Sat.Jan 13, 2018 - Fri.Jan 19, 2018

article thumbnail

Management by Magazine (InfoGov Edition)

Weissman's World

Today, on Perpective Check: The truth and consequences of your boss flipping through the pages of a magazine and saying, “I just read about [new shiny infogov object] that EVERYBODY’S using. How come we’re not??” [link]. The post Management by Magazine (InfoGov Edition) appeared first on Holly Group.

article thumbnail

The Machine Identity Crisis

Data Breach Today

We are amidst a new "machine identity crisis," says Jeff Hudson, CEO of Venafi. And unless we tackle this growing challenge of how to secure machine-to-machine communication, then enterprise IT and security departments are likely to be overwhelmed.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Breaches Don't Affect Stock Price

Schneier on Security

Interesting research: " Long-term market implications of data breaches, not ," by Russell Lange and Eric W. Burger. Abstract : This report assesses the impact disclosure of data breaches has on the total returns and volatility of the affected companies' stock, with a focus on the results relative to the performance of the firms' peer industries, as represented through selected indices rather than the market as a whole.

article thumbnail

GDPR will be a harsh wake-up call for most U.S. companies

Information Management Resources

Recent studies suggest only one-in-four organizations are well-prepared for the data management mandate, a statistic that could have costly consequences.

GDPR 126
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Guest Post -- Automation Is Changing the Way We Work

AIIM

Artificial intelligence is changing the way we do everything. As we look ahead, self-driving cars, hyper-intelligent predictive software, and self-improving robots seem possible. As AI progress at a rapid pace, incremental changes in the capability of computer programs changes how we interact with the world, the internet and each other. Already, AI is integrated into our daily lives, from automated suggestions from Amazon based on products we’ve purchased in the best, to automatic email sorting

More Trending

article thumbnail

Meet Antifa's Secret Weapon Against Far-Right Extremists

WIRED Threat Level

Megan Squire doesn’t consider herself to be antifa and pushes digital activism instead, passing along information to those who might put it to real-world use—who might weaponize it.

IT 111
article thumbnail

What are vital records, and how do you protect them?

TAB OnRecord

When vital records are not protected, there is a major risk involved if the unthinkable happens. We’ve created this resource to help your organization mitigate that risk by following these five steps. Read More. The post What are vital records, and how do you protect them? appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Guest Post - Three Critical Steps for GDPR Compliance

AIIM

This is the eighth post in a series on privacy by Andrew Pery. You might also be interested in: Mitigate Data Privacy and Security Risks with Machine Learning. The Privacy and Security Dichotomy. GDPR and Cross Border Data Flows between the EU and the US: Current State of the Law. Privacy by Design: The Intersection of Law and Technology. What Do the GDPR and new Privacy Laws Mean for U.S.

GDPR 84
article thumbnail

The Coming Battle For Your Web Browser

Data Breach Today

Why the Next Botnet May Be Built From an Army of Web Browsers The browser is the window to the web. But what's going in the background during that browsing is opaque to most users. A new experiment shows how the computing power of tens of thousands of computers could be unknowingly harnessed to crack passwords, harvest cryptocurrencies or conduct DDoS attacks.

Passwords 170
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

The Astrophysicist Who Wants to Help Solve Baltimore's Urban Blight

WIRED Threat Level

Vacant buildings are more than just an economic threat. They're also a public safety concern. And it turns out they have their own sort of gravitational pull.

IT 107
article thumbnail

The role of the data curator: Make data scientists more productive

Information Management Resources

In 2018 we will increasingly see this job created in order to bridge the worlds of business and IT for the better use of analytics.

Analytics 106
article thumbnail

Guest Post -- 10 Mindset Tips for Project Managers

AIIM

Project management often involves working in high stress environments with tight deadlines and multiple competing priorities. The most successful Project Managers learn how to navigate these environments and often have a strong understanding of their own shortcomings and the strengths of their team. To create this success orientated mindset there are a number of tips and strategies that Project Managers can look to adopt. 1 -- Spend Time To Understand Your Own Management Style.

article thumbnail

'Hacking Incident' Impacts Nearly 280,000 Medicaid Patients

Data Breach Today

Oklahoma State University Center for Health Sciences Sends Notification Letters A health data breach reported to federal regulators as a "hacking/IT incident" impacting nearly 280,000 Medicaid patients in Oklahoma has experts wondering exactly what happened.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Does Encryption Really Protect My Cloud Data?

