September, 2016

article thumbnail

Roughtime

Imperial Violet

Security protocols often assume an accurate, local clock (e.g. TLS, Kerberos, DNSSEC and more). It's a widely accepted assumption when designing protocols but, for a lot of people, it just isn't true. We find good evidence that at least 25% of all certificate errors in Chrome are due to a bad local clock. Even when the local clock is being synchronised, it's very likely to be using unauthenticated NTP.

article thumbnail

How to Work Beyond the Corporate Firewall Safely

JKevinParker

Today's workforce is increasingly distributed, increasingly mobile, and increasingly expecting telework options. This equates to more people working beyond the corporate walls and beyond the corporate IT firewall. But how can organizations offer such flexibility without losing control of their information? This is the subject of a guest post I authored for AIIM's Digital Landfill blog.

Paper 92
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

I feel terrible about this site.

John Battelle's Searchblog

The post I feel terrible about this site. appeared first on John Battelle's Search Blog. I don’t write here anymore. I write almost entirely on Medium now. It’s not a choice I made to NOT write here, it’s a choice I made to edit NewCo Shift , our new publication. It lives on Medium, but if it were a WordPress site, well, my writing would all be on that site.

article thumbnail

Final Rules for the Data Privacy Act Published in the Philippines

Hunton Privacy

Recently, the National Privacy Commission (the “Commission”) of the Philippines published the final text of its Implementing Rules and Regulations of Republic Act No. 10173, known as the Data Privacy Act of 2012 (the “IRR”). The IRR has a promulgation date of August 24, 2016, and went into effect 15 days after the publication in the official Gazette.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

How To Protect Your Business Data

PerezBox

It’s impossible to go a week without seeing some reference to a data breach, whether it’s a write up on what happened years ago, or updates on breaches that are. Read More. The post How To Protect Your Business Data appeared first on PerezBox.

More Trending

article thumbnail

Password Expiration

Roger's Information Security

FTC Chief Technologist Lorrie Cranor wrote in March it is time to reconsider mandatory password changes. Unless there is reason to believe a password has been compromised or shared, requiring regular password changes may actually do more harm than good in some cases. (And even if a password has been compromised, changing the password may be ineffective, especially if other steps aren’t taken to correct security problems.).

article thumbnail

Current challenges in fighting financial crime – Part 1

CGI

Current challenges in fighting financial crime – Part 1. Anonymous. Mon, 09/26/2016 - 01:57. As the threat and sophistication of financial crime continues to increase, financial institutions are challenged to stay one step ahead and ensure the highest level of protection for their organizations and customers. In part one of this two-part blog on financial crime, we’ll take a look at some of the factors driving the complexity and cost in fighting financial crime.

article thumbnail

The Business Case for Information Strategy and Architecture

JKevinParker

Information Management is a meta discipline that combines strategy, architecture, technology, and governance to get the right information to the right people at the right times to do the right things in support of an organization’s mission, vision, and values. Information Management happens at the intersection of people, process, information, and technology.

article thumbnail

CNIL Publishes New Rules on Biometric Access Control in the Workplace

Hunton Privacy

On September 27, 2016, the French Data Protection Authority (“CNIL”) announced the adoption of two new decisions, Single Authorizations AU-052 and AU-053 , that will now cover all biometric access control systems in the workplace. These two new decisions repeal and replace the previous biometric decisions adopted by the CNIL and lay down the CNIL’s new position on biometric systems used to control access to the premises, software applications and/or devices in the workplace. .

Access 53
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

ICA Congress 2016: Creating value with digital preservation

Preservica

The International Council on Archives (ICA) is dedicated to records management and the preservation of the world’s archival heritage. For over 60 years, the ICA has united archival institutions and practitioners across the world to share industry knowledge and expertise. The ICA is a truly international organisation, and this year held their Congress event in Seoul, South Korea.

article thumbnail

Briefing Templates

Attensa

Check out our briefing template breakdown at our guide website. View starter templates and download them from our github repo if you have a basic understanding of HTML and CSS. The post Briefing Templates appeared first on Attensa Inc.

