Sat.Apr 14, 2018 - Fri.Apr 20, 2018

article thumbnail

Do you know what data your organisation holds?

IT Governance

How can you be sure that your organisation is compliant with the EU General Data Protection Regulation (GDPR) if you don’t know exactly what data you hold? You might think it’s impossible to be unaware of data you store, but you’d be surprised. Information has a way of being left on hard drives, appropriated by other departments or reproduced in different formats.

GDPR 53
article thumbnail

Securing Elections

Schneier on Security

Elections serve two purposes. The first, and obvious, purpose is to accurately choose the winner. But the second is equally important: to convince the loser. To the extent that an election system is not transparently and auditably accurate, it fails in that second purpose. Our election systems are failing, and we need to fix them. Today, we conduct our elections on computers.

Security 101
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Looking at Information Management Through a Different Lens

AIIM

Organizations need to think about how the advent of the third wave of exponential change – the drive to Artificial Intelligence and Machine Learning - will require them to look at the future through a different set of lenses. I’d like to offer three of these “lenses” – I’m sure there are more – but I think these three are ones that those in this community are uniquely prepared to tackle.

article thumbnail

Managing Third-Party Risks

Data Breach Today

Bitsight's Tom Turner on Security Ratings Managing third-party risks is more critical than ever, says Tom Turner of BitSight Technologies, who discusses the urgency of communicating that to the board.

Risk 111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The Teens Who Hacked Microsoft's Videogame Empire—And Went Too Far

WIRED Threat Level

Among those involved in David Pokora's so-called Xbox Underground, one would become an informant, one would become a fugitive, and one would end up dead.

Security 112

More Trending

article thumbnail

Surviving Disruption -- Strategies for the Era of AI and Machine Learning

AIIM

Truly disruptive moments occur only once in a generation. They occur when the cumulative inertia of technology innovation combines to disrupt business models. And the heart of disruption is ultimately when radical technology changes are standardized and then incorporated into new business models. Let’s take a look at a couple. The first ones on this graphic are the telephone and electricity.

article thumbnail

Health Data Breach Tally Spikes in Recent Weeks

Data Breach Today

A Wide Assortment of Hacker, Insider Incidents Reported The reporting of major health data breaches has spiked in recent weeks, with a wide variety of incidents reported. So what's behind the surge?

article thumbnail

Number of Facebook users whose data was compromised 'far more than 87m', MPs told

The Guardian Data Protection

Former Cambridge Analytica employee gives evidence before parliamentary committee Far more than 87 million people may have had their Facebook data harvested by Cambridge Analytica, according to evidence from former employee Brittany Kaiser. Speaking to the Commons digital, culture, media and sport select committee, Kaiser said Cambridge Analytica had a suite of personality quizzes designed to extract personal data from the social network, of which Aleksandr Kogan’s This Is Your Digital Life app

article thumbnail

Six eco-friendly RIM tips that could save you money

TAB OnRecord

Protecting the environment can translate into an improved bottom line, from the cost savings associated with resource conservation, to benefits of increased consumer and shareholder confidence. In this blog we will be sharing six ways to incorporate environmentally friendly practices into your organization’s RIM processes. 1. The more you throw away, the more you can [.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Guest Post--Will Automation Make Us More Human Centric?

AIIM

Automation in the workplace is already well underway. The McKinsey Global Institute estimates that up to 50% of workplace tasks could be fully automated by 2055 , if not before. For employees, this can be a daunting concept, as increased automation in professional settings could lead to job loss on a mass scale. Yet, automation is the workplace might not be all doom and gloom, depending on how we look at it.

article thumbnail

Battling Social Engineering Attacks

Data Breach Today

KnowBe4's Stu Sjouwerman on the Need to Foster 'Human Firewalls' Social engineering attacks, including ransomware, business email compromise and phishing, are a problem that can never be solved, but rather only managed via a continued focus on security awareness training, says Stu Sjouwerman, CEO of KnowBe4.

article thumbnail

Facebook admits tracking users and non-users off-site

The Guardian Data Protection

Statement comes as company faces US lawsuit over facial recognition feature launched in 2011 and planned to expand to EU Facebook has released more information on the social media platform’s tracking of users off-site, after its CEO, Mark Zuckerberg, failed to answer questions about the process from US politicians and as the company prepares to fight a lawsuit over facial recognition in California.

Security 106
article thumbnail

8 Ways Hackers Monetize Stolen Data

Dark Reading

Hackers are craftier than ever, pilfering PII piecemeal so bad actors can combine data to set up schemes to defraud medical practices, steal military secrets and hijack R&D product information.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Guest Post -- Perspectives on Automation and Employment

AIIM

Automation will have a global impact like nothing else we have ever seen. This is not to say that it is altogether a new idea. Decades ago, science minded dreamers from around the globe would paint philosophical dreamscapes that relayed a world built on the backs of human ingenuity. Starting in the early 20th century, automation introduced itself to the world in the form of massive materials factories that could speed up the productivity of workers and create form perfect products for mass consu

article thumbnail

Embracing Change in Cybersecurity

Data Breach Today

Tom Kellerman of Carbon Black on Ovecoming Failing Architectures Security leaders need to embrace security change to overcome failing architectures that have evolved over the last decade, says Tom Kellerman, chief cybersecurity officer at Carbon Black.

