Remove Definition Remove Healthcare Remove Libraries Remove Security
article thumbnail

The Weeks in Cyber Security and Data Privacy: 18 – 31 December 2023

IT Governance

billion records The security researcher Jeremiah Fowler discovered an unprotected database exposing more than 1.5 Fowler contacted the company, which secured the database. The security researcher Bob Diachenko identified the leak in September and contacted TuneFab, which fixed the misconfiguration within 24 hours.

article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

I’m just not convinced that a fingerprint or an image of my face is secure enough. In security we traditionally define the different factors of authentication as something you know, so that could be the username and password, or an answer to a security question. I'm a cyber security professional, I guess.

article thumbnail

IG: The Whole Is More Than the Sum of Its Parts

Positively RIM

IT, Legal, Records, Privacy, Security, Compliance Finance, Audit and other areas can manage their information alone. Some organizations lack adequate security expertise to counter outside hacking and internal pilfering of proprietary data. By definition, creating IG depends on coordinating groups with wide variety.

IT 40