November, 2016

article thumbnail

Apollo – they can’t still be up to their old tricks?

Data Protector

Two years ago I blogged about an unsettling experience I had with Apollo, a firm that had confused me as to what they were really all about. Since then, I’ve had a number of emails from people who have had similar experiences. Today, I’m reprinting (most of) the most recent one – which comments about an organisation called Apollo-Transitions. Surely, this is not the same company as the Apollo company I had encountered?

IT 120
article thumbnail

Return of the Business Value Suite Spot

Collaboration 2.0

Digital platforms that are fit for today's specific business purpose are essentially far more agile, open and flexible versions of the old proprietary enterprise suites

98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google Introduces new Repeat Offender Blacklist

PerezBox

On November 8th, 2016, Google introduced a new feature to Chrome that would blacklist repeat offenders. Once Safe Browsing has designated a site as a Repeat Offender, the webmaster will. Read More. The post Google Introduces new Repeat Offender Blacklist appeared first on PerezBox.

article thumbnail

How to Plan a Successful Information Management Solution Implementation

JKevinParker

At the 2016 Information Governance Conference , I presented on "How to Plan a Successful Information Management Solution Implementation". Get my slide deck from SlideShare. Related: Check out my Reflections on the 2016 InfoGovCon. Summary Start with information strategy, architecture, and governance. Recruit an executive champion and cross-departmental partners.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

CECPQ1 results

Imperial Violet

In July my colleague, Matt Braithwaite, announced that Chrome and Google would be experimenting with a post-quantum key-agreement primitive in TLS. One should read the original announcement for details, but we had two goals for this experiment: Firstly we wanted to direct cryptoanalytic attention at the family of Ring Learning-with-Errors (RLWE) problems.

Paper 60

More Trending

article thumbnail

Russia Set to Block Access to LinkedIn

Hunton Privacy

This post has been updated. . On November 10, 2016, the Court of Appeal for Moscow’s Taginsky District upheld an August 2016 decision by the district’s lower court that LinkedIn had violated Russian data protection laws. Access to the professional networking site is now set to be blocked across Russia. The court’s decision, which followed a complaint from the Russian data protection regulator, Roskomnadzor, found that LinkedIn violated Russian data protection law on two counts: not storing data

Access 67
article thumbnail

HCL transcending US protectionism with clear alignment to client's global digital business needs & goals

Collaboration 2.0

HCL's 'Great Digital Leap Forward' will keep astute client partners ahead of US offshoring BPO political protectionism

105
105
article thumbnail

DB2 for z/OS ZPARMs that Organizations Consistently Set in a Sub-Optimal Fashion

Robert's Db2

Over the past several years, I have reviewed DB2 for z/OS systems running at quite a few client sites. Part of the analysis work I do in performing these reviews involves looking over a DB2 subsystem's DSNZPARM values (or ZPARMs, for short -- the parameters through which the set-up of a DB2 system is largely specified). I have seen that certain ZPARM parameters are very regularly set to values that are not ideal.

article thumbnail

Royal flush: an in-depth look at poker cheating devices accessories

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

[0day] [exploit] Compromising a Linux desktop using. 6502 processor opcodes on the NES?!

Scary Beasts Security

Overview A vulnerability and a separate logic error exist in the gstreamer 0.10.x player for NSF music files. Combined, they allow for very reliable exploitation and the bypass of 64-bit ASLR, DEP, etc. The reliability is provided by the presence of a turing complete “scripting” inside a music player. NSF files are music files from the Nintendo Entertainment System.

article thumbnail

Threat Modeling the PASTA Way

Adam Shostack

There’s a really interesting podcast with Robert Hurlbut Chris Romeo and Tony UcedaVelez on the PASTA approach to threat modeling. The whole podcast is interesting, especially hearing Chris and Tony discuss how an organization went from STRIDE to CAPEC and back again. There’s a section where they discuss the idea of “think like an attacker,” and Chris brings up some of what I’ve written (“ ‘Think Like an Attacker’ is an opt-in mistake.”) I th

Risk 40
article thumbnail

UK Parliament Approves Investigatory Powers Bill

Hunton Privacy

On November 16, 2016, the UK Investigatory Powers Bill (the “Bill”) was approved by the UK House of Lords. Following ratification of the Bill by Royal Assent, which is expected before the end of 2016, the Bill will officially become law in the UK. The draft of the Bill has sparked controversy, as it will hand significant and wide-ranging powers to state surveillance agencies, and has been strongly criticized by some privacy and human rights advocacy groups. .

