September, 2017

article thumbnail

The case for delaying the date the GDPR applies for a couple more years

Data Protector

A huge percentage of the organisations I’ve recently come into contact with have little chance of becoming “GDPR compliant” by May 2018. To be fair, a good proportion of these organisations have spent the past decade or so ignoring the professional advice that's available on how to better comply with the requirements of the existing data protection legislation.

GDPR 149
article thumbnail

Is Your Information Governance Mostly Sound and Fury?

Weissman's World

“It is a tale told by an idiot, full of sound and fury, signifying nothing.” Shakespeare penned these words as a metaphor for life (Macbeth, Act V, Scene V), but they relate equally well to information governance in that organizations often spend more time arguing over the particulars than actually doing much about them. This […]. The post Is Your Information Governance Mostly Sound and Fury?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tips for Reverse-Engineering Malicious Code

Lenny Zeltser

This cheat sheet outlines tips for reversing malicious Windows executables via static and dynamic code analysis with the help of a debugger and a disassembler. To print it, use the one-page PDF version; you can also edit the Word version to customize it for you own needs. Overview of the Code Analysis Process. Examine static properties of the Windows executable for initial assessment and triage.

Access 111
article thumbnail

Exposing the inner-workings of the ransomware economy

Elie

This blog post shed light on the inner workings of the ransomsphere economics and exposes which cybercriminal groups are the biggest earners. This is the second blog post in my series about ransomware economics. The first post. is dedicated to the methodology and techniques needed to trace ransomware payments end-to-end. As this post builds on that methodology, I encourage you to read through the first post if you haven’t done so.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Learning Machine Learning? Six articles you don’t want to miss

IBM Big Data Hub

Digital disruption has revolutionized the way we live and do business — and machine learning is the latest wave of that revolution.

108
108

More Trending

article thumbnail

The future for “free” Subject Access Requests

Data Protector

Parliamentarians will soon be debating the merits of the Data Protection Bill, and I’m wondering whether much consideration will be given to the implications of the proposal to gift citizens with “free” Subject Access Requests. What parliamentarian might oppose such a measure? After all, what’s not to like about “free” stuff? But hang on a minute. This stuff is not “free”.

Access 120
article thumbnail

The Time is ‘Before’ to Cope with Hurricane-Related Storms of Forms

Weissman's World

Even though the physical storms are now largely scary, soggy memories, hurricanes Harvey and Irma will swamp many information professionals for months to come as a torrent of claim forms pours across their desks. Those who deal in paper will find themselves especially hard-pressed to keep up, not only because of the high volume of […]. The post The Time is ‘Before’ to Cope with Hurricane-Related Storms of Forms appeared first on Holly Group.

Paper 120
article thumbnail

The tide is starting to turn against the world’s digital giants | John Naughton

The Guardian Data Protection

Multimillion fines are just the start for Facebook and Google, as the world comes to realise how political big tech has become In his wonderful book The Swerve: How the Renaissance Began , the literary historian Stephen Greenblatt traces the origins of the Renaissance back to the rediscovery of a 2,000-year-old poem by Lucretius, De Rerum Natura (On the Nature of Things).

Big data 100
article thumbnail

Webinar: Simple Ways to Turn Your Records Liaisons Into Records Ambassadors

The Texas Record

In July, some staff were fortunate enough to attend the annual NAGARA Conference in Boise, ID. One of the sessions we attended was a presentation by Holly Dolan, Assistant Manager of Records Management for Denton County. We were very impressed by the presentation and the work Denton County has done for improving outreach and promoting awareness of records management.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

When faster data science moves the world

IBM Big Data Hub

Learn how the IBM Integrated Analytics System, a unified data platform built on the IBM Common SQL Engine, helps do data science faster with high performance, embedded machine learning capabilities and built-in tools for data scientists to deliver analytics critical to increasing your organization’s competitiveness.

article thumbnail

How to reduce costs during a corporate file move

TAB OnRecord

Along with mergers and acquisitions, corporate moves are one of the biggest challenges a records management team can face. The thought of organizing, packing, and re-shelving entire record collections is one that sends a chill down the spine of most records managers. It's a good thing corporate moves don't come around that often! The silver… Read More.

article thumbnail

How many audit controls does an organisation need to establish to show that it takes data protection seriously?

Data Protector

Whenever I visit a clinic for a health check, I’m asked a slightly different set of questions. Each clinic is very professionally run, and, until recently I haven’t been unduly concerned that the same questions aren’t always asked. I’ve generally been healthy, so I guess there was never any real need for the medical profession to probe too deeply. So, why should I be worried about different questions being asked about data protection?

GDPR 120
article thumbnail

UK Government Introduces Draft Data Protection Bill to Parliament

Hunton Privacy

On September 14, 2017, the UK Government introduced a new Data Protection Bill (the “Bill”) to Parliament. The Bill is intended to replace the UK’s existing Data Protection Act 1998 and enshrine the EU General Data Protection Regulation (the “GDPR”) into UK law once the UK has left the European Union. The GDPR allows EU Member States to enact, via national law, exemptions from the various provisions of the GDPR, which the Bill also seeks to implement.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

It’s one rule for big data, another for its victims | John Naughton

The Guardian Data Protection

The massive – and avoidable – data breach at credit agency Equifax has left millions of consumers at risk, but don’t expect anyone to be held to account Last week, much of the tech world was temporarily unhinged by a circus in Cupertino , where a group of ageing hipster billionaires unveiled some impressive technology while miming the argot of teenage fandom (incredible, amazing, awesome, etc) and pretending that they were changing the world.

article thumbnail

FAQ: Are text messages records? (redux)

The Texas Record

It’s been almost 6 years since we addressed this question originally. In that time, the popularity of text messaging (“texting”) has skyrocketed while awareness that text messages (“texts”) are potentially government records has increased very little. Here we go again! The definition of a government record in Texas is media neutral. A record is defined by its content, not what it’s recorded on.

article thumbnail

How to succeed in the multi-cloud era

IBM Big Data Hub

In a time when data is perhaps a business’s most valuable resource, the ability to access, protect and analyze information plays a critical role in an organization’s overall multi-cloud strategy. Here's how to succeed.