40
article thumbnail

New York Proposes First-in-the-Nation Cybersecurity Regulation for Financial Institutions

Privacy and Cybersecurity Law

On September 13, 2016, the New York Department of Financial Services introduced a new rule that would require banks, insurance […].

article thumbnail

Strategic Information Management in the Digital Age

CGI

Strategic Information Management in the Digital Age. shobana.lv@cgi.com. Tue, 09/13/2016 - 05:06. Corporate information management has undergone a steady evolution over the past three decades, with organisations that have been quick to embrace new strategies and tools, surviving and thriving in continuously changing business landscapes, and those that have not embraced the value of information rapidly going under in an increasingly red sea – that crowded, competitive marketplace filled with acut

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

What Is Our Professional Future?

Brandeis Records Manager

George Despres, CRM. Program Director for University Records Management, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). Like most people, I prefer to have a reasonable sense of job security, as long as my interest is engaged. I hope and need to remain in the workforce for many more years.

article thumbnail

Department of Transportation Issues Cyber Guidance for Autonomous Cars

Hunton Privacy

On September 20, 2016, the Department of Transportation, through the National Highway Traffic Safety Administration (“NHTSA”), released federal cyber guidance for autonomous cars entitled Federal Automated Vehicles Policy (“guidance”). The guidance makes a number of recommendations, including that automated vehicles should be designed to comply with “established best practices for cyber physical vehicle systems.

article thumbnail

Global Futures: A look back at ARA 2016

Preservica

An insightful few days in Archiving & Digital Preservation. Earlier this month the Archives & Records Association (ARA) held their annual members conference in Wembley, London. The event brought together archivists and records managers from across Europe, including many Preservica Users. The conference theme was focused on ‘Global Futures’, and it was clear that the ARA community continue to stride forward with enthusiasm towards a future that will ensure their valuable collections and r

article thumbnail

CNIL Publishes Internet Sweep Results on Connected Devices

Hunton Privacy

On September 23, 2016, the French Data Protection Authority (“CNIL”) published the results of the Internet sweep on connected devices. The sweep was conducted in May 2016 to assess the quality of the information provided to users of connected devices, the level of security of the data flows and the degree of user empowerment ( e.g. , user’s consent and ability to exercise data protection rights).

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Belgian Privacy Commission Issues Priorities and Thematic Dossier to Prepare for GDPR

Hunton Privacy

On September 16, 2016, the Belgian Data Protection Authority (the “Privacy Commission”) published a 13-step guidance document (in French and Dutch ) to help organizations prepare for the EU General Data Protection Regulation (“GDPR”). The 13 steps recommended by the Privacy Commission are summarized below. Awareness. Inform key persons and decision makers about the upcoming changes in order to assess the consequences of the GDPR on the company or organization.

GDPR 45
article thumbnail

The Arc of a Data Breach: A 3-Part Series to Make Sure You’re Prepared

Hunton Privacy

Episode 1: Identify & Mobilize. In the first segment of our 3-part series with Lawline, Lisa J. Sotto , head of our Global Privacy and Cybersecurity practice at Hunton & Williams LLP, explains how to identify a cyber incident, mobilize your incident response team, coordinate with law enforcement and conduct an investigation. View the first segment and the presentation materials.

article thumbnail

New Jersey Moves Forward With Shopper Privacy Bill

Hunton Privacy

On September 15, 2016, the New Jersey Senate unanimously approved a bill that seeks to limit retailers’ ability to collect and use personal data contained on consumers’ driver and non-driver identification cards. The bill, known as the Personal Information and Privacy Protection Act , must now be approved by the New Jersey Assembly. Under the bill, retail establishments may scan an individual’s identification card ( i.e. , use an electronic device capable of deciphering, in an electronically rea

