July, 2016

article thumbnail

5 useful tips to bulletproof your credit cards against identity theft

Elie

Here are the 5 ways I bulletproof my credit cards against identity theft, and you can use them yourself very easily. As a bonus, at the end of the post I have added an experimental step to defend against the recent chip downgrading attack.

62
article thumbnail

Why CGC Matters to Me

ForAllSecure

By David Brumley. In 2008 I started as a new assistant professor at CMU. I sat down, thought hard about what I had learned from graduate school, and tried to figure out what to do next. My advisor in graduate school was Dawn Song , one of the top scholars in computer security. She would go on to win a MacArthur "Genius" Award in 2010. She's a hard act to follow.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CNIL Serves Formal Notice to Microsoft to Comply with French Data Protection Law

Hunton Privacy

On July 20, 2016, the French Data Protection Authority (“CNIL”) announced that it issued a formal notice to Microsoft Corporation (“Microsoft”) about Windows 10, ordering Microsoft to comply with the French Data Protection Act within three months. Background. Following the launch of Microsoft’s new operation system, Windows 10, in July 2015, the CNIL was alerted by the media and political parties that Microsoft could collect excessive personal data via Windows 10.

article thumbnail

IRS Phone Scams

Roger's Information Security

I received the following voicemail on my home number today. “The reason of this call is to inform you that the IRS is filing lawsuit against you to get more information about this case file. Please call immediately on our department number 347-637-6615. I repeat 347-637-6615. Thank you.” While tax season is the high season for this particular scam, “The IRS is filling a lawsuit against you” strikes fear into the heart of the recipient any time of year.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

The Information Management Umbrella

Brandeis Records Manager

George Despres, CRM. Program Director for University Records Management, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). A colleague at another university recently polled a listserv group of records managers in Higher Ed. The survey probed the records management programs’ locations within the organization.

More Trending

article thumbnail

Key criteria to consider in choosing a cloud migration partner

CGI

Key criteria to consider in choosing a cloud migration partner. natalya.kalina…. Thu, 07/28/2016 - 03:46. Many organizations are seeking to reduce their legacy IT spend and re-invest the savings into digital enabling technologies like cloud computing to drive business agility, transformation and overall competiveness. Their aging IT infrastructures have become too expensive and time consuming to maintain, and the key technologies supporting their business are reaching end of life or end of maint

Cloud 40
article thumbnail

CRTC ENFORCEMENT ADVISORY: REMEMBER, YOU MUST HAVE RECORDS TO PROVE CONSENT

Privacy and Cybersecurity Law

The Canadian Radio-television and Telecommunications Commission (CRTC) issued an enforcement advisory to both businesses and individuals that send commercial electronic […].

article thumbnail

EU Commission Signs Agreement with Industry on Cybersecurity

Hunton Privacy

On July 5, 2016, the European Commission announced the launch of a new public-private partnership (the “Partnership”) on cybersecurity, as part of its Digital Single Market and EU Cybersecurity strategies. In this context, the European Commission released several documents, including a Commission Decision establishing a contractual arrangement of the new Partnership for cybersecurity industrial research, and a Staff Working Document on the preparation activities for the Partnership.

article thumbnail

InfoGovCon 2016 Promo Video

JKevinParker

Check out the new promo video for InfoGovCon 2016 ! I'm excited to be one of the speakers for this exciting event. You should come! Learn more at: www.InfoGovCon.com.

40
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Why CGC Matters To Me

ForAllSecure

In 2008 I started as a new assistant professor at CMU. I sat down, thought hard about what I had learned from graduate school, and tried to figure out what to do next. My advisor in graduate school was Dawn Song , one of the top scholars in computer security. She would go on to win a MacArthur "Genius" Award in 2010. She's a hard act to follow. I was constantly reminded of this because, by some weird twist of fate, I was given her office when she moved from CMU to Berkeley.

Paper 40
article thumbnail

French Parliament Rejects Data Localization Amendment

Hunton Privacy

On June 30, 2016, a joint committee composed of representatives from both chambers of the French Parliament (“Joint Committee”) reached a common position on the French ‘Digital Republic’ Bill that rejects the data localization amendment previously approved by the French Senate, but significantly amends other aspects of the French Data Protection Act.

