Sat.May 19, 2018 - Fri.May 25, 2018

article thumbnail

Blockchain Unchained - Discovering its Potential in Information Management

AIIM

Blockchain is the hot topic of the IT industry – the explosive and rapid growth of BitCoin has taken the obscure technology of distributed ledgers into mainstream consciousness. But the question we want to ask is “ Does Blockchain have a role to play in Information Management? Does it have a role beyond cryptocurrencies? ”. The short answer to that question is yes, and it could become one of the most important innovations for our industry in decades.

article thumbnail

History Hub: A 21st Century Model for Archival Reference

Archives Blogs

When the National Archives launched History Hub in January 2016, we hoped it would be a game-changing way to provide access to information and diverse sources of expertise. I’m pleased to share that what started out as an experimental project has become an active community of researchers and experts. The idea for History Hub began with research into how organizations can best communicate with and serve their audiences.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

‘Significant’ FBI Error Reignites Data Encryption Debate

WIRED Threat Level

FBI stats about inaccessible cellphones were inflated, undermining already controversial bureau claims about the threat of encryption.

article thumbnail

Legacy Content Migration: Urgent Need is Largely Invisible

Weissman's World

Fun fact: an estimated 75% of today’s content management solutions were installed before the year 2010 – meaning that most organizations are now depending upon systems that at best are dated, and at are worst dangerously close end-of-life. This being the case, you’d think that folks would be working hard to move their legacy content […]. The post Legacy Content Migration: Urgent Need is Largely Invisible appeared first on Holly Group.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

FBI Seizes Domain Controlling 500,000 Compromised Routers

Data Breach Today

Sinkholing Should Help Mitigate 'VPN Filter' Outbreak At least 500,000 routers, mostly located in Ukraine, have been infected with "VPN Filter" malware that experts believe is a prelude to a massive cyberattack. But the FBI has reportedly sinkholed the control domain for the router botnet, which should help contain the potential damage.

189
189

More Trending

article thumbnail

Stealthy, Destructive Malware Infects Half a Million Routers

WIRED Threat Level

Cisco researchers discover a new router malware outbreak that might also be the next cyberwar attack in Ukraine.

Security 111
article thumbnail

How to solve four common challenges when outsourcing records to the cloud – Part 2

TAB OnRecord

In last week’s blog post we explored some of the common challenges faced by organizations when storing records in the cloud. We learned that when looking for a cloud storage provider, you need to consider issues of compliance and legal control over records. In part two of our post, we explore two more challenges and [.] Read More. The post How to solve four common challenges when outsourcing records to the cloud – Part 2 appeared first on TAB Records Management Blog | TAB OnRecord.

Cloud 103
article thumbnail

GDPR a Litmus Test for Cross-Border Privacy Attitudes

Data Breach Today

Rather Than Honor Europeans' Data Privacy Rights, Some Organizations Exit EU To judge by the flood of GDPR-themed email hitting inboxes, Europe's privacy law has been designed to ensure that you say "yes" to companies that monetize the buying and selling of your personal details, regardless of whether you remember ever having done business with them before.

GDPR 157
article thumbnail

Dominic Cummings is the true cowardly face of the Brexiters | Nick Cohen

The Guardian Data Protection

Vote Leave’s director refuses to go before the Commons. He fears the truth will out Dominic Cummings is just a troll. He may have trolled the whole country and changed the course of British history, but he’s still the man with an egg for a face, who screams everyone must be accountable for their actions – everyone except him. MPs who want to question Cummings about the finances of his Vote Leave campaign are “grandstanding” fools spreading “fake news”.

IT 112
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

A Location-Sharing Disaster Shows How Exposed You Really Are

WIRED Threat Level

The failures of Securus and LocationSmart to secure location data are the failures of an entire industry.

Security 111
article thumbnail

RPA - Is it the Answer to Our Dreams of Easier Business Automation?

AIIM

I’ve been involved in some way or another in the world of business process automation (BPM) for over twenty years. I was the author of AIIM’s first BPM training course back in 2006. I’m a big fan of the idea of reengineering business processes, but there is no getting away from the fact that BPM projects are complex and scary – they require buy-in from the top (which is always difficult) and are seldom inexpensive undertakings.

article thumbnail

GDPR Compliance for US Healthcare: What You Need to Know

Data Breach Today

Strict HIPAA compliance is a great preparation for compliance with the European Union's General Data Protection Regulation, which will be enforced starting May 25, according to attorneys Robert Stankey and Adam Greene, who provide compliance insights in an in-depth interview.

article thumbnail

'I felt exposed online': how to disappear from the internet

The Guardian Data Protection

Worried about what’s out there about you? You’re not alone. But is it even possible to become a digital ghost? Early one morning last year, before the birds were up, Tio Bucard, his wife and children skittered down the path from their home in a tiny French village towards a black SUV, its engine running. As Bucard drove to the local airport, he checked his rear-view mirror every few moments to see that he was still being followed by Frank Ahearn , a 54-year-old American with a peppery beard and

Privacy 111
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

How the LAPD Uses Data to Predict Crime

WIRED Threat Level

The Los Angeles Police Department is using "predictive policing" to prevent crime, but this innovative approach has its problems.