article thumbnail

'Was the Brexit poll compromised? We may need a public debate about that'

The Guardian Data Protection

Damian Collins, chair of the Commons committee looking into data breaches, says we are in the foothills of a global story Damian Collins is a few minutes late for our interview in his House of Commons office and immediately apologises. Even in normal times, as chairman of the digital, culture, media and sport committee, he has a lot on his plate. But over the last few weeks, since the Observer broke the story of the Facebook data scandal , the spotlight has fallen on this 44-year-old backbench T

article thumbnail

Why AI is the key to robust anti-abuse defenses

Elie

This post explains why artificial intelligence (AI) is the key to building anti-abuse defenses that keep up with user expectations and combat increasingly sophisticated attacks. This is the first post of a series of four posts dedicated to provide a concise overview of how to harness AI to build robust anti-abuse protections. The remaining three posts delve into the top 10 anti-abuse specific challenges encountered while applying AI to abuse fighting, and how to overcome them.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

How Russian Facebook Ads Divided and Targeted US Voters Before the 2016 Election

WIRED Threat Level

New research shows just how prevalent political advertising was from suspicious groups in 2016—including Russian trolls.

Security 111
article thumbnail

Huge Malware Distribution Network Crippled

Data Breach Today

'EITest' Shuffled as Many as 2 Million Users a Day to Malware Security researchers are claiming at least a temporary victory over an enormously productive malware distribution scheme that shuffled as many as 2 million users a day from legitimate websites to malware.

Security 118
article thumbnail

Facebook to start asking permission for facial recognition in GDPR push

The Guardian Data Protection

Users will be asked to review information about targeted advertising but some say opting out is deliberately difficult Facebook has started to seek explicit consent from users for targeted advertising, storage of sensitive information, and – for the first time in the EU – application of facial recognition technology as the European general data protection regulation (GDPR) is due to come into force in just over a month.

GDPR 96
article thumbnail

Harnessing AI to combat fraud and abuse - AI is the key to robust defenses

Elie

This post explains why artificial intelligence (AI) is the key to building anti-abuse defenses that keep up with user expectations and combat increasingly sophisticated attacks. This is the first post of a series of four posts dedicated to provide a concise overview of how to harness AI to build robust anti-abuse protections. The remaining three posts will delve into the top 10 anti-abuse specific challenges encountered while applying AI to abuse fighting, and how to overcome them.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

The Security Risks of Login With Facebook

WIRED Threat Level

New research from Princeton University exposes vulnerabilities in the social network's universal login API.

Risk 110
article thumbnail

Preparing for Mid-Term Elections

Data Breach Today

FBI's Elvis Chan on Efforts to Bolster Cybersecurity of Social Media Stung by signs of Russian influencing of the 2016 presidential election, the FBI is working with social media companies to bolster cybersecurity in advance of the 2018 mid-term election. Elvis Chan of the FBI describes these efforts.

article thumbnail

Cambridge Analytica scandal 'highlights need for AI regulation'

The Guardian Data Protection

Lords report stresses need for artificial intelligence to be used for the common good Britain needs to lead the way on artificial intelligence regulation, in order to prevent companies such as Cambridge Analytica setting precedents for dangerous and unethical use of the technology, the head of the House of Lords select committee on AI has warned. The Cambridge Analytica scandal, Lord Clement-Jones said, reinforced the committee’s findings, released on Monday in the report “AI in the UK: ready, w

article thumbnail

How to successfully harness AI to combat fraud and abuse

Elie

While machine learning is integral to innumerable anti-abuse systems including spam and phishing detection, the road to reap its benefits is paved with numerous abuse-specific challenges. Drawing from concrete examples this session will discuss how these challenges are addressed at Google and providea roadmap to anyone interested in applying machine learning to fraud and abuse problems.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Social Media Thread-Hijacking is Nothing More Than Targeted Spam

Troy Hunt

I have a vehement dislike of spam. Right there, that's something you and I have in common because I'm yet to meet a person who says "well actually, I find those Viagra emails I receive every day kinda useful" We get bombarded by spam on a daily basis and quite rightly, people get kinda cranky when they have to deal with it; it's an unwanted invasion that takes a little slice of unnecessary mental processing each time we see it.

article thumbnail

US, UK: Russian Hackers Deeply Embedded in Routers, Switches

Data Breach Today

Advice: Update Outdated Protocols, Equipment The U.S. and U.K. warned Monday that Russian hackers have compromised critical internet infrastructure with the aim of spying, extracting intellectual property and gaining footholds for future cyberattacks.

107
107
article thumbnail

The Guardian view on Facebook’s business: a danger to democracy | Editorial

The Guardian Data Protection

The conceit of data mining firms is that they could win elections by moulding electorates based on new identities and value systems – a process accelerated by the echo chamber of social media Facebook sees itself as a commercial firm, not a social institution, and behaves accordingly. It makes money based on the depth and scale of its users’ data. That is why no one should be surprised that a former executive from the controversial data-mining firm Cambridge Analytica claimed in parliament that

Mining 79