article thumbnail

Securing AI Deployments: Striking the Balance

OpenText Information Management

If it’s not accurate, accessible, and secure, organizations won’t get the desired results. Since AI relies on data to learn and improve, organizations must ensure their data is accurate, accessible, and secure. At the same time, we must also protect sensitive information and deliver accurate information to the user.

article thumbnail

Chat control: The latest EU plans to outlaw encryption and introduce telecommunications surveillance via Mailbox.org

IG Guru

The post Chat control: The latest EU plans to outlaw encryption and introduce telecommunications surveillance via Mailbox.org appeared first on IG GURU. Check out the article here.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Failure to encrypt mobile devices results in $3 million HIPAA settlement

IG Guru

A US health system is forced to settle as a result of not encrypting mobile phones. The post Failure to encrypt mobile devices results in $3 million HIPAA settlement appeared first on IG GURU. Check out the source or the report here. Photo by Yura Fresh on Unsplash.

article thumbnail

New Intel CPU Flaw Exploits Hyper-Threading to Steal Encrypted Data

IG Guru

November 3rd, 2018 A team of security researchers has discovered another serious side-channel vulnerability in Intel CPUs that could allow an attacker to sniff out sensitive protected data, like passwords and cryptographic keys, from other processes running in the same CPU core with simultaneous multi-threading feature enabled.

article thumbnail

$8 million penalty to NYDFS – and another case of over-retention

Data Protection Report

NYDFS found that GGT’s data classification policies and procedures “were incomplete, thus resulting in significant concerns regarding GGT’s ability to adequately assess its compliance with the Cybersecurity Regulation’s access privilege, data disposal, and encryption requirements.

article thumbnail

Everteam Solutions for Enhanced Cyber Security

Everteam

Having this value and playing this massive role, data must be well managed and highly secured, especially that today’s data is digitized and stored in virtual repositories that might become vulnerable and risky with the fast evolvement of technology. Cyber Attacks and Cyber Security Threats . Everteam Security .

article thumbnail

Hong Kong: Data Security Measures Guidance published by the PCPD

Data Protection Report

As data breaches and cyber attacks continue to surge and attackers become more sophisticated, organisations are well aware that the need for robust data security measures is becoming increasingly important. The Guidance Note sets out seven key recommendations for data security measures to data users in managing data security.