IoT's moment of truth -- who can secure the data flows?
Collaboration 2.0
OCTOBER 27, 2016
Innovative Internet of Things efforts need the maturity and experience of industrial internet service providers to secure data platforms and drive growth.
Collaboration 2.0
OCTOBER 27, 2016
Innovative Internet of Things efforts need the maturity and experience of industrial internet service providers to secure data platforms and drive growth.
Imperial Violet
JUNE 25, 2016
The C standard (ISO/IEC 9899:2011) has a sane-seeming definition of memcpy (section 7.24.2.1): The memcpy function copies n characters from the object pointed to by s2 into the object pointed to by s1. Apart from a prohibition on passing overlapping objects, I think every C programmer understands that. However, the standard also says (section 7.1.4): If an argument to a function has an invalid value (such as a value outside the domain of the function, or a pointer outside the address space of th
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Data Protector
NOVEMBER 16, 2016
Two years ago I blogged about an unsettling experience I had with Apollo, a firm that had confused me as to what they were really all about. Since then, I’ve had a number of emails from people who have had similar experiences. Today, I’m reprinting (most of) the most recent one – which comments about an organisation called Apollo-Transitions. Surely, this is not the same company as the Apollo company I had encountered?
John Battelle's Searchblog
OCTOBER 22, 2016
The post Google Capitulates to Facebook’s Identity Machine: Is This Good News For The Open Web? appeared first on John Battelle's Search Blog. Long time readers of this site know that once a year I make predictions, and revisit those I made the year before. But it’s not often I look back farther than one year to see if perhaps I was just a tad too early.
Advertiser: ZoomInfo
AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.
JKevinParker
SEPTEMBER 12, 2016
Today's workforce is increasingly distributed, increasingly mobile, and increasingly expecting telework options. This equates to more people working beyond the corporate walls and beyond the corporate IT firewall. But how can organizations offer such flexibility without losing control of their information? This is the subject of a guest post I authored for AIIM's Digital Landfill blog.
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Robert's Db2
MARCH 31, 2016
Have you ever looked at a DB2 Statistics Long report generated by your DB2 monitor? If so, you might have seen a section containing information about the CPU consumption of the various DB2 address spaces. It would look something like the example below, which reflects activity over a one-hour period of time (similar information might be available as well via an online display provided by your DB2 monitor).
CGI
NOVEMBER 10, 2016
The growing importance of dynamic pricing and rating in insurance. shobana.lv@cgi.com. Fri, 11/11/2016 - 01:07. On June 20, 2016, CGI held a roundtable discussion on dynamic rating and pricing in the insurance industry that involved nearly all major Dutch insurers. The starting point of the evening was a presentation from a pricing executive at a large European retail company who shared his company’s journey to dynamic pricing.
Hunton Privacy
JUNE 24, 2016
On June 23, 2016, the UK held a referendum to decide upon its continued membership in the European Union. The outcome has resulted in the decision for the UK to withdraw its membership from the European Union. Despite the result, data protection standards are unlikely to be affected. The full details of how and when the UK will negotiate its exit from the EU is still unclear.
Attensa
APRIL 22, 2016
It started with a simple question posed by a senior marketing exec during a staff meeting. B lindsided a couple of times in the course of a month by information related to market events that that should have known, the exec went on to ask: “If the President of the United States can get a daily briefing on the state of the world, why can’t we get one on our own company?
Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage
When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m
Elie
JULY 11, 2016
Here are the 5 ways I bulletproof my credit cards against identity theft, and you can use them yourself very easily. As a bonus, at the end of the post I have added an experimental step to defend against the recent chip downgrading attack.
Collaboration 2.0
NOVEMBER 14, 2016
HCL's 'Great Digital Leap Forward' will keep astute client partners ahead of US offshoring BPO political protectionism
Imperial Violet
SEPTEMBER 18, 2016
Security protocols often assume an accurate, local clock (e.g. TLS, Kerberos, DNSSEC and more). It's a widely accepted assumption when designing protocols but, for a lot of people, it just isn't true. We find good evidence that at least 25% of all certificate errors in Chrome are due to a bad local clock. Even when the local clock is being synchronised, it's very likely to be using unauthenticated NTP.
Data Protector
OCTOBER 29, 2016
Given what can only be described as an omnishambles of security breaches, is there much more that the ICO can do to warn data controllers of the risks they should take account of? Probably not. What might be helpful though, is data controllers refreshing their memories about the guidance which has emerged from the ICO over the past few years. In terms of the top 7 ICO publications, (virtual) copies of the following guides really ought to be at every DPO’s fingertips: 7.
Advertisement
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
John Battelle's Searchblog
JANUARY 3, 2016
The post Predictions 2016: Apple, Tesla, Google, Medium, Adtech, Microsoft, IoT, and Business on a Mission appeared first on John Battelle's Search Blog. Twelve years of making predictions doesn’t make writing them any easier, regardless of my relatively good showing in 2015. In fact, I briefly considered taking the year off – who am I to make predictions anyway?
