Sat.Nov 25, 2017 - Fri.Dec 01, 2017

article thumbnail

In praise of. Elizabeth Stafford

Data Protector

Many of even the most dedicated members of the UK’s data protection fraternity may not have heard of Elizabeth Stafford. And that’s a shame. Why? Because she, along with a small band of colleagues in the Department of Digital, Culture, Media & Sport are doing great things. How? Because, as Head if EU Data Flows, not only is she working on ensuring UK businesses can rely on unencumbered data flows between the UK and the EU post Brexit, she’s also one of the key DDCMS officials working hard be

Privacy 120
article thumbnail

A decade of content management change

AIIM

As Jerry Garcia might say, “What a long strange trip it’s been.”. Think about the incredible changes going on in the content management space: A decade of Content Management change. Content Management 2007. Content Management 2017. Driven by IT and specialists. Driven by end users and the business. Departments at large companies. Any size company. Usability & mobility an afterthought.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

4 essential RIM practices to prepare for mergers and acquisitions

TAB OnRecord

Records management teams have a key role to play in mergers, acquisitions and divestitures. Whether big or small, the sale of any corporate asset must be supported by accurate and complete records. These provide buyers with historical information, compliance documentation and other crucial records. Most importantly, complete and accurate records help demonstrate the full value… Read More.

article thumbnail

Here's the NSA Agent Who Inexplicably Exposed Critical Secrets

WIRED Threat Level

The Justice Department has struck a plea deal with Nghia Hoang Pho, a programmer in the NSA's elite operations unit, for taking his highly classified work home with him.

Security 111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

New Report: Discovering Consumer Attitudes Toward Connected Car Security

Thales Cloud Protection & Licensing

At Thales eSecurity we are always eager to obtain data on how the world perceives threats to personal data, because it has the potential to inform us on how to make our everyday lives more safe and secure. Together with an independent firm, we recently conducted a survey of 1,000 consumers across the U.S. and UK and found that ownership of internet-connected cars is on the rise.

Security 103

More Trending

article thumbnail

UK police to lose phone and web data search authorisation powers

The Guardian Data Protection

Change is one of several to snooper’s charter law proposed by ministers in attempt to comply with European court ruling Senior police officers are to lose the power to self-authorise access to personal phone and web browsing records under a series of late changes to the snooper’s charter law proposed by ministers in an attempt to comply with a European court ruling on Britain’s mass surveillance powers.

Access 103
article thumbnail

North Korea’s Missile Test Puts the Entire US in Range

WIRED Threat Level

The bad news: Tuesday's missile test shows that North Korea's ICBM can likely hit the US. The slightly less bad news: It's still a long way off from actually doing so.

IT 110
article thumbnail

Here's What I'm Telling US Congress about Data Breaches

Troy Hunt

Last week I wrote about my upcoming congressional testimony and wow - you guys are awesome! Seriously, the feedback there was absolutely sensational and it's helped shape what I'll be saying to the US Congress, including lifting specific wording and phrases provided by some of you. Thank you! As I explained in that first blog post, I'm required to submit a written testimony 48 hours in advance of the event.

article thumbnail

Putting VMware’s Cloud Certification Platform to the Test with Thales’s Vormetric Data Security Manager

Thales Cloud Protection & Licensing

Certifying the full compatibility of the Thales Vormetric Data Security Manager (DSM) with the VMware platform was a critical element in ensuring our mutual customers’ satisfaction. Traditionally, this certification has been a cumbersome, and sometimes expensive task, requiring equipment, time and resources. Now, with the rollout of VMware’s Cloud Certification Platform, those times are over.

Cloud 83
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

UK class action accuses Google of unlawfully harvesting personal data

The Guardian Data Protection

Lawsuit claims tech firm bypassed iPhone default privacy settings between June 2011 and February 2012, affecting 5.4m people More than 5 million people in the UK could be entitled to compensation from Google if a class action against the internet giant for allegedly harvesting personal data is successful. A group led by the executive director of consumer body Which?

article thumbnail

North Korea's Latest Missile Test Was Even Scarier Than It Seemed

WIRED Threat Level

Further analysis of North Korea's latest ICBM launch shows that the country can likely land a nuclear weapon anywhere in the continental United States.

IT 111
article thumbnail

Needless Panic Over a Wi-FI Network Name

Schneier on Security

A Turkish Airlines flight made an emergency landing because someone named his wireless network (presumably from his smartphone) "bomb on board.". In 2006, I wrote an essay titled " Refuse to be Terrorized." (I am also reminded of my 2007 essay, " The War on the Unexpected." A decade later, it seems that the frequency of incidents like the one above is less, although not zero.

IT 82
article thumbnail

What are the best books on information security?

IT Governance

There are few resources that can match the in-depth, comprehensive detail of a good book. As Charles William Eliot, the famed president of Harvard University, once said, “Books are the quietest and most constant of friends; they are the most accessible and wisest of counselors, and the most patient of teachers.”. Books also serve as valuable resources for IT professionals looking to broaden their knowledge.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Former National Security Council Legal Adviser Christopher Fonzone Joins Sidley in Washington, D.C.

