November, 2016

article thumbnail

Apollo – they can’t still be up to their old tricks?

Data Protector

Two years ago I blogged about an unsettling experience I had with Apollo, a firm that had confused me as to what they were really all about. Since then, I’ve had a number of emails from people who have had similar experiences. Today, I’m reprinting (most of) the most recent one – which comments about an organisation called Apollo-Transitions. Surely, this is not the same company as the Apollo company I had encountered?

IT 120
article thumbnail

HCL transcending US protectionism with clear alignment to client's global digital business needs & goals

Collaboration 2.0

HCL's 'Great Digital Leap Forward' will keep astute client partners ahead of US offshoring BPO political protectionism

105
105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google Introduces new Repeat Offender Blacklist

PerezBox

On November 8th, 2016, Google introduced a new feature to Chrome that would blacklist repeat offenders. Once Safe Browsing has designated a site as a Repeat Offender, the webmaster will. Read More. The post Google Introduces new Repeat Offender Blacklist appeared first on PerezBox.

article thumbnail

How to Plan a Successful Information Management Solution Implementation

JKevinParker

At the 2016 Information Governance Conference , I presented on "How to Plan a Successful Information Management Solution Implementation". Get my slide deck from SlideShare. Related: Check out my Reflections on the 2016 InfoGovCon. Summary Start with information strategy, architecture, and governance. Recruit an executive champion and cross-departmental partners.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The growing importance of dynamic pricing and rating in insurance

CGI

The growing importance of dynamic pricing and rating in insurance. shobana.lv@cgi.com. Fri, 11/11/2016 - 01:07. On June 20, 2016, CGI held a roundtable discussion on dynamic rating and pricing in the insurance industry that involved nearly all major Dutch insurers. The starting point of the evening was a presentation from a pricing executive at a large European retail company who shared his company’s journey to dynamic pricing.

More Trending

article thumbnail

CECPQ1 results

Imperial Violet

In July my colleague, Matt Braithwaite, announced that Chrome and Google would be experimenting with a post-quantum key-agreement primitive in TLS. One should read the original announcement for details, but we had two goals for this experiment: Firstly we wanted to direct cryptoanalytic attention at the family of Ring Learning-with-Errors (RLWE) problems.

Paper 60
article thumbnail

Return of the Business Value Suite Spot

Collaboration 2.0

Digital platforms that are fit for today's specific business purpose are essentially far more agile, open and flexible versions of the old proprietary enterprise suites

98
article thumbnail

[0day] [exploit] Compromising a Linux desktop using. 6502 processor opcodes on the NES?!

Scary Beasts Security

Overview A vulnerability and a separate logic error exist in the gstreamer 0.10.x player for NSF music files. Combined, they allow for very reliable exploitation and the bypass of 64-bit ASLR, DEP, etc. The reliability is provided by the presence of a turing complete “scripting” inside a music player. NSF files are music files from the Nintendo Entertainment System.

article thumbnail

DB2 for z/OS ZPARMs that Organizations Consistently Set in a Sub-Optimal Fashion

Robert's Db2

Over the past several years, I have reviewed DB2 for z/OS systems running at quite a few client sites. Part of the analysis work I do in performing these reviews involves looking over a DB2 subsystem's DSNZPARM values (or ZPARMs, for short -- the parameters through which the set-up of a DB2 system is largely specified). I have seen that certain ZPARM parameters are very regularly set to values that are not ideal.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Royal flush: an in-depth look at poker cheating devices accessories

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

UK Parliament Approves Investigatory Powers Bill

Hunton Privacy

On November 16, 2016, the UK Investigatory Powers Bill (the “Bill”) was approved by the UK House of Lords. Following ratification of the Bill by Royal Assent, which is expected before the end of 2016, the Bill will officially become law in the UK. The draft of the Bill has sparked controversy, as it will hand significant and wide-ranging powers to state surveillance agencies, and has been strongly criticized by some privacy and human rights advocacy groups. .

Privacy 60
article thumbnail

Threat Modeling the PASTA Way

Adam Shostack

There’s a really interesting podcast with Robert Hurlbut Chris Romeo and Tony UcedaVelez on the PASTA approach to threat modeling. The whole podcast is interesting, especially hearing Chris and Tony discuss how an organization went from STRIDE to CAPEC and back again. There’s a section where they discuss the idea of “think like an attacker,” and Chris brings up some of what I’ve written (“ ‘Think Like an Attacker’ is an opt-in mistake.”) I th

Risk 40
article thumbnail

FTC Announces New Guidance on Ransomware

Privacy and Cybersecurity Law

On November 10, 2016, the U.S. Federal Trade Commission (FTC) released new guidance for businesses and consumers on the impact […].

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

[0day] [exploit] Advancing exploitation: a scriptless 0day exploit against Linux desktops

Scary Beasts Security

Overview A powerful heap corruption vulnerability exists in the gstreamer decoder for the FLIC file format. Presented here is an 0day exploit for this vulnerability. This decoder is generally present in the default install of modern Linux desktops, including Ubuntu 16.04 and Fedora 24. Gstreamer classifies its decoders as “good”, “bad” or “ugly”. Despite being quite buggy, and not being a format at all necessary on a modern desktop, the FLIC decoder is classified as “good”, almost guaranteeing i

article thumbnail

Celebrating ‘Explore Your Archive’ Week

Preservica

This week is Explore Your Archive week – a brilliant opportunity to exhibit the unique potential of archives to excite and intrigue people, bring communities together, and share amazing stories. In celebration of Explore Your Archive week, which is supported by the The National Archives and the Archives and Records Association (ARA), we thought it would be interesting to share our pick of Archives that are pioneering the way in preserving digital content for use by future generations, as well as

article thumbnail

Lessons learned in securing clouds and achieving compliance objectives

CGI

Sécurité infonuagique et atteinte d’objectifs de conformité – Leçons apprises*. shobana.lv@cgi.com. Mon, 11/21/2016 - 05:32. Lorsque de l’information ou des applications sont désignées comme essentielles, une organisation devrait immédiatement comprendre que ces systèmes exigent les plus hauts degrés de sécurité, et donc d’importants investissements pour les protéger contre les attaques malveillantes.

