Logo

    dataprivacy

    Explore " dataprivacy" with insightful episodes like "#187 GenAI RAG Details", "Breaking Boundaries from Birmingham to Blockchain with Kryotech CEO JB Benjamin", "22 Gennaio 2024", "January 22, 2024" and "22 de enero de 2024" from podcasts like ""Embracing Digital Transformation", "Side Hustle City", "Abbracciare il digitale questa settimana", "Embracing Digital This Week" and "Abrazando lo Digital Esta Semana"" and more!

    Episodes (20)

    #187 GenAI RAG Details

    #187 GenAI RAG Details

    In part two of his interview with Eduardo Alvarez, Darren explores the use of GenAI LLMs and RAG (Retrieval Augmentation Generation) techniques to help organizations leverage the latest advancements in AI quickly and cost-effectively.

     Leveraging Language Model Chains


    In a landscape where accessible technologies are ubiquitous, operational efficiency sets an application apart. Be that as it may, handling an assortment of tasks with a single language model does not always yield optimal results, bringing us to the Language Model (LM) chains concept. 


    LM chains involve the integration of several models working simultaneously in a pipeline to improve user interaction with an application. Just as every task demands an integrating approach, every segment of your application may perform best with an individualized language model. Indeed, there's no one-size-fits-all policy when it comes to language models. Several real-world implementations are already capitalizing on the strength of multiple LMs working in harmony. 


     System Optimization and Data Veracity


    The holistic optimization of the system is an integral part of leveraging LM chains. Everything from choosing the perfect moment to deploy a large language model to selecting the ideal architecture for computing forms an essential part of this process. The right decisions can dramatically bolster system performance and improve operational efficiency.


    Integrating multiple models also opens novel avenues for research and development, particularly around data veracity within such setups. It poses fascinating challenges and opportunities ripe for exploration and discovery. 


     Maintaining Discreet Access to Data Privacy


    When discussing data privacy, it is essential to understand the balance between utilizing more extensive institutional databases and preserving private user information. Eduardo suggests maintaining discretionary control over database access, ensuring operational superiority and data privacy. 


     Rising Fusion of AI and Real Data Ops


    Predicting future trends, Eduardo anticipates a merger of accurate data and AI ops, which would resemble the blend of operational excellence and tool integration by configuration management engineers in the '90s. This blend translates into distributed heterogeneous computing in AI and shapes the future of AI ops.


     Concluding Thoughts


    Technology should invariably strive to simplify systems without sacrificing performance or efficiency. A thorough understanding of the available tools is a prerequisite to successfully leveraging them. Incorporating the LM chains in AI applications is a step in this direction, paving the way for an enriched user experience. Our conversation with Eduardo Alvarez underscores the importance of these insights in propelling the intriguing landscape of AI.

    Breaking Boundaries from Birmingham to Blockchain with Kryotech CEO JB Benjamin

    Breaking Boundaries from Birmingham to Blockchain with Kryotech CEO JB Benjamin

    Embark on a journey with JB Benjamin, the maverick CEO of Kryotech, whose ascent from the tough neighborhood of Birmingham to the pinnacle of the crypto universe epitomizes the spirit of the relentless side hustler.

    Our enlightening conversation tracks JB's eclectic career trajectory, from navigating product management in the legal sector to shaping minds in academia, and his insightful European escapades. His narrative is a powerful reminder that one's origins do not dictate their destiny. As we dissect the daunting cost of London life and the foresight essential for thriving in the volatile crypto landscape, you're in for a dose of reality served with a side of aspiration.

    The genesis story of Vox Messenger is no less than riveting, as we dive into the societal shifts that foretold its creation and the commitment to safeguarding privacy through ethical AI development at Kryotech. We cast a critical eye over the unsettling undercurrents of data manipulation within social media and consumer capitalism, drawing from landmark events like Brexit and the 2016 US Election. The conversation then pivots to the responsibility of tech titans, challenging the narrative of Silicon Valley and advocating for a more conscientious guardianship of technology that shapes our world.

    Finally, we delve into the profound implications of blockchain technology across industries and the burgeoning tension between innovation and privacy. This episode doesn't shy away from the tough conversations about the UK's eroding civil liberties, the omnipotence of corporations, and the nuanced role of AI in moderating online discourse. For the entrepreneurs listening, we share the unvarnished truth about the resilience required to forge your path. This is an episode packed with insights and reflections on technology, society, and the indomitable entrepreneurial spirit that continues to drive progress.