Data Matters

Washington, D.C. – Sidley Austin LLP is pleased to announce that Christopher Fonzone, former National Security Council (NSC) legal adviser and deputy assistant and counsel to President Obama, has joined the firm as a partner in its Washington, D.C. office. He will be a member of Sidley’s global Privacy and Cybersecurity practice. Mr. Fonzone has years of experience advising high-level government officials on some of the most pressing national security issues of our time.

article thumbnail

Supreme Court Must Understand That Cell Phones Aren’t Voluntary

WIRED Threat Level

Opinion: The US argues that police can access cell phone records freely because customers volunteer that data. But cell phones are no longer optional.

Access 111
article thumbnail

Cloud Insecurity: Tens of Thousands of Full Credit Histories Exposed in Amazon S3 Bucket

eSecurity Planet

The data is unusually sensitive, including full credit card and bank account numbers as well as images of Social Security cards and driver's licenses.

Cloud 85
article thumbnail

Different types of cyber attacks

IT Governance

A lot of organisations have experienced cyber attacks this year, but how were these companies actually hit? There are a number of different ways a criminal hacker can implement a cyber attack, and they all depend on what the criminal hacker is trying to gain. Some criminal hackers want data, whereas others want a ransom fee to be paid. The most common types of cyber attack are malware and vectors.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Providing transactional data to your Hadoop and Kafka data lake

IBM Big Data Hub

The data lake may be all about Apache Hadoop, but integrating operational data can be a challenge. Learn how to deliver real-time feeds of transactional data from mainframes and distributed environments directly into Hadoop clusters and make constantly changing data more available.

76
article thumbnail

How Bots Broke the FCC's Public Comment System During the Net Neutrality Debate

WIRED Threat Level

The FCC's net neutrality public comment period was overrun with bots, making it all but impossible for any one voice to be heard. That's not how this is supposed to work.

IT 98
article thumbnail

Spreading OpenText cheer: the Philippines

OpenText Information Management

The holidays are fast approaching and our OpenText colleagues are starting to get festive in their offices around the world, In this post, OpenText employees Aileen Cacatian, Daryl Ancheta, Michelle Maquiso, Keith James Macapagal and Maria Cristine Sarmiento from the DGO Manila Team write about their favourite customs and traditions during the holiday season in … The post Spreading OpenText cheer: the Philippines appeared first on OpenText Blogs.

75
article thumbnail

Man-in-the-Middle Attack against Electronic Car-Door Openers

Schneier on Security

This is an interesting tactic, and there's a video of it being used: The theft took just one minute and the Mercedes car, stolen from the Elmdon area of Solihull on 24 September, has not been recovered. In the footage, one of the men can be seen waving a box in front of the victim's house. The device receives a signal from the key inside and transmits it to the second box next to the car.

IT 75
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

List of data breaches and cyber attacks in November 2017 – 59 million records leaked

IT Governance

This month’s list is a little thin compared with other months this year. Is that a good sign? Maybe. What’s certainly not a good sign, however, is the number of data breaches caused by organisations’ own employees. Month after month, I find myself reporting more on organisational mistakes than on the efforts of cyber criminals. Basic information security practices – and I really do mean basic – are ignored over and over again, and for what?

article thumbnail

Apple MacOS High Sierra Security Flaw Lets Anyone Get Root Access, No Password Required

WIRED Threat Level

A Turkish company found a glaring flaw in Apple's desktop operating system that gives anyone deep access, no password required.

Passwords 112
article thumbnail

Spreading OpenText Cheer: Brazil

OpenText Information Management

The holidays are fast approaching, and our employees are starting to get festive in their offices around the world! In this post, OpenText employee Luis Barbosa talks about his favourite holiday customs and traditions that take place in his home city of Sao Paulo, Brazil. What is your favourite part about this time of year? … The post Spreading OpenText Cheer: Brazil appeared first on OpenText Blogs.

72
article thumbnail

The 10 Records Scheduling Commandments

The Schedule

And it came to pass that Brad was preparing materials for records management training sessions, as one does; And the frustration with the records management practices put in place by his predecessor did boil over. Then did Brad throw together a quick-and-dirty records management graphic, and he shared it on Twitter for a lark. Lo! That graphic became Brad’s most RT’ed Records Management-related post ever, for Brad hath toucheth a nerve.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Compliant data freedom: Oxymoron or opportunity?

IBM Big Data Hub

Many large organizations still have a large amounts of data on-premise, but also need data from a public cloud. Regardless of where the data resides, organizations can build a trusted data source from which they can drive key business insights and derive significant sustained advantages. Here's how.

Cloud 72
article thumbnail

The US Should Modernize Election Systems to Prevent Hacking

WIRED Threat Level

Opinion: Two senators from opposing parties argue that voting machines should be considered critical infrastructure, and funded accordingly.

Security 102
article thumbnail

Ten things impacting the world: climate change

OpenText Information Management

The burning of fossil fuels and other activities have released enormous amounts of gases into the atmosphere. These emissions have warmed the Earth’s surface, and the oceans have absorbed 80 percent of this additional heat. As the ocean warms, the density decreases and the volume of the ocean increases. This is called thermal expansion and … The post Ten things impacting the world: climate change appeared first on OpenText Blogs.