Thales Cloud Protection & Licensing

There has always been a battle between business efficiency and security since the invention of shared compute and data resources. Enterprise risk managers continue to swing the pendulum between business risk and security risk, depending on new demands versus new threats. Today’s enterprises have experienced this pendulum shift as cloud has become more relevant.

article thumbnail

The 'Doublespeak' of Responsible Encryption

WIRED Threat Level

It's a new name for an old argument: that public agencies fighting crime and terrorism must have access to our private communications—for our own good.

article thumbnail

What is Enterprise Content Management (ECM)?

OpenText Information Management

Enterprise Content Management (ECM) comes in many forms. At its heart, it’s a set of processes, strategies and tools that allow an enterprise to capture, manage, store, preserve, deliver and measure content throughout the enterprise and beyond. In today’s world, information sharing and collaboration with customers, suppliers and other trading partners is essential part of … The post What is Enterprise Content Management (ECM)?

ECM 82
article thumbnail

Intel Confirms Fresh Spectre, Meltdown Patch Problems

Data Breach Today

Latest CPUs Also Suffer From Frequent Rebooting Problem Intel says firmware updates it developed to help protect users against the Meltdown and Spectre vulnerabilities have been causing not just older chipsets but also its newest CPUs - in both client devices and data center servers - to reboot much more frequently than they should.

IT 132
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

4 easy ways to get started with information governance

IBM Big Data Hub

Two paradoxes of information technology are: data has no value if you can’t access it, and it’s a liability if the wrong people access it. Company leaders don’t think they need data governance until these paradoxes hit them hard.

article thumbnail

IT budgets on the rise, driven by software, AI investments

Information Management Resources

Worldwide IT spending will reach $3.7 trillion this year, with the primary drivers of growth being projects in digital business, blockchain, the IoT, machine learning and artificial intelligence.

article thumbnail

What is Customer Experience Management (CEM)?

OpenText Information Management

There was a time when content almost entirely flowed one way – from enterprises to customers. Customers’ responses were effectively measured in sales and occasional surveys. But in today’s digital world, customers demand a two-way omnichannel customer experience. They expect a customer experience that delights or they will go looking at your competitors.

article thumbnail

Bitcoin-Amassing AlphaBay Drug Barons Get US Prison Time

Data Breach Today

'Caliconnect' Earned $1.4 Million on Silk Road Before Its Demise Two men have been sentenced to serve at about six years each in U.S. federal prison after selling drugs such as marijuana and cocaine via darknet markets, including AlphaBay. The separate arrests of both defendants predate law enforcement seizing control of AlphaBay.

Marketing 128
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Home Office pays out £15,500 to asylum seeker over data breach

The Guardian Data Protection

Sensitive information given by government staff to officials in man’s Middle East home country The Home Office has paid out £15,500 in compensation after admitting handing over sensitive information about an asylum seeker to the government of his Middle East home country, a move which could have endangered his life and that of his family. The settlement relates to confidential proof of his persecution in his home country which was wrongly shared with the authorities there.

article thumbnail

What is the Best Way to Manage Records and Documents?

Record Nations

Most people use the terms “Records” and “Documents” interchangeably. However, there are some important, yet different, aspects of each. Where records aren’t used regularly, they are used to provide evidence of events. Documents are active files that need to be available for people to access and edit. Now what? You have records that you are […].

Access 75
article thumbnail

A Popular Crime-Predicting Algorithms Performed Worse Than Mechanical Turks in One Study

WIRED Threat Level

When researchers put a popular criminal justice algorithm up against a bunch of Mechanical Turks, they came out about even.

article thumbnail

Is Healthcare Ready to Comply With GDPR?

Data Breach Today

This edition of the ISMG Security Report takes a look at how ready healthcare organizations are for GDPR compliance. Also featured: comments from Alberto Yepez of Trident Capital on the 2018 outlook for information security companies and a summary of the latest financial fraud trends.

GDPR 124
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Putting AI-enhanced analytics at the heart of retail customer experience

OpenText Information Management

Last Sunday, my husband and I went to visit our daughter. As we drove, my cell informed me that we were 30 minutes from our destination. How did it know? I hadn’t told it where we were going – there wasn’t an appointment on my calendar. The cell had worked out this was a trip … The post Putting AI-enhanced analytics at the heart of retail customer experience appeared first on OpenText Blogs.

article thumbnail

Start on the Path to M-12-18 Compliance

Gimmal

The past few years have seen many changes in the ways federal agencies are directed to maintain records, with a particular emphasis on digital records.

article thumbnail

Triton Malware Details Show the Dangers of Industrial System Sabotage

WIRED Threat Level

New details about Triton malware should put industrial systems and critical infrastructure on notice.