Privacy 60
article thumbnail

Celebrating ‘Explore Your Archive’ Week

Preservica

This week is Explore Your Archive week – a brilliant opportunity to exhibit the unique potential of archives to excite and intrigue people, bring communities together, and share amazing stories. In celebration of Explore Your Archive week, which is supported by the The National Archives and the Archives and Records Association (ARA), we thought it would be interesting to share our pick of Archives that are pioneering the way in preserving digital content for use by future generations, as well as

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Lessons learned in securing clouds and achieving compliance objectives

CGI

Sécurité infonuagique et atteinte d’objectifs de conformité – Leçons apprises*. shobana.lv@cgi.com. Mon, 11/21/2016 - 05:32. Lorsque de l’information ou des applications sont désignées comme essentielles, une organisation devrait immédiatement comprendre que ces systèmes exigent les plus hauts degrés de sécurité, et donc d’importants investissements pour les protéger contre les attaques malveillantes.

article thumbnail

It’s budget time – do you know what your content has been doing?

Attensa

Despite large annual expenditures for content few organizations have a way to measure how people engage and use information from paid or free sources. This turns budgeting and allocation into a SWAG exercise. In today’s data-driven world that seems broken. . There are many reasons that tracking the use of acquired content or assigning value to the work product of libraries and information centers is difficult.

article thumbnail

My Latest Article Published at Document Strategy Magazine

Getting Information Done

How to Get Your Information Governance Projects Funded One of the big challenges for information governance professionals is getting buy-in from business stakeholders and sponsors for funding projects. Often, there is a perceived poor return on investment (ROI) that creates a lack of urgency or the impetus to move forward. Frequently, this is a result of projects being positioned as compliance or workplace efficiency initiatives.

article thumbnail

Gavle Lessons: 56% Is Not Sufficiently More Secure!

Adam Shostack

In September, we shared the news that for its 50th year, the people of Gävle paid an extra $100,000 to secure the goat. Sadly, it seems to have not helped. Today, the goat tweeted: Oh no, such a short amount of time with you my friends. The obvious lesson is that the Swedes have a ransomware problem, and the goat should stop clicking on links in email.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

France Adopts Class Action Regime for Data Protection Violations

Hunton Privacy

On November 19, 2016, the French government enacted a bill creating a legal basis for class actions against data controllers and processors resulting from data protection violations. The bill, which aims to facilitate access to justice for French citizens, establishes a general class action regime and includes specific provisions regarding data protection violations.

GDPR 58
article thumbnail

Delta Uses Chip Tags, Tracking App to Tackle Lost Bags

RFID Global Solution, Inc.

Tech | Tech News Nov 14, 2016 – There’s nothing like lost luggage to put a damper on the holiday travel season, but a simple piece of technology being added to some luggage tags could help limit the problem. Just in time for the travel rush, Delta is adding Radio Frequency Identification chips, also known as RFID, to paper baggage tags. For an up-close look, tune in tonight at 6:30 p.m. to NBC Nightly News.

Paper 40
article thumbnail

Don’t blame ‘The Things’

CGI

Don’t blame ‘The Things’. p.butler@cgi.com. Mon, 11/14/2016 - 04:00. It is a natural human reaction when something goes wrong, or an accident occurs, to seek to attribute responsibility or blame. Whether it’s an industrial accident, transport disaster or how little Jonny had his tooth knocked out, the sequence of events is much the same; shock at what has occurred, hasty judgements as to the cause and then an extended period of investigation to identify lessons to avoid it happening again.

