Sat.Jan 06, 2018 - Fri.Jan 12, 2018

article thumbnail

Speaking of: Blockchain (with Alan Pelz-Sharpe)

Weissman's World

If a picture is worth 1000 words, then what’s a 15-minute video worth? Tons, especially when the subject is blockchain, and the guest expert is Alan Pelz-Sharpe! Join our discussion of the disruptive force blockchain will prove to be in records and information governance. The post Speaking of: Blockchain (with Alan Pelz-Sharpe) appeared first on Holly Group.

article thumbnail

Toymaker VTech Settles FTC Privacy Lawsuit For $650,000

Data Breach Today

Message From FTC to Toymakers: Don't Mess With Kids' Privacy One of the most alarming breaches of 2015, involving Hong Kong toymaker VTech, has resulted in a $650,000 settlement with the U.S. Federal Trade Commission. It's a warning that internet of things security shortcomings - especially involving children's personal data - will have business consequences.

Privacy 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What a Difference a Year Makes

AIIM

For AIIM, 2017 began with this provocative question: In an Artificial Intelligence world, where deep learning completely shrinks the development time while amping up the computing power, do content management capabilities become irrelevant and obsolete? Certainly the terminology and label for “what we do” was debatable, but the limits of traditional ECM in the new digital economy, and the need for change were not.

ECM 98
article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

India's Aadhaar implementation is the largest biometric system in the world, holding about 1.2 billion locals' data. It's operating in an era of increasingly large repositories of personal data held by both private companies and governments alike. It's also an era where this sort of information is constantly leaked to unauthorised parties; last year Equifax lost control of 145.5 million records on US consumers (this started a series events which ultimately led to me testifying in front of Congre

Security 111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How Meltdown and Spectre Were Independently Discovered By Four Research Teams At Once

WIRED Threat Level

The uncanny coincidences among the Meltdown and Spectre discoveries raise questions about "bug collisions"—and the safety of the NSA's hidden vulnerability collection.

Security 111

More Trending

article thumbnail

Steven Clark AIIM18 Speaker Interview

AIIM

Here’s your chance to get to know our AIIM18 speakers a little better before you get to San Antonio and see them live. We can’t wait to see you April 11-13th. Name Steven Clark. Email steven_f_clark@raytheon.com. LinkedIn Profile [link]. Job Title Company Record Manager. Company Raytheon. Please provide one or two points that you will mention during your session Content analytics can be used to your advantage but it does take time and dedication.

article thumbnail

Profile of the Month: Cindy Provin, Chief Executive Officer

Thales Cloud Protection & Licensing

Cindy Provin is a 20-year veteran at Thales. This month, she became the CEO for Thales eSecurity. Previously, she served as the President for Thales eSecurity Americas, and Chief Strategy & Marketing Officer for Thales eSecurity. In her new role as CEO, Cindy will be responsible for leading a world-class organization and delivering a portfolio of security solutions to protect data wherever it is created, shared or stored.

article thumbnail

Skype Introduces End-to-End Encrypted Texts and Voice

WIRED Threat Level

After years of lingering questions about Skype's commitment to protecting user data, it will soon offer end-to-end encryption to its 300 million monthly users.

article thumbnail

Meltdown and Spectre Forecast: Patch Now and Keep Patching

Data Breach Today

Activate Available Browser Defenses Without Delay, Security Experts Warn Patch or perish to protect against Meltdown and Spectre attacks, and prepare to keep patching as Intel, AMD and ARM, as well as makers of devices running Apple, Google and Windows operating systems, including Apple iOS and Android smartphones and tablets, continue to refine their fixes.

Security 139
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Tammy Mackenzie AIIM18 Speaker Interview

AIIM

Here’s your chance to get to know our AIIM18 speakers a little better before you get to San Antonio and see them live. We can’t wait to see you April 11-13th. Name Tammy Mackenzie. Email Tammymackenziee@gmail.com. LinkedIn Profile [link]. Job Title Document Manager. Company Aecon. Please provide one or two points that you will mention during your session. 1) Planning leads to success. 2) Have the Right people, right places, right time.

article thumbnail

Data protection bill amended to protect security researchers

The Guardian Data Protection

Exemption added after researchers said efforts to demonstrate inadequate anonymisation could fall foul of law The government is to amend the data protection bill to protect security researchers who work to uncover abuses of personal data, quelling fears that the bill could accidentally criminalise legitimate research. The move follows a Guardian report on the concerns , and has been welcomed by one of the researchers who raised the alarm.

article thumbnail

Congress Renews FISA Warrantless Surveillance Bill For Six More Years

WIRED Threat Level

The House of Representatives Thursday strengthened spying powers authorized under Section 702 of the 2008 FISA Amendments Act.

Security 111
article thumbnail

Backdoored in 30 Seconds: Attack Exploits Intel AMT Feature

Data Breach Today

Physical Access Plus Default AMT Credentials Equals Takeover, F-Secure Warns An attacker who gains physical access to a corporate PC with an Intel chip could exploit the built-in Active Management Technology to backdoor the system in about 30 seconds, unless default AMT credentials have been changed, Finnish security firm F-Secure warns.

