Showing posts with label DATA SECURITY. Show all posts
Showing posts with label DATA SECURITY. Show all posts

Thursday, 2 December 2021

WEBINAR: Data Privacy using AI-Driven Data Catalogs - 14 December 2021

 

Sponsored News from Data Science Central

Hitachi

Data Privacy using AI-Driven Data Catalogs

What: free online webinar exclusively for IT Pros
When: Tuesday, December 14th, 8:30 AM PST / 11:30 AM EST
Where: From the convenience of your personal computer 

Register Now

Do you have your Enterprise’s data privacy under control? Do you know what datasets are sensitive and who has access?

Many companies are behind on privacy and regulatory compliance (GDPR, CCPA, etc.).

Legacy tools and manual processes are inaccurate and error prone and can force you to choose between delaying data access by months, or increased compliance risk.

Join us for this latest Data Science Central webinar to learn how an AI-driven data catalog can automate sensitive data discovery and apply business rules to help get data privacy and compliance under control.


Speakers:

Nerea Palacio, Data Protection Officer & Senior Regional Counsel, Hitachi Vantara
Glen Martin, Lumada SaaS Master Product Management, Hitachi Vantara

Wednesday, 8 July 2020

What is the Zero Trust Model (ZTM) @BanafaAhmed via @Datafloq

The Zero Trust Model of information security simplifies how information security is conceptualized by assuming there are no longer “trusted” interfaces, applications, traffic, networks, or users. It takes the old model— “trust but verify”—and inverts it because recent breaches have proven that when an organisation trusts, it doesn’t verify. The zero-trust model of information security means “verify and never trust.”

I found this fascinating as this is not my area of expertise. When you think about it, the approach makes perfect sense.

Friday, 24 January 2020

5 trends to expect in the new big data protection revolution by Andrea Little Limbago via @infomgmt

Instead of regurgitating many of the dominant predictions around tech buzzwords such as quantum computing, 5G, IoT, the cloud, and artificial intelligence, let’s instead focus on the inherent duality of technology.

A great article to use to compare with your own plans and strategy.

Friday, 20 December 2019

What is data privacy, really, and what tools are required for it? by Ernest Martinez via @infomgmt

Data privacy requirements necessitate not only identifying the location and nature of impacted data, but also the flow and transformation that it takes throughout the application landscape.

A great explanation and worth a read just to make sure you really understand the topic.

Thursday, 25 July 2019

PayPal-backed blockchain aims to help banks verify digital IDs by Penny Crosman via @infomgmt

A new project backed by the government of Luxembourg could ultimately be influential in the U.S., where banks have been slow to develop a shared platform for digital identities.

This sounds like n interesting project which can definitely have a far-reaching impact on the way we are identified in the future for banking and any other financial transaction. However, there are alternatives in development so it's a bit of a race. You can refer to this CCN article to read a little more about them.

Wednesday, 10 July 2019

SLIDESHOW: 8 steps to recover quickly (and well) from a data breach by/via @infomgmt

Cyber attacks are happening with increasing regularity, and health organizations need a recovery plan.

This is very useful to have and could be helpful in drawing up for organisations own plan with more detailed information.

Monday, 17 June 2019

The Stanford Cyber Policy Centre report on securing the integrity of future American elections by Michael McFaul via @FSIStanford

The Stanford Cyber Policy Centre released a report (pdf here) late last week that details Russian interference in the 2016 election and makes recommendations on how to secure the integrity of future elections.

I think if you only want to read the summary of recommendations you can go to page 7 in the PDF.

Friday, 14 June 2019

Cloud customers, not providers, responsible for most cyber security incidents by Bob Violino via @infomgmt

Cybersecurity incidents in the cloud are most often caused by a cloud customer’s employees, rather than by the provider themselves, according to a recent report from security company Kaspersky Lab.

In many ways, this is great news for the cloud providers as it reinforces their assertions that data is very secure in their environment.

Friday, 24 May 2019

BSA releases new Software Security Framework to guide developers by David Weldon via @infomgmt


Tommy Ross, BSA’s cybersecurity expert, talks with Information Management about the new Framework and how it will impact software development.

I found this interesting and it is always good to have an idea of how things are going to change in the future so you can plan for it now.

Friday, 29 March 2019

Success with the IoT starts with understanding 'Thing Management' by Timothy Chou via @infomgmt

Most organizations think of asset management as the practice of tracking and managing IT devices such as routers, switches, laptops and smartphones. But that’s now only part of the picture.

Great opinion piece by Timothy that gives some great examples and good advice.

Friday, 22 March 2019

SLIDESHOW: 7 emerging data security and risk management trends by David Weldon via @infomgmt

Risk appetite statements, governance frameworks and password-less authentication are among the growing trends that will impact security, privacy and risk leaders, says Gartner.

