October, 2016

article thumbnail

My 7 top security publications from the ICO

Data Protector

Given what can only be described as an omnishambles of security breaches, is there much more that the ICO can do to warn data controllers of the risks they should take account of? Probably not. What might be helpful though, is data controllers refreshing their memories about the guidance which has emerged from the ICO over the past few years. In terms of the top 7 ICO publications, (virtual) copies of the following guides really ought to be at every DPO’s fingertips: 7.

Security 120
article thumbnail

Google Capitulates to Facebook’s Identity Machine: Is This Good News For The Open Web?

John Battelle's Searchblog

The post Google Capitulates to Facebook’s Identity Machine: Is This Good News For The Open Web? appeared first on John Battelle's Search Blog. Long time readers of this site know that once a year I make predictions, and revisit those I made the year before. But it’s not often I look back farther than one year to see if perhaps I was just a tad too early.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IoT's moment of truth -- who can secure the data flows?

Collaboration 2.0

Innovative Internet of Things efforts need the maturity and experience of industrial internet service providers to secure data platforms and drive growth.

IoT 111
article thumbnail

Federal Regulators Propose New Cybersecurity Rule for Big Banks

Hunton Privacy

On October 19, 2016, the Federal Deposit Insurance Corporation (“FDIC”), the Federal Reserve System (the “Fed”) and Office of the Comptroller of the Currency issued an advance notice of proposed rulemaking suggesting new cybersecurity regulations for banks with assets totaling more than $50 billion (the “Proposed Standards”). The Proposed Standards address five categories of cybersecurity: cyber risk governance; cyber risk management; internal dependency management; external dependency managemen

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Defense in Depth And Website Security

PerezBox

The concept of Defense in Depth is not new. It’s been leveraged in the InfoSec domain for a long time, and has it’s roots deeply embedded in military strategy and. Read More. The post Defense in Depth And Website Security appeared first on PerezBox.

More Trending

article thumbnail

In celebration of American Archives Month

Preservica

The month of October marks American Archives Month (#AmericanArchivesMonth) across the US that recognizes the collaborative efforts of archiving professionals and repositories across North America, highlighting the importance of preserving historic records for generations to come. Throughout October, events will take place across the US to celebrate the unique and valuable collections stored in archives.

article thumbnail

How Should Your Network-Attached Applications Access DB2 for z/OS?

Robert's Db2

Some relatively recent developments have plenty of people asking, "How should my applications that connect to a z/OS server via a network link access DB2 for z/OS data?" In writing today I hope to provide some information that will be useful to folks pondering this question. I'll organize my thoughts on the matter around two key questions. z/OS Connect or DB2 Connect?

Access 48
article thumbnail

Customer enablement and mobility: How consumers are driving digital transformation within the utilities industry

CGI

Customer enablement and mobility: How consumers are driving digital transformation within the utilities industry. shobana.lv@cgi.com. Thu, 10/20/2016 - 08:06. The digital transformation of personal entertainment and communications has made consumers increasingly comfortable with digital tools and platforms. To the consumer, it’s iTunes Match, Google Drive, Apple TV and Pokemon GO.

article thumbnail

Department of Defense Finalizes Rule for Cyber Incident Reporting

Hunton Privacy

On October 4, 2016, the U.S. Department of Defense (“DoD”) finalized its rule implementing the mandatory cyber incident reporting requirements for defense contractors under 10 U.S.C. §§ 391 and 393 (the “Rule”). The Rule applies to DoD contractors and subcontractors that are targets of any cyber incident with a potential adverse impact on information systems and “covered defense information” on those systems.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

2016 InfoGov Expert of the Year Award

JKevinParker

See also: My Reflections on the 2016 InfoGovCon. I was honored at the 2016 Information Governance Conference to be named InfoGov Expert of the Year. This award is for "an Information Governance leader who has demonstrated leading expertise in 2016." Thank you so much to all who voted for me this year! Thank you also to Information Coalition and InfoGovCon.

article thumbnail

Full(er) House: Exposing high-end poker cheating devices

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

DrupalCon Europe 2016 – Building a Security Framework for Your Websites

PerezBox

Last week I spent a few days in beautiful Dublin, Ireland for DrupalCon Europe 2016. I had the opportunity to present a new presentation in which I try to introduce. Read More. The post DrupalCon Europe 2016 – Building a Security Framework for Your Websites appeared first on PerezBox.

article thumbnail

US Army Grants Visi-Trac Software Certificate of Networthiness

RFID Global Solution, Inc.

Reston, VA, Oct 18, 2016. U.S. Army Grants RFID Global’s Visi-Trac Software Certificate of Networthiness and Authority to Operate. Affirms Visi-Trac’s Status as Approved DoD Inventory Management System. RFID Global Solution, Inc., a leading provider of asset management solutions for the U.S. Department of Defense, recently announced that its Visi-Trac 3.x enterprise software has been awarded a Certificate of Networthiness (CoN # 201620336, CoN Type: Enterprise) and Authority to Operate (ATO) by

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

It’s time to take the ‘A’ out of A&E

CGI

It’s time to take the ‘A’ out of A&E. Anonymous. Mon, 10/24/2016 - 03:00. Improving access to healthcare is one of the biggest challenges facing the NHS. Wide variations in demand make it hard for trusts to predict and provide cover. In winter, the growing toll of seasonal illness multiplies the burden on overstretched resources. Outbreaks of viral and microbial pathogens can shut hospitals to admissions for weeks at a time.