Access 136
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Gina Smith-Guidi AIIM18 Speaker Interview

AIIM

Name Gina Smith-Guidi. Email gina.guidi@edmonton.ca. Job Title Principal Information Manager. Company City of Edmonton. Please provide one or two points that you will mention during your session. - Implement solutions that work behind the scenes and do not change the way people work - Approach challenges with a flexible, unconventional mindset. Where do you see the information management industry in 5 years?

article thumbnail

Best of TAB 2017 part 4: the top guides

TAB OnRecord

Today, we wrap up a four-part series on the top RIM resources of 2017, as chosen by your colleagues. In this final installment, we bring you the year’s most popular records management guides. These informative and practical tools cover the following common issues: document imaging, RIM software, and functional classification. 1. A best practice template [.

article thumbnail

How the Government Hides Secret Surveillance Programs

WIRED Threat Level

A new report from Human Rights Watch sheds light on a troubling law enforcement practice called “parallel construction.”.

article thumbnail

Carphone Warehouse Breach: 'Striking' Failures Trigger Fine

Data Breach Today

Attacker Breached WordPress Installation Outdated by 6 Years Mobile phone retailer Carphone Warehouse has been hit with one of the largest fines ever imposed by Britain's data privacy watchdog after an attacker breached its outdated WordPress installation, exposing 3 million customers' and 1,000 employees' personal details.

Retail 136
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Daniel Abdul AIIM18 Speaker Interview

AIIM

Here’s your chance to get to know our AIIM18 speakers a little better before you get to San Antonio and see them live. We can’t wait to see you April 11-13th. Name Daniel Abdul. Email daniel.abdul@gmail.com. LinkedIn Profile [link]. Job Title VP Data Solutions Strategy and Commercial Solutions. Company UHG. Please provide one or two points that you will mention during your session.

article thumbnail

AI in Cybersecurity: Where We Stand & Where We Need to Go

Dark Reading

How security practitioners can incorporate expert knowledge into machine learning algorithms that reveal security insights, safeguard data, and keep attackers out.

article thumbnail

WhatsApp Encryption Security Flaws Could Allow Snoops to Slide Into Group Chats

WIRED Threat Level

German researchers say that a flaw in the app's group-chat feature undermines its end-to-end encryption promises.

article thumbnail

Performance Hit: Meltdown and Spectre Patches Slow Systems

Data Breach Today

Intel, Microsoft and Linux Confirm Slowdowns - Especially For Servers, Older PCs Fixes for the Meltdown and Spectre vulnerabilities are leading to decreased processor performance, triggering cloud service and data center slowdowns. All Windows servers - plus older PCs - as well as Linux servers appear to be experiencing noticeable slowdowns.

Cloud 136
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Envisioning new and hidden realities with data and augmented reality—a digital “twin city” example

CGI

Envisioning new and hidden realities with data and augmented reality—a digital “twin city” example. pooja.cs@cgi.com. Wed, 01/10/2018 - 15:25. Ten years ago, I had three devices connected to my home Internet, used intermittently, allowing my family and me to be more efficient, flexible, informed, and entertained. Now, I have 33 devices, collectively connected to the Internet, 24x7.

Mining 78
article thumbnail

How to Comply with GDPR

eSecurity Planet

IT experts share some their tips on updating IT systems and business processes to comply with the EU's strict new data privacy regulations.

GDPR 89
article thumbnail

Tech Companies Are Complicit in Censoring Iran Protests

WIRED Threat Level

Opinion: Google, Twitter, and Signal should take steps to ensure their tools aren’t restricting Iranian’s free speech.

Security 107
article thumbnail

Patch Now or Risk GDPR Fines Later, Regulator Warns

Data Breach Today

Failures Discovered After Privacy Law Takes Effect Face Retroactive Punishment Following the alert over Meltdown and Spectre vulnerabilities, the U.K. Information Commissioner's Office is warning that failures to patch today could be punished with fines under GDPR, once enforcement of the data protection law begins later this year.

GDPR 132
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Think you’re not susceptible to phishing? Think again

IT Governance

Phishing is big business for cyber criminals. According to PhishMe’s Enterprise Phishing Resiliency and Defense Report 2017 , phishing attacks rose by 65% last year, with the average attack costing mid-sized companies $1.6 million (about £1.2 million). This is despite many respondents claiming that they are no longer fooled by cyber criminals’ most common techniques to trick people into clicking malicious links and opening emails.

article thumbnail

Carphone Warehouse fined for 'striking' number of failures that led to data breach

The Guardian Data Protection

Information Commissioner’s Office fines company £400,000 for ‘concerning’ security issues following investigation of hack of 3m customers’ data Carphone Warehouse has been fined £400,000 by the Information Commissioner’s Office for a series of “systemic failures” uncovered following a data breach in 2015. The ICO described the “number of distinct and significant inadequacies in the security arrangements” of Carphone Warehouse as “striking”, and said that it was “ particularly concerning that a n

article thumbnail

Meltdown and Spectre Vulnerability Fixes Have Started, But Don't Solve Everything

WIRED Threat Level

Meltdown and Spectre Fixes Arrive—But Don't Solve Everything.

Security 132