Some good observations that are definitely worth thinking about.

Wednesday, 27 February 2019

6 best practices for using data to set yearly targets by Kayla Matthews via @infomgmt

Raw, unfiltered data can be a goldmine for businesses looking to expand their knowledge of the average consumer. However, the data has to be legible first, and this practice takes work.

I agree with most of the points in this article. I would like to point out that making sure that the data you use is as accurate as possible is a complete MUST. You should only make business decisions on data that is accurate and can be relied upon.

I would implore you to think outside of the box. You might be surprised at the uses of some data and what it can tell you. Just make sure that you use good test data when you try these things out so you can really make sure you know what is happening.

Friday, 15 February 2019

How Silicon Valley Puts the ‘Con’ in Consent by/via @nytopinion

If no one reads the terms and conditions, how can they continue to be the legal backbone of the internet?

A very interesting take on all the terms and conditions that we know we should read as much as they all assume you won't.

Wednesday, 16 January 2019

WEBINAR: Data Prep & Automated ML: Better Predictions For Consensus - 22 January 2019

Registration Header
Data Prep & Automated ML: Better Predictions For Consensus
Join us for the latest DSC Webinar on January 22nd, 2019
register-now
Financed smartphones are a magnet for identity theft, leaving retailers in the digital and telecommunication industry vulnerable to fraud. Consensus, a Target-owned subsidiary, has developed a highly accurate solution to identify fraud at the point-of-sale before it happens.

In this latest Data Science Central webinar, you will learn how Consensus put together agile processes on a cloud analytic solution leveraging Trifacta data preparation and DataRobot automated machine learning to prevent fraud.

Attendees will learn:
  • How Consensus developed an AWS cloud-based solution
  • The role of data preparation in supplying accurate data for machine learning models
  • How automated machine learning can drive more accurate predictions
  • Consensus’s time-saving ROI from building models, deploying them on AWS, and the improvement in accuracy and recall
Speakers:
David McNamara, Lead Product Specialist -- Trifacta
Harrison Lynch, Sr. Director of PM -- Consensus Corporation
Rajiv Shah, Data Scientist -- DataRobot

Hosted by: Bill Vorhies, Editorial Director -- Data Science Central
 
Title: Data Prep For Data Ops: How To Select & Deploy
Date: Tuesday, January 22nd, 2019
Time: 9 AM - 10 AM PST
Register here


Monday, 31 December 2018

Your Apps Know Where You Were Last Night, and They’re Not Keeping It Secret by various authors via @nytimes

Smartphone location data is being sold. It’s supposed to be anonymous, but the data shows how personal it is.

This is scary and could well be something to be cautious with - maybe a time to revisit app permissions on your mobile?

Friday, 7 December 2018

How better standards can decrease data security spending needs by Anna Johansson via @infomgmt

Recently, standardisation at the highest levels has opened new doors for companies seeking cyber security solutions that don’t cost a fortune and work better than current approaches

Anna makes some good points - chaos with data, systems or interfaces add needless complexity to an organisation that can give areas that could be exploited. You need ordered data with tight controls.

Thursday, 29 November 2018

Tips for protecting your data when losing an employee by Jason Park via @infomgmt

Most employers would be surprised to learn that departing internal employees can pose a much bigger threat to their business’s data security than external hackers.

These are really good guidelines. Some organisations take away access as soon as an employee tenders their resignation or at least limits it - however I would sound a small caution there - if someone is that keen to take a copy of data they will do that BEFORE they resign - so you have to have good auditing and great control over data transfers/data sticks in your office.

Monday, 12 November 2018

The Future of Cybersecurity: How to Protect Your Business from Great Data Risks by/via @Datafloq

A data breach can have severe consequences for your business (and your career). And a recent OTA report concluded that 93% of data breaches were entirely avoidable. Taking these steps to avoid a data breach can save you a lot of headaches down the road.

Good list of steps to make sure you are aware of and doing something about - definitely something to use as a light level list to take forward and expand from.

Tuesday, 2 October 2018

Meet the little-known group inside of Google that's fighting terrorists and trolls all across the web by Julie Bort via @BIUK

Here's a look at the team at Alphabet that interviews ISIS defectors, protects news and political websites from distributed denial of service (DDoS) attacks, and combats radicalism.

This is a great initiative and something that is not widely known - you certainly don't see it publicised on the main news channels.

Tuesday, 18 September 2018

Key steps to ensure data protection amidst the growth of mobile apps by Nathan Sykes via @infomgmt

As data protection regulations grow and the laws become more stringent, it has also become much more difficult to follow them because of widespread mobile adoption.

Some useful pointers to steer you in the right direction.