JKevinParker
NOVEMBER 3, 2016
At the 2016 Information Governance Conference , I presented on "How to Plan a Successful Information Management Solution Implementation". Get my slide deck from SlideShare. Related: Check out my Reflections on the 2016 InfoGovCon. Summary Start with information strategy, architecture, and governance. Recruit an executive champion and cross-departmental partners.
PerezBox
NOVEMBER 9, 2016
On November 8th, 2016, Google introduced a new feature to Chrome that would blacklist repeat offenders. Once Safe Browsing has designated a site as a Repeat Offender, the webmaster will. Read More. The post Google Introduces new Repeat Offender Blacklist appeared first on PerezBox.
ForAllSecure
JULY 26, 2016
By David Brumley. In 2008 I started as a new assistant professor at CMU. I sat down, thought hard about what I had learned from graduate school, and tried to figure out what to do next. My advisor in graduate school was Dawn Song , one of the top scholars in computer security. She would go on to win a MacArthur "Genius" Award in 2010. She's a hard act to follow.
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
CGI
DECEMBER 21, 2016
Strategic information management in the digital age. ravi.kumarv@cgi.com. Thu, 12/22/2016 - 01:09. Corporate information management has undergone a steady evolution over the past three decades. Organizations that have been quick to embrace new strategies and tools are surviving and thriving in continuously changing business landscapes. Those that have not embraced the value of information are going under and facing a crowded, competitive marketplace filled with companies looking to pounce on the
Hunton Privacy
APRIL 14, 2016
On April 14, 2016, after four years of drafting and negotiations, the long awaited EU General Data Protection Regulation (“GDPR”) has been adopted at the EU level. Following the EU Parliament’s Committee on Civil Liberties, Justice and Home Affairs’ vote earlier this week and the EU Parliament in plenary session, the GDPR is now officially EU law and will directly apply in all EU countries, replacing EU and national data protection legislation.
Brandeis Records Manager
DECEMBER 21, 2016
George Despres, CRM. Program Director for University Records Management, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). As if we don’t have enough challenges, controlling information today. Part of our culture, at least here in the U.S., has embraced the acceptance of non-truths and the repudiation of facts in the record.
Elie
MARCH 8, 2016
This blog post recounts how moving this site to a fast joyful responsive design with a lot of images improved session duration by 104% and decreased bounce rate by 53%
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Collaboration 2.0
NOVEMBER 6, 2016
Digital platforms that are fit for today's specific business purpose are essentially far more agile, open and flexible versions of the old proprietary enterprise suites
Imperial Violet
MAY 15, 2016
( These are notes that I wrote up from a talk that I gave at the National Academies Forum on Cyber Resilience. You can tell that it was in Washington, DC because of the “cyber”. I wasn't quite sure how technical to pitch this talk so it's relatively introductory; regular readers probably know all this. This isn't a transcript of what I said, but I try to hit the main points in my notes. ).
Roger's Information Security
OCTOBER 10, 2016
This morning I read an article on Good HouseKeeping (don’t make fun, it was a link on one of the news links that get pushed in your face on my start page. I think it was Bing. I hate the news links but like the pictures). It’s interesting to see what security items make it into websites for ‘normal’ people. The scare headline read “A New iPhone Hack Lets Anyone Use Your Phone” It reports that Siri by default allows some actions even when the phone is locked
John Battelle's Searchblog
FEBRUARY 15, 2016
The post The NewCo-BigCo Shift or, These Nine Things Will Change Business Forever appeared first on John Battelle's Search Blog. Addressing the crowd at Dollar Shave before interviewing CEO Michael Dubin during NewCo LA last November. ( cross posted from NewCo ). Thanks to NewCo , I’ve gotten out of the Bay Area bubble and visited more than a dozen major cities across several continents in the past year.
Advertisement
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
JKevinParker
DECEMBER 5, 2016
I'm very excited for another AIIM Conference! AIIM17 will be held this March in Orlando. If you are an information professional, you will really benefit from attending the AIIM Conference. It is on my very short list of must-attend events in our profession. I have attended the past two AIIM Conferences and have loved every minute. This year I am teaching a pre-con course on Electronic Records Management (ERM).
PerezBox
AUGUST 8, 2016
The most intriguing debate to come out of last weeks security conferences in Vegas stems from a presentation by FTC Chief Technologist Lorrie Cranor at PasswordsCon 2016, part of the BSides security conference in Las. Read More. The post Thinking Through The Password Expiration Discussion appeared first on PerezBox.
Scary Beasts Security
NOVEMBER 14, 2016
Overview A vulnerability and a separate logic error exist in the gstreamer 0.10.x player for NSF music files. Combined, they allow for very reliable exploitation and the bypass of 64-bit ASLR, DEP, etc. The reliability is provided by the presence of a turing complete “scripting” inside a music player. NSF files are music files from the Nintendo Entertainment System.
Let's personalize your content