article thumbnail

CJEU Rules That Dynamic IP Addresses Are Personal Data

Hunton Privacy

On October 19, 2016, the Court of Justice of the European Union (the “CJEU”) issued its judgment in Patrick Breyer v. Bundesrepublik Deutschland , following the Opinion of Advocate General Manuel Campos Sánchez-Bordona on May 12, 2016. The CJEU followed the Opinion of the Advocate General and declared that a dynamic IP address registered by a website operator must be treated as personal data by that operator to the extent that the user’s Internet service provider (“ISP”) has &#

article thumbnail

US Officially Blames Russia For DNC Hack

Privacy and Cybersecurity Law

The United States (US) Department of Homeland Security (DHS) and Office of the Director of National Intelligence (ODNI) issued a […].

article thumbnail

Predicting Hearthstone game outcome with machine learning

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Accounting for Website Security in Higher Education

PerezBox

This morning I had the privilege of speaking at the Higher Education Web Professionals Association (HighEdWeb) annual conference. I took the opportunity to share a number of points around the. Read More. The post Accounting for Website Security in Higher Education appeared first on PerezBox.

article thumbnail

Laws on Using Personal Information Are Changing. Are You Ready?

Managing Your Information

The Current Situation. As many of us will already know, if we use personal information we are likely to be subject to data protection laws that govern the way in which we are able to use that information. Whether we have a simple contacts and appointments book as a self-employed or freelance worker, post pictures on social media promoting our business or charity, or have many thousands of individual client records within a large business, we are likely to be required to comply with the Data Pro

GDPR 28
article thumbnail

Current challenges in fighting financial crime – Part 2

CGI

Current challenges in fighting financial crime – Part 2. shobana.lv@cgi.com. Fri, 10/21/2016 - 02:27. In part one of this two-part blog on fighting financial crime, we talked about the factors that are converging to make the battle against financial crime more complex and costly in today’s financial world. In part two, we’ll talk about a new approach that tackles these challenges, helping financial institutions to not only achieve higher levels of security but also create competitive advantage.

article thumbnail

CIPL and Telefónica Call for Action on New Approaches to Data Transparency

Hunton Privacy

Recently, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP, a privacy and information policy think tank based in Brussels, London and Washington, D.C., and Telefónica, one of the largest telecommunications company in the world, issued a joint white paper on Reframing Data Transparency (the “white paper”). The white paper was the outcome of a June 2016 roundtable held by the two organizations in London, in which senior business leaders, Data Privacy Officers, la

Paper 49
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Post Brexit, what options are available for a GDPR-light Data Protection Act?

Data Protector

Let’s think the unthinkable. Lets assume that, post Brexit, the British Government has an opportunity to decide how its data protection legislation should reflect the requirements of an aspiring British economy. And let’s assume that the Minister with responsibility for Data Protection asks for options about trimming back those elements of the General Data Protection Regulation that are unduly burdensome and, in practice, actually do very little to safeguard fundamental human rights.

GDPR 136
article thumbnail

Lessons Learned: E-Learning Company Faces $50,000 Spam Fine

Privacy and Cybersecurity Law

The Canadian Radio-television and Telecommunications Commission (CRTC) has issued its first Compliance and Enforcement Decision* under Canada’s Anti-Spam Law (CASL). The Commission […].

article thumbnail

UK ICO Seeks Personal Liability for Directors

Hunton Privacy

On October 13, 2016, Elizabeth Denham, the UK Information Commissioner, suggested that directors of companies who violate data protection laws should be personally liable to pay fines at a House of Commons Public Bill Committee meeting when discussing the latest draft of the Digital Economy Bill (the “Bill”). The Bill is designed to enable businesses and individuals to access fast, digital communications services, promote investment in digital communications infrastructure and support the “digit

article thumbnail

CIPL and its GDPR Project Stakeholders Discuss DPOs and Risk under GDPR

Hunton Privacy

In September, the Centre for Information Policy Leadership (“CIPL”) held its second GDPR Workshop in Paris as part of its two-year GDPR Implementation Project. The purpose of the project is to provide a forum for stakeholders to promote EU-wide consistency in implementing the GDPR, encourage forward-thinking and future-proof interpretations of key GDPR provisions, develop and share relevant best practices, and foster a culture of trust and collaboration between regulators and industry. .

GDPR 49
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Entry into Force of the French Digital Republic Bill

Hunton Privacy

On October 7, 2016, the French Digital Republic Bill (the “Bill”) was enacted after a final vote from the Senate. The Bill aligns the French legal data protection framework with the EU General Data Protection Regulation (“GDPR”) requirements before the GDPR becomes applicable in May 2018. Increased Fines. The Bill significantly increases the maximum level of fines for violations of the French Data Protection Act.

GDPR 45
article thumbnail

Regulation on the Online Protection of Minors Published for Comment in China

Hunton Privacy

Recently, the Cyberspace Administration of China published for public comment a draft of the Regulations on the Online Protection of Minors (“Draft Regulations”). The Draft Regulations are open for comment until October 31, 2016. The Draft Regulations stipulate certain requirements are applicable to the online collection and use of personal information of minors.

article thumbnail

FTC Issues Guide for Businesses on Handling Data Breaches

Hunton Privacy

On October 25, 2016, the Federal Trade Commission released a guide for businesses on how to handle and respond to data breaches (the “Guide”). The 16-page Guide details steps businesses should take once they become aware of a potential breach. The Guide also underscores the need for cyber-specific insurance to help offset potentially significant response costs.