article thumbnail

German BSI Forces Microsoft to Disclose Security Measures

Data Breach Today

Company Publishes Information on Double Key Encryption Under Regulatory Pressure Following a legal intervention made by the German federal cybersecurity agency, Microsoft has disclosed additional information on encryption measures it adopted to secure its customer data.

article thumbnail

CIPL Releases White Paper on Accountable AI Best Practices

Hunton Privacy

On February 21, 2024, the Centre for Information Policy Leadership at Hunton Andrews Kurth LLP (“CIPL”) published a white paper on Building Accountable AI Programs: Mapping Emerging Best Practices to the CIPL Accountability Framework. Read the white paper on accountable AI programs.

Paper 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Impact of Remote Work and Cloud Migrations on Security Perimeters

Security Affairs

Cloud Security Challenges However, adopting cloud computing significantly expanded the attack surface for businesses, effectively dissolving the traditional network perimeter. This shift introduced new vulnerabilities, and conventional security measures designed to protect a well-defined, centralized perimeter were no longer enough.

Cloud 330
article thumbnail

Toyota presented PASTA (Portable Automotive Security Testbed) Car-Hacking Tool

Security Affairs

Takuya Yoshida from Toyota’s InfoTechnology Center and his colleague Tsuyoshi Toyama are members of a Toyota team that developed the new tool, called PASTA (Portable Automotive Security Testbed). You can download slides and the research paper from the following link: • Download Presentation Slides. • Download White Paper.

Security 279
article thumbnail

The Essential Guide to Analytic Applications

We interviewed 16 experts across business intelligence, UI/UX, security and more to find out what it takes to build an application with analytics at its core. Embedding dashboards, reports and analytics in your application presents unique opportunities and poses unique challenges.

article thumbnail

Two Scary (Anecdotal) Data Points: MRFs with White Paper/The Run on Ink Cartridges via i-SIGMA

IG Guru

Why people working from home could create organizational risk from simply printing and recycling paper. The post Two Scary (Anecdotal) Data Points: MRFs with White Paper/The Run on Ink Cartridges via i-SIGMA appeared first on IG GURU. Read more here.

Paper 98
article thumbnail

Toyota PASTA Car-Hacking Tool will be soon on GitHub

Security Affairs

Toyota plans to release the PASTA (Portable Automotive Security Testbed) Car-Hacking Tool on GitHub next month. Takuya Yoshida from Toyota’s InfoTechnology Center and his colleague Tsuyoshi Toyama are members of a Toyota team that developed the new tool, called PASTA (Portable Automotive Security Testbed). Source: Dark Reading.

Paper 279
article thumbnail

5 Early Indicators Your Embedded Analytics Will Fail

In this White Paper, Logi Analytics has identified 5 tell-tale signs your project is moving from “nice to have” to “needed yesterday.". Many application teams leave embedded analytics to languish until something—an unhappy customer, plummeting revenue, a spike in customer churn—demands change. But by then, it may be too late.

article thumbnail

7 Questions Every App Team Should Ask

You’ll learn: The seven requirements to include in your analytics evaluation How enhancing your analytics can boost user satisfaction and revenue What sophisticated capabilities to consider, including predictive analytics, adaptive security and integrated workflows Download the white paper to learn about the seven questions every application team should (..)