IT 111
article thumbnail

Most Expensive Data Breaches Start with Third Parties: Report

Dark Reading

Data breach costs increased 24% for enterprise victims and 36% for SMBs from 2017 to 2018, researchers found.

article thumbnail

Sharing HIPAA Fines With Victims: Will It Ever Happen?

Data Breach Today

HITECH Act Mandated Sharing the Wealth, But Rulemaking Has Stalled Will federal regulators finally tackle long overdue rulemaking related to a HITECH Act provision calling for the Department of Health and Human Services to share money collected from HIPAA settlements and penalties with breach victims?

IT 153
article thumbnail

What is GDPR and how will it affect you?

The Guardian Data Protection

The EU’s General Data Protection Regulation comes into force this week – here’s what it means You could be forgiven for thinking that Europe’s General Data Protection Regulation (GDPR) is a law created to fill your inbox with identikit warnings from every company you have ever interacted with online that “the privacy policy has changed” and pleas to “just click here so we can stay in touch”.

GDPR 108
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

You Can Send Invisible Messages With Subtle Font Tweaks

WIRED Threat Level

Researchers have developed a new technique called FontCode that hides secrets in plain sight.

Security 110
article thumbnail

See you at the ARMA Canada Conference!

TAB OnRecord

Are you attending the ARMA Canada 2018 Conference in Vancouver next week? If so, please stop by and visit us at booth #25. You can: play our Going Digital Quiz for a chance to win an instant prize get our latest white paper, Lessons from the Front-lines of Digital Transformation learn how TAB’s solutions can [.] Read More. The post See you at the ARMA Canada Conference!

article thumbnail

Europe's Strong GDPR Privacy Rules Go Into Full Effect

Data Breach Today

It's May 25: Do You Know What Your Data Protection Polices Are? The EU's General Data Protection Regulation has gone into full effect as of May 25, 2018. After a two-year grace period following the passage of the legislation, member states' data privacy watchdogs are now enforcing the strong privacy rules, which offer worldwide protection for Europeans.

Privacy 150
article thumbnail

Facebook and Google targeted as first GDPR complaints filed

The Guardian Data Protection

Companies have forced users into agreeing to new terms of service, says EU consumer rights organisation Facebook and Google have become the targets of the first official complaints of GDPR noncompliance, filed on the day the privacy law takes effect across the EU. Across four complaints, related to Facebook, Instagram, WhatsApp and Google’s Android operating system, European consumer rights organisation Noyb argues that the companies have forced users into agreeing to new terms of service, in br

GDPR 106
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

After Meltdown and Spectre, Another Scary Chip Flaw Emerges

WIRED Threat Level

A new processor vulnerability known as Speculative Store Bypass could expose user data on a huge swath of devices.

Security 110
article thumbnail

Google to Delete 'Secure' Label from HTTPS Sites

Dark Reading

Google acknowledges HTTPS as the Internet standard with plans to remove 'secure' from all HTTPS sites.

article thumbnail

Malware Attacks: A Tale of Two Healthcare Incidents

Data Breach Today

Time for Detection, Mitigation Can Vary Widely Depending on Circumstances Two recently disclosed malware attacks in the healthcare sector illustrate that detection and mitigation of such attacks can be rapid, or it can take many months.

IT 145
article thumbnail

Last-minute frenzy of GDPR emails unleashes 'torrent' of spam – and memes

The Guardian Data Protection

Inboxes around the world are clogging up as deadline for companies to comply with new regulations nears A last-minute flurry of emails from companies trying to retain customers ahead of the deadline for Europe’s new General Data Protection Regulation (GDPR) has prompted a slew of complaints - and memes - on social media. Friday is the last day for companies to comply with GDPR regulations and as a result, inboxes around the world are clogging up with emails warnings that “the privacy policy has

GDPR 105
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Don’t Freak Out About That Amazon Alexa Eavesdropping Situation

WIRED Threat Level

You should certainly understand the risks of having a smart speaker in your home, but there’s a perfectly good explanation for how that rogue message might have gotten sent.

Risk 109
article thumbnail

Communicating About Cybersecurity in Plain English

Lenny Zeltser

When cybersecurity professionals communicate with regular, non-technical people about IT and security, they often use language that virtually guarantees that the message will be ignored or misunderstood. This is often a problem for information security and privacy policies, which are written by subject-matter experts for people who lack the expertise.

article thumbnail

Spectre and Meltdown Flaws: Two More Variants Discovered

Data Breach Today

More CPU Flaws Found in Intel, AMD, ARM and IBM Power Processors Researchers have discovered two new Spectre/Meltdown variants: variant 3a, a rogue system register read, and variant 4, a speculative store bypass. Some AMD, ARM, Intel and IBM Power chips have the flaws, which attackers could exploit to steal sensitive data. Some fixes have already been shipped.

140
140