IoT 40
article thumbnail

Germany to audit 500 companies on data transfers

Privacy and Cybersecurity Law

Germany to audit 500 companies The German data protection authorities have announced today that they have chosen 500 companies throughout […].

Cloud 52
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

[0day] [exploit] Advancing exploitation: a scriptless 0day exploit against Linux desktops

Scary Beasts Security

Overview A powerful heap corruption vulnerability exists in the gstreamer decoder for the FLIC file format. Presented here is an 0day exploit for this vulnerability. This decoder is generally present in the default install of modern Linux desktops, including Ubuntu 16.04 and Fedora 24. Gstreamer classifies its decoders as “good”, “bad” or “ugly”. Despite being quite buggy, and not being a format at all necessary on a modern desktop, the FLIC decoder is classified as “good”, almost guaranteeing i

article thumbnail

Post the result of the US Presidential election, what hope is there for the Privacy Shield?

Data Protector

In light of the recent US elections, paving the way for a Trump presidency in 2017, why should companies take the risk of adopting the Privacy Shield as a means of legitimising EU/US transfers? Frankly, I wouldn't bother. Not until the latest set of legal challenges has been resolved, anyway. Why? Well, a recent lunch with a chum who is closer to the minds of the policy-making and legal elites within the EU reminded me of the deep cultural divide that exists inside the Brussels bubble.

Privacy 120
article thumbnail

Dutch Court Decides WhatsApp Data Protection Case

Hunton Privacy

On November 23, 2016, Bloomberg BNA reported that the Hague Administrative Court in the Netherlands upheld a decision by the Dutch Data Protection Authority that WhatsApp was in breach of the Dutch Data Protection Act (the “Act”) on account of its alleged failure to identify a representative within the country responsible for compliance with the Act, despite the processing of personal data of Dutch WhatsApp users on Dutch smartphones.

article thumbnail

Electoral Chaos

Adam Shostack

[ Dec 15 : Note that there are 4 updates to the post with additional links after writing.]. The Green Party is driving a set of recounts that might change the outcome in one or more swing states. Simultaneously, there is a growing movement to ask the Electoral College to choose a candidate other than Donald Trump to be the next President of the United States.

article thumbnail

How Top Tech CFOs Solve Annual Planning’s Biggest Challenges

Gearing up for 2025 annual planning? Our latest eBook from the Operators Guild is your ultimate guide. Discover real-world solutions and best practices shared by top CFOs, drawn directly from discussions within OG’s vibrant online community. Learn from senior executives at high-growth tech startups as they outline financial planning strategies, align CEO and board goals, and coordinate budgets across departments.

article thumbnail

Digital-born firms from telecoms are key drivers of the transformation of the energy system

CGI

Digital-born firms from telecoms are key drivers of the transformation of the energy system. shobana.lv@cgi.com. Fri, 11/11/2016 - 02:10. Consumers are becoming increasingly aware of the value digital technologies bring to their lives. Whether it’s installing an intelligent thermostat in their homes that tracks their whereabouts and adjusts the temperature accordingly, or a smart speaker that orders them a cab, consumers are becoming extremely technology savvy and are keen to adopt new technolog

article thumbnail

NIST and USCG Issue New Maritime Industry Cybersecurity Profile

Privacy and Cybersecurity Law

In 2013, President Obama issued Executive Order 13636 and directed the Director of the National Institute of Standards and Technology […].

article thumbnail

[0day] [PoC] Risky design decisions in Google Chrome and Fedora desktop enable drive-by downloads

Scary Beasts Security

Overview A confluence of two risky design choices, combined with various implementation issues, makes drive-by downloads possible with Google Chrome on Fedora. In total, with the risky design choices first, the issues are: Chrome will auto download files to a user’s desktop with no confirmation. Fedora’s “tracker” software will auto crawl downloaded files to index them, including media files.