    As you're inspired to embark on your side hustle journey after listening to this episode, you might wonder where to start or how to make your vision a reality.  With a team of experienced marketing professionals and a track record of helping clients achieve their dreams, we are ready to assist you in reaching your goals. To find out more, visit www.reversedout.com

    Support the show

    Subscribe to Side Hustle City and join our Community on Facebook

    22 Gennaio 2024

    22 Gennaio 2024

    Preparati per le notizie sulla Trasformazione Digitale di questa settimana per il 22 gennaio 2024, che include storie sulla gestione dei dati, sulla cybersecurity e sull'intelligenza artificiale. Questa settimana, abbiamo notizie sui diritti sulla privacy dei dati in California, consigli sulla protezione della tua organizzazione da attacchi informatici legati all'IA e al calcolo quantistico, e uno sguardo su come l'IA viene utilizzata per assistere il governo nel prendere decisioni in tempo di guerra. Blog: https://embracingdigital.org/brief-EDW51-it Video: 

    January 22, 2024

    January 22, 2024

    Get ready for this week's Digital Transformation News for January 22, 2024, which features stories on data management, cybersecurity, and artificial intelligence. This week, we have news on data privacy rights in California, tips on protecting your organization from cyber-attacks related to AI and quantum computing, and a look at how AI is being used to assist the government in making wartime decisions. Blog: https://embracingdigital.org/brief-EDW51-en Video: 

    22 de enero de 2024

    22 de enero de 2024

    Prepárate para las noticias de Transformación Digital de esta semana para el 22 de enero de 2024, que presentan historias sobre gestión de datos, ciberseguridad e inteligencia artificial. Esta semana, tenemos noticias sobre los derechos de privacidad de datos en California, consejos para proteger tu organización de ciberataques relacionados con la inteligencia artificial y la computación cuántica, y un vistazo a cómo se está utilizando la inteligencia artificial para ayudar al gobierno en la toma de decisiones en tiempos de guerra. Blog: https://embracingdigital.org/brief-EDW51-es Video: 

    #177 Zero Trust Data with SafeLiShare

    #177 Zero Trust Data with SafeLiShare

    During this episode, Darren and SafeLishare CEO Shamim Naqvi discuss how confidential computing can be employed to create managed data-sharing collaborative environments in the cloud.

     The SafelyShare Revolution in Data Sharing and Confidentiality 


    Data sharing has always been a key issue when dealing with sensitive and confidential business information. The advanced technological solutions including SafelyShare have been tackling this problem, offering a controlled system for data access without violating data protection. The fundamental basis of this system is "Zero Trust", a unique strategy that doesn't assume trust for anyone and keeps control and monitoring at its core. 


     Harnessing the Power of Secure Enclaves


    A critical aspect of SafelyShare's approach is the use of secure enclaves, or trusted execution environments, ensuring a safe space for data sharing, authentication, and management. These enclaves are created with the help of specific confidential computing chipsets that fully enclose the shared data. With encryption practices implemented outside of these enclaves, data can only be decrypted once it enters the enclave, thereby providing an end-to-end encryption policy. The output exiting the enclave is also encrypted, adding another layer of security to protect the data.


    But challenges exist within this process. Not all online services incorporate a secure enclave in their operation, leading to a high demand for a more flexible, effective solution to confidential computing.


     The Hybrid Approach of Confidential Computing


    To address this issue, SafelyShare offers an approach that is best described as a hybrid model of confidential computing. To compensate for services that don't operate within secure enclaves, this methodology introduces the idea of 'witness execution.' In this scenario, the user places trust in the providers' guarantee of their competency and safe data handling. It's a kind of tacit agreement between the user and the remote service provider, making the confidential computing more feasible in the real world scenarios.


    This hybrid approach redefines the secure sharing paradigm in a world that's continuously evolving. With its elastic foundation, SafelyShare incorporates a profound understanding of the changing security parameters, making confidential computing adaptable and responsive to changing demands and realities.


     Conclusion: Revolutionizing Secure Data Sharing


    In essence, SafelyShare is the leading forerunner in the journey to making sensitive data sharing secure, efficient, and feasible. Navigating around traditional hurdles, it integrates hybrid confidential computing into its framework, achieving a unique blend of trust and practicality. The innovative approach of integrating witnessed computing into the process blurs the lines between full and partial trust, making data security more achievable and delivering a promising narrative for the future of data sharing and security.

