the EU General Data Protection Regulation (“GDPR”).

GDPR 63
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Understanding the prevalence of web traffic interception

Elie

This post summarizes how prevalent encrypted web traffic interception is and how it negatively affects online security according to a study we published at NDSS 2017.

article thumbnail

Considerations for ERM Implementations

JKevinParker

On 5/17/2017 I presented to the Northern Virginia Chapter of ARMA on "Considerations for ERM Implementations". I created this talk with all the highlights I would make if I had only one shot to provide some lessons learned on ERM solution projects. Records Management is an essential component of every organization's Information Management capabilities.

article thumbnail

Adopting instant payments doesn’t have to disrupt everything

CGI

Adopting instant payments doesn’t have to disrupt everything. shobana.lv@cgi.com. Fri, 06/30/2017 - 03:41. The world is moving to instant everything. In the payments arena, this means that the old world of multi-day or multi-intraday payment clearing is disappearing forever. This is great news for the consumer, but a major challenge for the bank, requiring expensive accommodation as part of an already crowded change agenda.

IT 45
article thumbnail

Petya Ransomware: What You Need to Know and Do

Andrew Hay

By: Andrew Hay. Unless you’ve been away from the Internet earlier this week, you’ve no doubt heard by now about the global ransomware outbreak that started in Ukraine and subsequently spread West across Western Europe, North America, and Australia yesterday. With similarities reminiscent to its predecessor WannaCry, this ransomware attack shut down organizations ranging from the Danish shipping conglomerate Maersk Line to a Tasmanian-based Cadbury chocolate factory.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Records Management Outreach to Elementary Schools and Colleges

The Schedule

It all started in the beginning of the year. My school sent out a call to parents and guardians to see who would be interested in coming to our school’s career day. Guest speakers were sought to provide students with meaningful experiences that motivate and promote career/college readiness. There had already been curiosity centering on the media center.

article thumbnail

European Commission Pushes for Greater EU Role in Cybersecurity

Hunton Privacy

On June 7, 2017, the European Commission published a paper signalling the EU’s intention to increase its role in directing cybersecurity policy and responses across its member states. The increasing threat posed by cyber attacks is highlighted in the EU Commission’s Reflection Paper on the Future of European Defence , which builds its case for closer union in respect of defense efforts.

article thumbnail

Relevancy – the killer app

Attensa

In his book The New Know: Innovation Powered by Analytics, Thornton May explores the consequences of living and and business in the era of information abundance. His perspective is summarized in pdf of of the first chapter. I have written and spoken about the impact of information abundance for many years. By itself, info abundance is simply a positive spin on information overload.

article thumbnail

Delta’s RFID baggage initiative wins industry award

RFID Global Solution, Inc.

By Ashton Morrow, Delta Airlines, June 6, 2017. Delta was honored with the Best Radio Frequency Identification Technology (RFID) Implementation award from RFID Journal in May. This award recognizes the airline’s industry-leading baggage handling strategy. It uses RFID chips embedded in individual bag tags to gather information throughout the bag’s journey, giving customers more transparency and reducing the number of mishandled bags. “It’s an incredible honor that Delta&

IT 45
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

How to set up your multi-source integrator (MSI) for success

CGI

How to set up your multi-source integrator (MSI) for success. shobana.lv@cgi.com. Wed, 06/28/2017 - 02:53. As IT delivery evolves from an on-premises model to a hybrid model combining cloud and traditional IT, organizations are using a variety of sourcing approaches, from full outsourcing to multisourcing to brokerage. In my previous blog— Four things to look for in a multi-source services integrator (MSI) —I shared essential criteria to use when choosing an integrator for a multi-source IT serv

article thumbnail

Why ForAllSecure Is On MIT Technology Review's 2017 List Of Smartest Companies

ForAllSecure

I am honored to share that ForAllSecure has been named to MIT Technology Review’s 2017 list of 50 Smartest Companies. According to the MIT Tech Review team, to make the list, a company must exhibit technological leadership and business acumen, which set them apart from competitors. Nanette Byrnes, senior editor for MIT Tech Review business shared: “Public and private, large and small, based in countries around the globe, this group of companies is creating new opportunities and pounc

article thumbnail

Digital preservation high on the agenda at recent Information Governance and Records Management conferences

Preservica

How to protect and ensure the availability of long-term digital business information was a hot topic of conversation at three events Preservica attended in May. This theme is a clear reflection of the IGI 2017 Benchmark research, which revealed that 80% of companies aim to realize direct business value from their long-term digital information. The research validated that nearly all (90%) organizations must preserve and protect their vital information to meet with legal, statutory and regulatory

article thumbnail

Ransomware Health Data Breach Affects 500,000 Patients

Hunton Privacy

On June 26, 2017, Airway Oxygen, a provider of oxygen therapy and home medical equipment, reported that it was the subject of a ransomware attack affecting 500,000 patients’ protected health information. The attack is the second largest health data breach recorded by the Office for Civil Rights (“OCR”) this year, and the largest ransomware incident recorded by OCR since it began tracking incidents in 2009.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

More but not better jobs

MIKE 2.0

The future of work is the topic on everyone’s lips. We’ve gone from worrying about whether our children will have jobs to worrying about our own place in the workforce. The rise of artificial intelligence and robotics has been at the upper end of twenty first century predictions. Everyone wants to know whether automation will trigger a massive cut in jobs.

article thumbnail

Improving the Travel Experience

RFID Global Solution, Inc.

By Diana Hage Delta’s announcement of its rollout of RFID for passenger baggage handling is aimed squarely at improving the customer experience of its travelers. Delta aims to reliably deliver every bag on every flight. By providing customers with improved real-time tracking of luggage throughout the travel experience, it will provide peace of mind, convenience, … Improving the Travel Experience Read More ».

article thumbnail

New CGI-sponsored research covers key trends and issues in adopting instant payments

CGI

New CGI-sponsored research covers key trends and issues in adopting instant payments. harini.kottees…. Fri, 06/23/2017 - 07:27. Every year at CGI, we conduct research on the services banks offer their customers—whether consumers or corporates—comparing the customer’s perspective with that of the bank. This year, we sponsored additional research focused specifically on payments.