IoT's moment of truth -- who can secure the data flows?
Collaboration 2.0
OCTOBER 27, 2016
Innovative Internet of Things efforts need the maturity and experience of industrial internet service providers to secure data platforms and drive growth.
Collaboration 2.0
OCTOBER 27, 2016
Innovative Internet of Things efforts need the maturity and experience of industrial internet service providers to secure data platforms and drive growth.
Data Protector
OCTOBER 30, 2016
Let’s think the unthinkable. Lets assume that, post Brexit, the British Government has an opportunity to decide how its data protection legislation should reflect the requirements of an aspiring British economy. And let’s assume that the Minister with responsibility for Data Protection asks for options about trimming back those elements of the General Data Protection Regulation that are unduly burdensome and, in practice, actually do very little to safeguard fundamental human rights.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
John Battelle's Searchblog
OCTOBER 22, 2016
The post Google Capitulates to Facebook’s Identity Machine: Is This Good News For The Open Web? appeared first on John Battelle's Search Blog. Long time readers of this site know that once a year I make predictions, and revisit those I made the year before. But it’s not often I look back farther than one year to see if perhaps I was just a tad too early.
Hunton Privacy
OCTOBER 19, 2016
On October 19, 2016, the Federal Deposit Insurance Corporation (“FDIC”), the Federal Reserve System (the “Fed”) and Office of the Comptroller of the Currency issued an advance notice of proposed rulemaking suggesting new cybersecurity regulations for banks with assets totaling more than $50 billion (the “Proposed Standards”). The Proposed Standards address five categories of cybersecurity: cyber risk governance; cyber risk management; internal dependency management; external dependency managemen
Advertiser: ZoomInfo
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
PerezBox
OCTOBER 23, 2016
The concept of Defense in Depth is not new. It’s been leveraged in the InfoSec domain for a long time, and has it’s roots deeply embedded in military strategy and. Read More. The post Defense in Depth And Website Security appeared first on PerezBox.
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Preservica
OCTOBER 7, 2016
The month of October marks American Archives Month (#AmericanArchivesMonth) across the US that recognizes the collaborative efforts of archiving professionals and repositories across North America, highlighting the importance of preserving historic records for generations to come. Throughout October, events will take place across the US to celebrate the unique and valuable collections stored in archives.
Data Protector
OCTOBER 29, 2016
Given what can only be described as an omnishambles of security breaches, is there much more that the ICO can do to warn data controllers of the risks they should take account of? Probably not. What might be helpful though, is data controllers refreshing their memories about the guidance which has emerged from the ICO over the past few years. In terms of the top 7 ICO publications, (virtual) copies of the following guides really ought to be at every DPO’s fingertips: 7.
CGI
OCTOBER 20, 2016
Customer enablement and mobility: How consumers are driving digital transformation within the utilities industry. shobana.lv@cgi.com. Thu, 10/20/2016 - 08:06. The digital transformation of personal entertainment and communications has made consumers increasingly comfortable with digital tools and platforms. To the consumer, it’s iTunes Match, Google Drive, Apple TV and Pokemon GO.
Hunton Privacy
OCTOBER 7, 2016
On October 4, 2016, the U.S. Department of Defense (“DoD”) finalized its rule implementing the mandatory cyber incident reporting requirements for defense contractors under 10 U.S.C. §§ 391 and 393 (the “Rule”). The Rule applies to DoD contractors and subcontractors that are targets of any cyber incident with a potential adverse impact on information systems and “covered defense information” on those systems.
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
JKevinParker
OCTOBER 13, 2016
See also: My Reflections on the 2016 InfoGovCon. I was honored at the 2016 Information Governance Conference to be named InfoGov Expert of the Year. This award is for "an Information Governance leader who has demonstrated leading expertise in 2016." Thank you so much to all who voted for me this year! Thank you also to Information Coalition and InfoGovCon.
Robert's Db2
OCTOBER 31, 2016
Some relatively recent developments have plenty of people asking, "How should my applications that connect to a z/OS server via a network link access DB2 for z/OS data?" In writing today I hope to provide some information that will be useful to folks pondering this question. I'll organize my thoughts on the matter around two key questions. z/OS Connect or DB2 Connect?
Elie
OCTOBER 20, 2016
In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.
PerezBox
OCTOBER 4, 2016
Last week I spent a few days in beautiful Dublin, Ireland for DrupalCon Europe 2016. I had the opportunity to present a new presentation in which I try to introduce. Read More. The post DrupalCon Europe 2016 – Building a Security Framework for Your Websites appeared first on PerezBox.
Advertisement
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Privacy and Cybersecurity Law
OCTOBER 27, 2016
The Canadian Radio-television and Telecommunications Commission (CRTC) has issued its first Compliance and Enforcement Decision* under Canada’s Anti-Spam Law (CASL). The Commission […].