article thumbnail

France Adopts Class Action Regime for Data Protection Violations

Hunton Privacy

On November 19, 2016, the French government enacted a bill creating a legal basis for class actions against data controllers and processors resulting from data protection violations. The bill, which aims to facilitate access to justice for French citizens, establishes a general class action regime and includes specific provisions regarding data protection violations.

GDPR 58
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Gavle Lessons: 56% Is Not Sufficiently More Secure!

Adam Shostack

In September, we shared the news that for its 50th year, the people of Gävle paid an extra $100,000 to secure the goat. Sadly, it seems to have not helped. Today, the goat tweeted: Oh no, such a short amount of time with you my friends. The obvious lesson is that the Swedes have a ransomware problem, and the goat should stop clicking on links in email.

article thumbnail

NIST and USCG Issue New Maritime Industry Cybersecurity Profile

Privacy and Cybersecurity Law

In 2013, President Obama issued Executive Order 13636 and directed the Director of the National Institute of Standards and Technology […].

article thumbnail

It’s budget time – do you know what your content has been doing?

Attensa

Despite large annual expenditures for content few organizations have a way to measure how people engage and use information from paid or free sources. This turns budgeting and allocation into a SWAG exercise. In today’s data-driven world that seems broken. . There are many reasons that tracking the use of acquired content or assigning value to the work product of libraries and information centers is difficult.

article thumbnail

My Latest Article Published at Document Strategy Magazine

Getting Information Done

How to Get Your Information Governance Projects Funded One of the big challenges for information governance professionals is getting buy-in from business stakeholders and sponsors for funding projects. Often, there is a perceived poor return on investment (ROI) that creates a lack of urgency or the impetus to move forward. Frequently, this is a result of projects being positioned as compliance or workplace efficiency initiatives.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Don’t blame ‘The Things’

CGI

Don’t blame ‘The Things’. p.butler@cgi.com. Mon, 11/14/2016 - 04:00. It is a natural human reaction when something goes wrong, or an accident occurs, to seek to attribute responsibility or blame. Whether it’s an industrial accident, transport disaster or how little Jonny had his tooth knocked out, the sequence of events is much the same; shock at what has occurred, hasty judgements as to the cause and then an extended period of investigation to identify lessons to avoid it happening again.

IoT 40
article thumbnail

Dutch Court Decides WhatsApp Data Protection Case

Hunton Privacy

On November 23, 2016, Bloomberg BNA reported that the Hague Administrative Court in the Netherlands upheld a decision by the Dutch Data Protection Authority that WhatsApp was in breach of the Dutch Data Protection Act (the “Act”) on account of its alleged failure to identify a representative within the country responsible for compliance with the Act, despite the processing of personal data of Dutch WhatsApp users on Dutch smartphones.

article thumbnail

Delta Uses Chip Tags, Tracking App to Tackle Lost Bags

RFID Global Solution, Inc.

Tech | Tech News Nov 14, 2016 – There’s nothing like lost luggage to put a damper on the holiday travel season, but a simple piece of technology being added to some luggage tags could help limit the problem. Just in time for the travel rush, Delta is adding Radio Frequency Identification chips, also known as RFID, to paper baggage tags. For an up-close look, tune in tonight at 6:30 p.m. to NBC Nightly News.

Paper 40
article thumbnail

Internet of Things (IoT) Security Takes Center Stage At FBI, DHS, NIST and Congress

Privacy and Cybersecurity Law

On October 21, 2016, a domain name service host and internet management company experienced at least two waves of a […].

IoT 40
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

[0day] [PoC] Risky design decisions in Google Chrome and Fedora desktop enable drive-by downloads

Scary Beasts Security

Overview A confluence of two risky design choices, combined with various implementation issues, makes drive-by downloads possible with Google Chrome on Fedora. In total, with the risky design choices first, the issues are: Chrome will auto download files to a user’s desktop with no confirmation. Fedora’s “tracker” software will auto crawl downloaded files to index them, including media files.

article thumbnail

Post the result of the US Presidential election, what hope is there for the Privacy Shield?

Data Protector

In light of the recent US elections, paving the way for a Trump presidency in 2017, why should companies take the risk of adopting the Privacy Shield as a means of legitimising EU/US transfers? Frankly, I wouldn't bother. Not until the latest set of legal challenges has been resolved, anyway. Why? Well, a recent lunch with a chum who is closer to the minds of the policy-making and legal elites within the EU reminded me of the deep cultural divide that exists inside the Brussels bubble.

Privacy 120
article thumbnail

Digital-born firms from telecoms are key drivers of the transformation of the energy system

CGI

Digital-born firms from telecoms are key drivers of the transformation of the energy system. shobana.lv@cgi.com. Fri, 11/11/2016 - 02:10. Consumers are becoming increasingly aware of the value digital technologies bring to their lives. Whether it’s installing an intelligent thermostat in their homes that tracks their whereabouts and adjusts the temperature accordingly, or a smart speaker that orders them a cab, consumers are becoming extremely technology savvy and are keen to adopt new technolog