    98 | The Importance of Digital Asset Inventories in Incident Response

    98 | The Importance of Digital Asset Inventories in Incident Response
    This episode of the ADCG Privacy and Cybersecurity Podcast features Ken Westin, Field CISO for Panther Labs. Ken has been in the cybersecurity field for over 15 years, working with companies to improve their security posture through threat hunting, insider threat programs, and vulnerability research. We discuss how the lack of good application and data inventories impact incident response. When data is spread across data centers, clouds, and SaaS providers, it becomes difficult to track and trace an incident and understand its impact, but it becomes especially hard if the data involves confidential or proprietary business data that is not tracked by privacy officers or if it includes sensitive data that may involve regulators. The recent MOVEit breach, which involved software used to transfer sensitive data between servers, systems, and applications, provided rich lessons in the need for data asset inventories and SIEMs that can correlate data across providers and platforms.

    95 | Data Privacy is Exploding: What You Need to Know & Do

    95 | Data Privacy is Exploding: What You Need to Know & Do
    This week’s podcast episode features Steve Britt, Counsel at Parker Poe and privacy expert to discuss the five state privacy laws that went into effect in 2023 and the TEN that have been enacted in 2023, how they vary, what they have in common, and this new “trend” to protect consumer health data (not HIPAA data). Steve also discusses the new requirement for Data Protection Assessments, expanded protections for children’s data, and regulatory risk factors and triggers. He ends with key takeaways and has provided a slide deck for listeners to download and follow along as they listen to the podcast (see adcg.org/podcast for supplemental materials on this episode).

    The Discussion: Inside the EU's Digital ID Wallet #17

    The Discussion: Inside the EU's Digital ID Wallet #17

    In this episode of The Discussion I’m joined by Commercial Director, Europe, Digital Trust Services at Gen, and all-round Digital Wallet and Innovation expert Andy Tobin for a detailed conversation about digital wallets.

    We go deep into what the European identity system (eIDAS) is, how it works and why we need it. We cover the difference between identity cards and digital wallets and the role of verifiable credentials. We also explore why digital credentials are more secure than paper documents, the spectre of big tech and the future of credentials in general. 

    Gen website  https://www.gendigital.com/

    Links to Andrew’s eIDAS articles on LinkedIn https://www.linkedin.com/in/tobinandrew/recent-activity/posts/

    Tracey's book 'The Future of You: Can Your Identity Survive 21st Century Technology?' available in the UK and US 

    074 - Connecticut Data Privacy Act: Be Prepared

    074 - Connecticut Data Privacy Act: Be Prepared

    The Connecticut Data Privacy Act (or “CTDPA”) is going into effect on July 1, 2023, making Connecticut the fifth state to pass a comprehensive data privacy law that protects consumers. How will this new law impact your organization, and are there any obligations you should know?

    On today’s episode of CyberSound, Jason, and Steve talk with Rob McWilliams, Data Privacy Consultant at Vancord, to educate listeners on what this law means. Read more on the CTDPA here.

    Twitter पर लोगों के Personal Data हो रहे चोरी?-रिपोर्ट

    Twitter पर लोगों के Personal Data हो रहे चोरी?-रिपोर्ट

    ट्विटर ऐप का इस्तेमाल इस वक्त हर कोई कर रहा है। आप भी कर रहे होंगे तो क्या आपको पता है की आज कल ट्विटर पर लोगों के डेटा लीक किये जा रहे है या कह सकते हैं की आपकी पर्सनल डिटेल को बेचा जा रहा है। आपको बता दें, ट्विटर से गुरुवार को 20 करोड़ से ज्यादा यूजर्स के ईमेल एड्रेस चोरी हुए हैं। इसकी जानकारी इजराइल की साइबर-सिक्योरिटी कंपनी हडसन रॉक ने दी है। कंपनी के को-फाउंडर एलन गाल का कहना है कि ये डेटा एक ऑनलाइन हैकिंग फोरम पर पोस्ट किया गया है। फिलहाल ट्विटर ने इस पर कोई टिप्पणी नहीं की है। 

    Episode 73 - Thinking Differently About Privacy

    Episode 73 - Thinking Differently About Privacy

    In this episode I sit down with Paul McManus about all things Privacy. Paul is a Senior Information Governance Analyst for Corewell Health Corporate. I have had the distinct pleasure of working with Paul on several different privacy related engagements over the years.