Hunton Privacy
OCTOBER 19, 2016
On October 19, 2016, the Court of Justice of the European Union (the “CJEU”) issued its judgment in Patrick Breyer v. Bundesrepublik Deutschland , following the Opinion of Advocate General Manuel Campos Sánchez-Bordona on May 12, 2016. The CJEU followed the Opinion of the Advocate General and declared that a dynamic IP address registered by a website operator must be treated as personal data by that operator to the extent that the user’s Internet service provider (“ISP”) has &#
CGI
OCTOBER 24, 2016
It’s time to take the ‘A’ out of A&E. Anonymous. Mon, 10/24/2016 - 03:00. Improving access to healthcare is one of the biggest challenges facing the NHS. Wide variations in demand make it hard for trusts to predict and provide cover. In winter, the growing toll of seasonal illness multiplies the burden on overstretched resources. Outbreaks of viral and microbial pathogens can shut hospitals to admissions for weeks at a time.
RFID Global Solution, Inc.
OCTOBER 18, 2016
Reston, VA, Oct 18, 2016. U.S. Army Grants RFID Global’s Visi-Trac Software Certificate of Networthiness and Authority to Operate. Affirms Visi-Trac’s Status as Approved DoD Inventory Management System. RFID Global Solution, Inc., a leading provider of asset management solutions for the U.S. Department of Defense, recently announced that its Visi-Trac 3.x enterprise software has been awarded a Certificate of Networthiness (CoN # 201620336, CoN Type: Enterprise) and Authority to Operate (ATO) by
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Elie
OCTOBER 17, 2016
In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.
PerezBox
OCTOBER 18, 2016
This morning I had the privilege of speaking at the Higher Education Web Professionals Association (HighEdWeb) annual conference. I took the opportunity to share a number of points around the. Read More. The post Accounting for Website Security in Higher Education appeared first on PerezBox.
Privacy and Cybersecurity Law
OCTOBER 7, 2016
The United States (US) Department of Homeland Security (DHS) and Office of the Director of National Intelligence (ODNI) issued a […].
Hunton Privacy
OCTOBER 18, 2016
Recently, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP, a privacy and information policy think tank based in Brussels, London and Washington, D.C., and Telefónica, one of the largest telecommunications company in the world, issued a joint white paper on Reframing Data Transparency (the “white paper”). The white paper was the outcome of a June 2016 roundtable held by the two organizations in London, in which senior business leaders, Data Privacy Officers, la
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
CGI
OCTOBER 21, 2016
Current challenges in fighting financial crime – Part 2. shobana.lv@cgi.com. Fri, 10/21/2016 - 02:27. In part one of this two-part blog on fighting financial crime, we talked about the factors that are converging to make the battle against financial crime more complex and costly in today’s financial world. In part two, we’ll talk about a new approach that tackles these challenges, helping financial institutions to not only achieve higher levels of security but also create competitive advantage.
Managing Your Information
OCTOBER 21, 2016
The Current Situation. As many of us will already know, if we use personal information we are likely to be subject to data protection laws that govern the way in which we are able to use that information. Whether we have a simple contacts and appointments book as a self-employed or freelance worker, post pictures on social media promoting our business or charity, or have many thousands of individual client records within a large business, we are likely to be required to comply with the Data Pro
Hunton Privacy
OCTOBER 17, 2016
On October 13, 2016, Elizabeth Denham, the UK Information Commissioner, suggested that directors of companies who violate data protection laws should be personally liable to pay fines at a House of Commons Public Bill Committee meeting when discussing the latest draft of the Digital Economy Bill (the “Bill”). The Bill is designed to enable businesses and individuals to access fast, digital communications services, promote investment in digital communications infrastructure and support the “digit
Hunton Privacy
OCTOBER 5, 2016
In September, the Centre for Information Policy Leadership (“CIPL”) held its second GDPR Workshop in Paris as part of its two-year GDPR Implementation Project. The purpose of the project is to provide a forum for stakeholders to promote EU-wide consistency in implementing the GDPR, encourage forward-thinking and future-proof interpretations of key GDPR provisions, develop and share relevant best practices, and foster a culture of trust and collaboration between regulators and industry. .
Advertisement
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
Hunton Privacy
OCTOBER 31, 2016
On October 7, 2016, the French Digital Republic Bill (the “Bill”) was enacted after a final vote from the Senate. The Bill aligns the French legal data protection framework with the EU General Data Protection Regulation (“GDPR”) requirements before the GDPR becomes applicable in May 2018. Increased Fines. The Bill significantly increases the maximum level of fines for violations of the French Data Protection Act.
Hunton Privacy
OCTOBER 28, 2016
Recently, the Cyberspace Administration of China published for public comment a draft of the Regulations on the Online Protection of Minors (“Draft Regulations”). The Draft Regulations are open for comment until October 31, 2016. The Draft Regulations stipulate certain requirements are applicable to the online collection and use of personal information of minors.
Hunton Privacy
OCTOBER 26, 2016
On October 25, 2016, the Federal Trade Commission released a guide for businesses on how to handle and respond to data breaches (the “Guide”). The 16-page Guide details steps businesses should take once they become aware of a potential breach. The Guide also underscores the need for cyber-specific insurance to help offset potentially significant response costs.
Let's personalize your content