GDPR 53
article thumbnail

EU Regulators Will Not Challenge Adequacy of Privacy Shield for at Least One Year

Hunton Privacy

On July 26, 2016, Isabelle Falque-Pierrotin, the Chairwoman of the Article 29 Working Party of data protection regulators, announced that EU data protection regulators will not challenge the adequacy of the EU-U.S. Privacy Shield (“Privacy Shield”) for at least one year ( i.e. , until after summer 2017). The European Commission is scheduled to conduct a mandatory review of the adequacy of the Privacy Shield by May 2017.

Privacy 49
article thumbnail

ICO Releases Annual Report for 2015-2016

Hunton Privacy

On June 28, 2016, the UK Information Commissioner’s Office (“ICO”) released its Annual Report for 2015 -2016 (the “Report”). According to the Report, the ICO has dealt with an increase in the number of data protection concerns, handling 16,388 complaints in total. Particularly noteworthy is the £130,000 fine imposed on Pharmacy 2U for breach of the fair processing requirements under the UK Data Protection Act 1998.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Article 29 Working Party and EDPS Release Opinions on the ePrivacy Directive

Hunton Privacy

On July 25, 2016, the Article 29 Working Party (the “Working Party”) and the European Data Protection Supervisor (“EDPS”) released their respective Opinions regarding the review of Directive 2002/58/EC on privacy and electronic communications (the “ePrivacy Directive”). Both the Working Party and the EDPS stressed that new rules should complement the protections available under the EU General Data Protection Regulation (“GDPR”).

article thumbnail

Second Circuit Holds Microsoft Cannot Be Compelled to Turn Over Emails Stored Abroad

Hunton Privacy

This post has been updated. . On July 14, 2016, the U.S. Court of Appeals for the Second Circuit held that Microsoft Corporation (“Microsoft”) cannot be compelled to turn over customer emails stored abroad to U.S. law enforcement authorities. As we previously reported , in April 2014 a judge in the U.S. District Court for the Southern District of New York ruled that Microsoft must release user data to U.S. law enforcement when issued a search warrant under the Stored Communications Act (“SCA”),

article thumbnail

FTC Issues Warning Letters to Companies Falsely Claiming APEC CBPR Certification

Hunton Privacy

On July 14, 2016, the Federal Trade Commission issued warning letters to 28 companies relating to apparent false claims of participation in the APEC Cross-Border Privacy Rules (“CBPR”). The warning letters state that the companies’ websites represent APEC CBPR certification even though the companies do not appear to have undertaken the necessary steps to claim certification, such as a review and approval process by an APEC-recognized Accountability Agent.

Privacy 45
article thumbnail

EU Member States Approve Privacy Shield

Hunton Privacy

On July 8, 2016, EU representatives on the Article 31 Committee approved the final version of the EU-U.S. Privacy Shield (“Privacy Shield”) to permit transatlantic transfers of personal data from the EU to the U.S. As we previously reported , the Privacy Shield is a successor framework to the Safe Harbor, which was invalidated by the Court of Justice of the European Union in October 2015.

Privacy 45
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Order, Order: Why the UK court system is ready for transformational change…

CGI

Order, Order: Why the UK court system is ready for transformational change…. shobana.lv@cgi.com. Thu, 07/28/2016 - 05:17. The UK Criminal Justice System is suffering a crisis of public perception. A Citizens Advice study in 2015 found that one in five people who had been involved in the UK court system left with a worse opinion than when they entered it.