    Talking Points:

    •  What are some of the challenge you are seeing in privacy space right now?
      • Integration 
      • Who watches the watcher?
    •  As more and more things are outsourced, how do you this with digital assets?
    • Do people realize that data that may not be considered 'confidential' now may considered something different in a year or two?
    • How are privacy laws changing?
    • How is the GDPR different than the US laws?
    • Are what point do we 'globalized' healthcare privacy
      • Ownership vs Rights
    • What are re-selling of de-identified data?
    • What about privacy with wearables and driving trackers?

     We even had the pleasure of having a quick appearance from a special 'In-House' guest that knows a thing or two about Research Privacy, resident System Architect, Heather Bregg.

    028 - Robert’s Redemption with Robert Scoble

    028 - Robert’s Redemption with Robert Scoble

    What we covered:

    • The strong points of Amazon, Apple, Google, and NVidia, and how business startups can emulate them towards success.
    • Why having a belief system, or something that you can look up to, is a great thing that can aid us in our own personal journeys.
    • How privacy is becoming more and more of a luxury, especially with today’s current trends.
    • How his idea for the future of mankind and computing can drastically change within the next 20 years.
    • Why Physics can greatly contribute to a business's success
    • How technology has evolved and continues to evolve into the creature we know today.
    • How his humble beginnings as a journalist have forged him on the right path towards the leading names in the industry.
    • How his time at Microsoft as a technological evangelist has changed his mind about how the industry worked.

    Tweetable Quotes:

    “A dictator can move fast, this is why we miss Steve Jobs.”

    “Soon, we’re gonna move from computing at flat pieces of glass to computing everywhere.

    “The speed at which technology is building neural radiance fields is exponentially changing, it’s crazy. And that’s just one technology among all that.”

    “Many of us have different belief systems, and that conforms to who we are.

    “I mean, it’s amazing how far we’ve come to be and where we’re about to go.”

    Links Mentioned:

    Kurt’s Twitter

    Kurt’s Instagram

    Kurt’s LinkedIn

    Steve Jobs

    Steve Wozniak

    Eric Ross Weinstein

    Elon Musk

    Tim Cook

    Mark Zuckerberg

    Marc Benioff

    Jensen Huang

    Tesla

    Apple

    Amazon

    Nvidia

    Walmart

    Facebook

    Google

    Google  Maps

    Youtube

    Niantic

    Esri

    Omniverse

    THESE hackers target the POLICE to get YOUR data!

    THESE hackers target the POLICE to get YOUR data!

    A new report reveals that hackers are gaining access to sensitive data about us from tech companies like ISPs, phone providers, social media companies, by impersonating law enforcement and demanding data as "an urgent matter of life and death."
    They use a tool called Emergency Data Requests (EDRs), and we'll dive into what these are, and why they're allowing our most sensitive data to be leaked. 

    For a thorough analysis, visit the news site that broke the story: Krebs on Security
    https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/

    0:00 Show Pre-roll
    0:47 Intro
    1:33 Hacking Subpoenas! Sensitive Data Exposed
    8:06 The Government Process for Emergency Data Requests (EDR)
    11:02 The Lapsus$ Connection
    13:27 Why Privacy Matters
    18:53 Governments bypassing legal procedures
    25:00 The Solution?
    29:21 Twitter Poll Results
    33:02 And our Privacybeat Quiz Winner is...
    35:18 Thanks

    Brought to you by NBTV members: Sam Ettaro, Will Sandoval, and Naomi Brockwell

    To support NBTV, visit https://www.nbtv.media/support
    (tax-deductible in the US)

    Sign up for the free CryptoBeat newsletter here:
    https://cryptobeat.substack.com/

    Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

    Visit the NBTV website:
    https://nbtv.media

    Support the show

    THESE hackers target the POLICE to get YOUR data!

    THESE hackers target the POLICE to get YOUR data!

    A new report reveals that hackers are gaining access to sensitive data about us from tech companies like ISPs, phone providers, social media companies, by impersonating law enforcement and demanding data as "an urgent matter of life and death."
    They use a tool called Emergency Data Requests (EDRs), and we'll dive into what these are, and why they're allowing our most sensitive data to be leaked. 

