Sat.May 19, 2018 - Fri.May 25, 2018

article thumbnail

Blockchain Unchained - Discovering its Potential in Information Management

AIIM

Blockchain is the hot topic of the IT industry – the explosive and rapid growth of BitCoin has taken the obscure technology of distributed ledgers into mainstream consciousness. But the question we want to ask is “ Does Blockchain have a role to play in Information Management? Does it have a role beyond cryptocurrencies? ”. The short answer to that question is yes, and it could become one of the most important innovations for our industry in decades.

article thumbnail

History Hub: A 21st Century Model for Archival Reference

Archives Blogs

When the National Archives launched History Hub in January 2016, we hoped it would be a game-changing way to provide access to information and diverse sources of expertise. I’m pleased to share that what started out as an experimental project has become an active community of researchers and experts. The idea for History Hub began with research into how organizations can best communicate with and serve their audiences.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

‘Significant’ FBI Error Reignites Data Encryption Debate

WIRED Threat Level

FBI stats about inaccessible cellphones were inflated, undermining already controversial bureau claims about the threat of encryption.

article thumbnail

Legacy Content Migration: Urgent Need is Largely Invisible

Weissman's World

Fun fact: an estimated 75% of today’s content management solutions were installed before the year 2010 – meaning that most organizations are now depending upon systems that at best are dated, and at are worst dangerously close end-of-life. This being the case, you’d think that folks would be working hard to move their legacy content […]. The post Legacy Content Migration: Urgent Need is Largely Invisible appeared first on Holly Group.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

FBI Seizes Domain Controlling 500,000 Compromised Routers

Data Breach Today

Sinkholing Should Help Mitigate 'VPN Filter' Outbreak At least 500,000 routers, mostly located in Ukraine, have been infected with "VPN Filter" malware that experts believe is a prelude to a massive cyberattack. But the FBI has reportedly sinkholed the control domain for the router botnet, which should help contain the potential damage.

188
188

More Trending

article thumbnail

How to solve four common challenges when outsourcing records to the cloud – Part 2

TAB OnRecord

In last week’s blog post we explored some of the common challenges faced by organizations when storing records in the cloud. We learned that when looking for a cloud storage provider, you need to consider issues of compliance and legal control over records. In part two of our post, we explore two more challenges and [.] Read More. The post How to solve four common challenges when outsourcing records to the cloud – Part 2 appeared first on TAB Records Management Blog | TAB OnRecord.

Cloud 103
article thumbnail

Most GDPR emails unnecessary and some illegal, say experts

The Guardian Data Protection

Many firms have the required consent already; others don’t have consent to send a request The vast majority of emails flooding inboxes across Europe from companies asking for consent to keep recipients on their mailing list are unnecessary and some may be illegal, privacy experts have said, as new rules over data privacy come into force at the end of this week.

GDPR 112
article thumbnail

GDPR a Litmus Test for Cross-Border Privacy Attitudes

Data Breach Today

Rather Than Honor Europeans' Data Privacy Rights, Some Organizations Exit EU To judge by the flood of GDPR-themed email hitting inboxes, Europe's privacy law has been designed to ensure that you say "yes" to companies that monetize the buying and selling of your personal details, regardless of whether you remember ever having done business with them before.

GDPR 135
article thumbnail

Don’t Freak Out About That Amazon Alexa Eavesdropping Situation

WIRED Threat Level

You should certainly understand the risks of having a smart speaker in your home, but there’s a perfectly good explanation for how that rogue message might have gotten sent.

Risk 89
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

See you at the ARMA Canada Conference!

TAB OnRecord

Are you attending the ARMA Canada 2018 Conference in Vancouver next week? If so, please stop by and visit us at booth #25. You can: play our Going Digital Quiz for a chance to win an instant prize get our latest white paper, Lessons from the Front-lines of Digital Transformation learn how TAB’s solutions can [.] Read More. The post See you at the ARMA Canada Conference!

article thumbnail

Dominic Cummings is the true cowardly face of the Brexiters | Nick Cohen

The Guardian Data Protection

Vote Leave’s director refuses to go before the Commons. He fears the truth will out Dominic Cummings is just a troll. He may have trolled the whole country and changed the course of British history, but he’s still the man with an egg for a face, who screams everyone must be accountable for their actions – everyone except him. MPs who want to question Cummings about the finances of his Vote Leave campaign are “grandstanding” fools spreading “fake news”.

IT 112
article thumbnail

A New Look at Email Security

Data Breach Today

File-less malware is a huge security challenge for organizations today, and traditional email security controls aren't sufficient to meet the challenge. Burke Long of Lastline offers insight on a new way to approach email security.

Security 124
article thumbnail

Stealthy, Destructive Malware Infects Half a Million Routers

WIRED Threat Level

Cisco researchers discover a new router malware outbreak that might also be the next cyberwar attack in Ukraine.