Paper 40
article thumbnail

U.S. data transparency act compliance in reach, offering potential for new data uses

CGI

La conformité à la loi américaine sur la transparence des données ouvre la voie à de nouvelles possibilités en matière d’utilisation des données. pallavi.m@cgi.com. Thu, 07/28/2016 - 07:04. Reconnaissant l’importance que revêt la transparence fiscale ainsi que la complexité et la diversité des sources de financement du gouvernement fédéral des États-Unis, le Congrès américain a adopté la loi sur la responsabilité et la transparence numériques (« Digital Accountability and Transparency Act » ou

article thumbnail

OCR Settles Two HIPAA Cases with Public Health Centers in Oregon and Mississippi

Hunton Privacy

On July 21, 2016, the U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) entered into resolution agreements with two large public health centers, Oregon Health & Science University (“OHSU”) and the University of Mississippi Medical Center (“UMMC”), over alleged HIPAA violations. OHSU. Following the submission of multiple breach notification reports by OHSU in 2013, OCR investigated and found “evidence of widespread vulnerabilities within OHSU’s HIPAA compliance pro

article thumbnail

Lisa Sotto Interviewed on Privacy Piracy Radio Show

Hunton Privacy

On July 25, 2016, Lisa Sotto , partner and head of the Global Privacy and Cybersecurity practice at Hunton & Williams LLP, was interviewed on KUCI 88.9 FM radio’s Privacy Piracy show. Lisa discussed the changing regulatory landscape, information security enforcement actions, the threat actors who attack companies’ data and how to manage the aftermath of a data breach.

Privacy 40
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The EU-U.S. Privacy Shield: A How-To Guide

Hunton Privacy

On July 12, 2016, after months of negotiations and criticism, the EU-U.S. Privacy Shield (“Privacy Shield”) was officially adopted by the European Commission and the Department of Commerce. Similar to the Safe Harbor, companies must certify their compliance with the seven principles comprising the Privacy Shield to use the Shield as a valid data transfer mechanism.

Privacy 40
article thumbnail

U.S. Department of Commerce Launches Privacy Shield Website

Hunton Privacy

On July 26, 2016, the U.S. Department of Commerce announced that it has launched a new website that provides individuals and companies with additional information regarding the EU-U.S. Privacy Shield Framework (“Privacy Shield”). Among other things, the website provides information about complying with, and self-certifying to, the Privacy Shield’s principles.

Privacy 40
article thumbnail

Advocate General Finds Member States May Not Breach EU Laws Over Electronic Communications Retention

Hunton Privacy

On July 19, 2016, Advocate General Saugmandsgaard Oe (“Advocate General”), published his Opinion on two joined cases relating to data retention requirements in the EU, C-203/15 and C-698/15. These cases were brought following the Court of Justice for the European Union’s (“CJEU’s”) decision in the Digital Rights Ireland case, which invalidated Directive 2006/24/EC on data retention.

article thumbnail

Why CGC Matters To Me

ForAllSecure

In 2008 I started as a new assistant professor at CMU. I sat down, thought hard about what I had learned from graduate school, and tried to figure out what to do next. My advisor in graduate school was Dawn Song , one of the top scholars in computer security. She would go on to win a MacArthur "Genius" Award in 2010. She's a hard act to follow. I was constantly reminded of this because, by some weird twist of fate, I was given her office when she moved from CMU to Berkeley.

Paper 40
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

WHY CGC MATTERS TO ME

ForAllSecure

In 2008 I started as a new assistant professor at CMU. I sat down, thought hard about what I had learned from graduate school, and tried to figure out what to do next. My advisor in graduate school was Dawn Song , one of the top scholars in computer security. She would go on to win a MacArthur "Genius" Award in 2010. She's a hard act to follow. I was constantly reminded of this because, by some weird twist of fate, I was given her office when she moved from CMU to Berkeley.

Paper 40
article thumbnail

Privacy Shield gets approval: certainty at last??

Privacy and Cybersecurity Law

The European Commission yesterday issued an adequacy decision adopting the EU-US Privacy Shield, which replaces Safe Harbor as a framework […].

Privacy 40
article thumbnail

European Commission Adopts Privacy Shield

Hunton Privacy

On July 12, 2016, the EU Commissioner for Justice, Consumers and Gender Equality, V?ra Jourová, and U.S. Secretary of Commerce Penny Pritzker announced the formal adoption of the EU-U.S. Privacy Shield (the “Privacy Shield”) framework, composed of an Adequacy Decision and accompanying Annexes. The Privacy Shield is designed to protect the fundamental rights of individuals whose personal data is transferred to the U.S. and ensure legal certainty for businesses with respect to transatlantic transf

Privacy 40