Cloud 90
article thumbnail

Mergers and acquisitions: How to take inventory of the target company’s records collections

TAB OnRecord

In last week’s blog post, we looked at a set of questions to help you evaluate the state of the RIM program in the target company involved in a merger or acquisition. The questions focused on assessing the current state of the program as well as any gaps or risks that might jeopardize the success… Read More. The post Mergers and acquisitions: How to take inventory of the target company’s records collections appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Scrutinising the Data Protection Bill: The case for a Keeling Schedule

Data Protector

Parliamentarians who are tasked with scrutinising the Data Protection Bill have an inenviable job. Can there be a less desirable appointment than siting on a Parliamentary Committee, scrutinising text that many seasoned data protection professionals have thrown their arms up in the air in despair over? Given that the Bill is intended to last a generation, (the current Act will have lasted 20 years by the time of its repeal) , surely we deserve something we can more readily understand.

article thumbnail

Court Imposes Adverse Inference for Failure to Preserve Non-Party’s Text Messages within Defendants’ “Control”

eDiscovery Law

Ronnie Van Zant, Inc. v. Pyle, No. 17 Civ. 3360 (RWS), 2017 WL 3721777 (S.D.N.Y. Aug. 28, 2017). In this case, the court imposed an adverse inference against certain defendants for their failure to preserve text messages in the possession of a non-party, where the court found that the defendants had control of the non-party’s text messages, citing the non-party’s close working relationship with the defendants, his prior participation in the litigation ( e.g. , by providing documents, etc.), and

article thumbnail

Getting your data out of Tinder is hard. It shouldn't be | Paul-Olivier Dehaye

The Guardian Data Protection

If you’re not a journalist or a privacy advocate, convincing big tech to release your data is almost impossible. But hope is coming with the EU’s General Data Protection Regulation I asked Tinder for my data. It sent me 800 pages of my deepest, darkest secrets When a journalist approached me to help her get a copy of her personal data from Tinder, I knew this would be a good story.

IT 89
article thumbnail

2016 Annual RM Report Released

National Archives Records Express

We are pleased to announce the publication of the National Archives and Records Administration’s Federal Agency Records Management Annual Report, 2016. . In 2016, we required Federal agencies to submit three reports: The annual Senior Agency Official for Records Management (SAORM) Report, the annual Records Management Self-Assessment (RMSA), and a supplemental Federal Email Management Report.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Transforming a city with data and insight

IBM Big Data Hub

For the first time in human experience, there’s the opportunity to transform a city by listening to all of its inhabitants, individually. That’s the mission of the Jakarta Smart City (JSC) project, and it’s a major challenge in a district of some 10 million residents.

IT 81
article thumbnail

Reader favorites September 2017: Our most popular RIM resources

TAB OnRecord

The most popular RIM resources this month will help your efforts to go digital. Our buyer's guide helps you choose the best RIM software to capture and store your digital images. To help you plan the project, we have two helpful resources. The first is a comprehensive document imaging planning guide; the second is a… Read More. The post Reader favorites September 2017: Our most popular RIM resources appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Progress on Draft ePrivacy Regulation – EU Council Publishes Proposed Amendments

Hunton Privacy

On September 8, 2017, the Council of the European Union published its proposed revisions to the draft E-Privacy Regulation (“EPR”), which was first published by the European Commission in January 2016. The revisions have been made based on written comments and discussions involving the Working Party for Telecommunications and Information Society (“WP TELE”) and serve as a discussion for further meetings of the group in late September 2017.

Paper 56
article thumbnail

Court: Production of Hard Copy Versions of Documents Also Kept As ESI Does Not “Run Afoul” of Rule 34

eDiscovery Law

Ortega v. Mgmt. & Training Corp., NO. 16-cv-0665 MV/SMV, 2017 WL 3588818 (D.N.M. Jan. 1, 2017). In this case, Plaintiff sought to compel native/electronic production of documents previously produced in hard copy. Defendant claimed that the documents in question were “ordinarily kept by Defendant both electronically and in hard copy” and produced only the hard copy format.

IT 58
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Charities need help to get to grips with data protection changes | Daniel Fluskey

The Guardian Data Protection

A fifth of charities haven’t yet started to think about the biggest change in years to data protection. We want the government to step in A worrying number of UK charities are yet to take any steps to prepare for the new UK law on data protection. Our survey of more than 300 UK charities shows that most are taking action to prepare for the new general data protection regulation (GDPR), which comes into effect in May 2018, with major new requirements for how organisations process personal data.

GDPR 81
article thumbnail

Hurricane Redux: Hurricane Maria Targets Puerto Rico, USVI, and Threatens Mainland U.S.

National Archives Records Express

As Hurricane Maria, now a Category 5 hurricane, bears down on Puerto Rico and U.S. Virgin Islands, before possibly turning northeast and threatening the east coast of the U.S, we again remind Agency Records Officers that NARA posts records emergency information and other useful guidance to pass along to other agency personnel. This information is also still relevant for any Federal agencies that experienced damage to their records as a result of Hurricanes Harvey and Irma.

article thumbnail

Accelerating time-to-market with fabricated test data

IBM Big Data Hub

Protecting personal and sensitive data is vital. But, understanding the regulatory environment and available tools is just the first step. There are still challenges when building and managing test data environments. Here's how to overcome them.