Security 109
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Communicating About Cybersecurity in Plain English

Lenny Zeltser

When cybersecurity professionals communicate with regular, non-technical people about IT and security, they often use language that virtually guarantees that the message will be ignored or misunderstood. This is often a problem for information security and privacy policies, which are written by subject-matter experts for people who lack the expertise.

article thumbnail

'I felt exposed online': how to disappear from the internet

The Guardian Data Protection

Worried about what’s out there about you? You’re not alone. But is it even possible to become a digital ghost? Early one morning last year, before the birds were up, Tio Bucard, his wife and children skittered down the path from their home in a tiny French village towards a black SUV, its engine running. As Bucard drove to the local airport, he checked his rear-view mirror every few moments to see that he was still being followed by Frank Ahearn , a 54-year-old American with a peppery beard and

Privacy 110
article thumbnail

Sharing HIPAA Fines With Victims: Will It Ever Happen?

Data Breach Today

HITECH Act Mandated Sharing the Wealth, But Rulemaking Has Stalled Will federal regulators finally tackle long overdue rulemaking related to a HITECH Act provision calling for the Department of Health and Human Services to share money collected from HIPAA settlements and penalties with breach victims?

IT 128
article thumbnail

How the LAPD Uses Data to Predict Crime

WIRED Threat Level

The Los Angeles Police Department is using "predictive policing" to prevent crime, but this innovative approach has its problems.

IT 98
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

GDPR Day is Here!

Data Matters

Whether you are marking today with a glass of champagne, a shot of whiskey, or a hot cup of tea, today marks a significant day for privacy professionals world-wide. Here’s to all of the privacy professionals who have put in so many hours to prepare for the GDPR, fully effective as of Friday May 25, 2018 at midnight in Brussels; that is 6 PM eastern on Thursday, May 24th for toasting purposes.

GDPR 60
article thumbnail

What is GDPR and how will it affect you?

The Guardian Data Protection

The EU’s General Data Protection Regulation comes into force this week – here’s what it means You could be forgiven for thinking that Europe’s General Data Protection Regulation (GDPR) is a law created to fill your inbox with identikit warnings from every company you have ever interacted with online that “the privacy policy has changed” and pleas to “just click here so we can stay in touch”.

GDPR 107
article thumbnail

GDPR Compliance for US Healthcare: What You Need to Know

Data Breach Today

Strict HIPAA compliance is a great preparation for compliance with the European Union's General Data Protection Regulation, which will be enforced starting May 25, according to attorneys Robert Stankey and Adam Greene, who provide compliance insights in an in-depth interview.

article thumbnail

A Location-Sharing Disaster Shows How Exposed You Really Are

WIRED Threat Level

The failures of Securus and LocationSmart to secure location data are the failures of an entire industry.

Security 101
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

FCC Asks for Input After ACA International v. FCC

Data Matters

The TCPA bar has been reeling ever since the D.C. Circuit overturned a couple of key FCC rules in ACA International v. FCC , including the FCC’s overbroad interpretation of the definition of an autodialer. However, the ruling still left several key provisions in place that facilitate the potential for significant liability and sow uncertainty for everyday business and compliance operations.

article thumbnail

Facebook and Google targeted as first GDPR complaints filed

The Guardian Data Protection

Companies have forced users into agreeing to new terms of service, says EU consumer rights organisation Facebook and Google have become the targets of the first official complaints of GDPR noncompliance, filed on the day the privacy law takes effect across the EU. Across four complaints, related to Facebook, Instagram, WhatsApp and Google’s Android operating system, European consumer rights organisation Noyb argues that the companies have forced users into agreeing to new terms of service, in br

GDPR 105
article thumbnail

Europe's Strong GDPR Privacy Rules Go Into Full Effect

Data Breach Today

It's May 25: Do You Know What Your Data Protection Polices Are? The EU's General Data Protection Regulation has gone into full effect as of May 25, 2018. After a two-year grace period following the passage of the legislation, member states' data privacy watchdogs are now enforcing the strong privacy rules, which offer worldwide protection for Europeans.

Privacy 122
article thumbnail

Facebook Is Beefing Up Its Two-Factor Authentication

WIRED Threat Level

The update, now available to most users, comes several months after Facebook was criticized for spamming users' two-factor authentication phone numbers.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Supreme Court Finds Expectation of Privacy for Rental Car Driver

Data Matters

In its preview of hot privacy and cybersecurity topics for 2018, Data Matters noted that this year the Supreme Court was scheduled to decide a number of cases with potentially substantial privacy implications. This past week, the Court issued its opinion in one such case, Byrd v. United States , a case concerning “whether a driver has a reasonable expectation of privacy in a rental car when he or she is not listed as an authorized driver on the rental agreement.

Privacy 60
article thumbnail

Last-minute frenzy of GDPR emails unleashes 'torrent' of spam – and memes

The Guardian Data Protection

Inboxes around the world are clogging up as deadline for companies to comply with new regulations nears A last-minute flurry of emails from companies trying to retain customers ahead of the deadline for Europe’s new General Data Protection Regulation (GDPR) has prompted a slew of complaints - and memes - on social media. Friday is the last day for companies to comply with GDPR regulations and as a result, inboxes around the world are clogging up with emails warnings that “the privacy policy has

GDPR 103
article thumbnail

Are You Ready for Next-Gen PKI?

Data Breach Today

Explosive growth in network scale and complexity demands a next generation Public Key Infrastructure (PKI) management platform. Ted Shorter of CSS says security leaders must prepare now to take full advantage of next-gen PKI solutions.

Security 113