Privacy 45
article thumbnail

FTC Seeks Input on GLB Safeguards Rule

Hunton Privacy

On August 29, 2016, the Federal Trade Commission announced that it is seeking public comment on the Gramm-Leach-Bliley Act (“GLB”) Safeguards Rule. The GLB Safeguards Rule, which became effective in 2003, requires financial institutions to develop, implement and maintain a comprehensive information security program to safeguard customer information.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

The Arc of a Data Breach: A 3-Part Series to Make Sure You’re Prepared

Hunton Privacy

Episode 2: Response. In the second segment of our 3-part series with Lawline, Lisa J. Sotto , head of our Global Privacy and Cybersecurity practice at Hunton & Williams LLP, discusses data breach notification obligations and actions to take to manage the regulatory onslaught in the aftermath of a breach. Sotto notes that “these investigations are challenging because the threat actors are enormously sophisticated, and in some circumstances we can never figure out what happened.”.

article thumbnail

Korean Privacy Law Updated

Hunton Privacy

On September 22, 2016, Korean law firm Bae, Kim & Lee LLC released a Legal Update outlining amendments to Korea’s Personal Information Protection Act (“PIPA”) and the Act on the Promotion of IT Network Use and Information Protection (“IT Network Act”). The amendments to PIPA include: notification requirements for third-party transfers; and. an obligation to submit to regular inspection by MOI.

Privacy 40
article thumbnail

New York Announces Proposed Cybersecurity Regulation to Protect Consumers and Financial Institutions

Hunton Privacy

On September 13, 2016, New York Governor Andrew Cuomo announced a proposed regulation that would require banks, insurance companies and other financial services institutions to establish and maintain a cybersecurity program designed to ensure the safety of New York’s financial services industry and to protect New York State from the threat of cyber attacks. .

article thumbnail

TalkTalk Appeal Against ICO Fine for Late Notification of Data Breach Dismissed by First-Tier Tribunal

Hunton Privacy

On August 30, 2016, the First-tier Tribunal (Information Rights) (the “Tribunal”) dismissed an appeal from UK telecoms company TalkTalk Telecom Group PLC (“TalkTalk”) regarding a monetary penalty notice issued to it on February 17, 2016, by the UK Information Commissioner’s Office (“ICO”). The ICO had issued the monetary penalty notice to TalkTalk, for the amount of £1,000, for an alleged failure to report an October 2015 data breach to the ICO within the legally required time period.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Data hubs will revolutionize the electricity business: Lessons from 10 data hub projects

CGI

Data hubs will revolutionize the electricity business: Lessons from 10 data hub projects. shobana.lv@cgi.com. Mon, 09/12/2016 - 03:38. Last spring, Finland’s Ministry of Employment and the Economy tasked Fingrid with building a centralized information exchange solution, informally dubbed the data hub, for the Finnish electricity market. Any major short-circuits notwithstanding, the data hub is expected to revolutionize the Finnish electricity business.

article thumbnail

Putting the driver at the heart of fleet fuelling

CGI

Putting the driver at the heart of fleet fuelling. shobana.lv@cgi.com. Mon, 09/12/2016 - 05:07. The multi-billion Euro fleet fuelling sector is on the brink of a digital revolution that will combine connected technologies with the latest innovations in retail, leisure and finance. This revolution will see every aspect of the fleet process brought onto a single integrated platform and transform the entire fleet ecosystem.

Retail 40
article thumbnail

Advocate General Advises Revision of PNR Agreement between EU and Canada

Hunton Privacy

On September 8, 2016, Advocate General Paolo Mengozzi of the Court of Justice of the European Union (“CJEU”) issued his Opinion on the compatibility of the draft agreement between Canada and the European Union on the transfer of passenger name record data (“PNR Agreement”) with the Charter of Fundamental Rights of the European Union (“EU Charter”). This is the first time that the CJEU has been called upon to issue a ruling on the compatibility of a draft international agreement with the EU Chart