    For a thorough analysis, visit the news site that broke the story: Krebs on Security
    https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/

    0:00 Show Pre-roll
    0:47 Intro
    1:33 Hacking Subpoenas! Sensitive Data Exposed
    8:06 The Government Process for Emergency Data Requests (EDR)
    11:02 The Lapsus$ Connection
    13:27 Why Privacy Matters
    18:53 Governments bypassing legal procedures
    25:00 The Solution?
    29:21 Twitter Poll Results
    33:02 And our Privacybeat Quiz Winner is...
    35:18 Thanks

    Brought to you by NBTV members: Sam Ettaro, Will Sandoval, and Naomi Brockwell

    To support NBTV, visit https://www.nbtv.media/support
    (tax-deductible in the US)

    Sign up for the free CryptoBeat newsletter here:
    https://cryptobeat.substack.com/

    Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

    Visit the NBTV website:
    https://nbtv.media

    Support the show

    Level Up your Digital Transformation - Focus on using data

    Level Up your Digital Transformation - Focus on using data
    APMG International presents our popular weekly panel Q&A show. Level Up your Digital Transformation with the host Nick Houlton and the Question Master: Charlotte Miller, Jan-Willem Middelburg, Jeroen Geurtsen, Etienne Shardlow, Johann Botha and Zakiyya Cassimjee. An opportunity to have your real-life questions answered, driving the panel discussion before moving onto the focus topic: Using Data to make decisions by Jan-Willem Middelburg.

    Schrems II and other data privacy legislation -- what's a tech company to do?

    Schrems II and other data privacy legislation -- what's a tech company to do?

    In this episode, DLA Piper's Victoria Lee, Co-Chair of the firm's Global Technology Sector, talks with Andrew Serwin, US and Global Co-Chair of the firm's Data Protection, Privacy and Security Practice, about implications of Schrems II and other recent data privacy legislation, and how technology companies can navigate the ever-changing landscape of global privacy regulatory issues.

    See omnystudio.com/listener for privacy information.

    22: Sebastiaan Knijnenburg (Castor EDC) —“Ik vond computers leuker dan mensen”

    22: Sebastiaan Knijnenburg (Castor EDC) —“Ik vond computers leuker dan mensen”
    Sebastiaan Knijnenburg ontdekte tijdens zijn studie dat hij beter was in PHP dan in dealen met mensen. Dus werd hij medisch informaticus en stortte hij zich op het gestructureerd verzamelen en opslaan van medische onderzoeksgegevens. Als je ergens zorgvuldig met data om moet gaan is het wel in het medische domein. Dus vroegen we Sebastiaan hoe Castor zorgt voor privacy en veiligheid ent tegelijk deze gevoelige data toch deelbaar maakt voor grote onderzoeksprojecten. Want daar hopen ze dus ooit nog de Nobelprijs voor Geneeskunde mee te winnen. Een lekker praktisch gesprek waar je ook iets aan hebt als je niet uit de medische hoek komt. David las Future Ethics van Cennydd Bowles en gaf het vijf sterren. En Laurens vertelt hoe hij viel voor Duitse charmes. mail ons met vragen en tips: redactie@glitch.show

    Ep. 39: Akshit Mehta

    Ep. 39: Akshit Mehta

    Welcome to Paperback by The Open Library Project.

    We have as our guest today, Akshit Mehta. Akshit is the Founder of Vorq Space, Strategist at ETE Studio, Exploring Adventurer at Trawork and City Lead of Fuckup Nights Mumbai.

    In the first half of the episode, we discuss The Four by Scott Galloway that’s based on the T Algorithm by Galloway to become a trillion dollar company.

    In the second half, we discuss Everything Is *ucked by Mark Manson and Shoe Dogby Phil knight. We spoke about hope, nihilism and data privacy among other things.

    You can find more about Vorq Space on their official website: https://www.vorqspace.com/

    You can follow Akshit Mehta on his instagram handle @mehtaakshit

    You can find more details about The Open Library Project on www.openlibrary.in

    You can listen to this show and other awesome shows on the IVM Podcasts app on Android: https://ivm.today/android or iOS: https://ivm.today/ios, or any other podcast app.

    You can check out our website at http://www.ivmpodcasts.com/

    See omnystudio.com/listener for privacy information.

    Illegal Food, Water & Data Leaks - Parliament Update

    Illegal Food, Water & Data Leaks - Parliament Update

    I respond to feedback from listeners and answer some of their questions about bills in parliament such as the Data Privacy Protection Bill, Water Bill and Food and Drug Bill. I also talk about what happens if one of the candidates withdraws from the 2019 presidential election.
    Host: Shawn Corrigan https://www.linkedin.com/in/shawn-corrigan/ Email us! info@indonesiaindepth.com  This podcast is brought to you by LEXICO Indonesia, a political risk advisory in Jakarta. www.lexicoindonesia.com