Mon.Feb 24, 2020

article thumbnail

Lawsuit Claims HIV Data Exposed in Leak

Data Breach Today

Legal Action Stems From Misconfigured Database at UW Medicine A lawsuit seeking class action status filed against UW Medicine in the wake of a data leak incident has been amended to reflect that at least one HIV patient allegedly had their data exposed. Why are data breaches tied to IT misconfiguration a growing problem?

article thumbnail

BOOK REVIEW: ‘Security Yearbook’ preserves cybersecurity history — highlights tectonic shift

The Last Watchdog

Along with Richard Stiennon , I belong to a small circle of journalists and tech industry analysts who’ve been paying close attention to cybersecurity since Bill Gates curtailed commercial work on Windows to rivet Microsoft’s attention on defending its software code. Related: The role of PKI is securing digital transformation That was in 2002. Back then, email spam was a nuisance evolving into a potent attack vector, and the top malware innovators were script kiddies seeking bragging rights.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Mexico Sues Google Over Children's Privacy

Data Breach Today

State Alleges Data About Young Students Is Illegally Collected New Mexico is suing Google, alleging the company violates a federal child privacy law by collecting the personal data of students younger than age 13 without their parents' consent. Google rejects the lawsuit's claims, saying they are "factually incorrect.

Privacy 245
article thumbnail

FBI recommends using passphrases instead of complex passwords

Security Affairs

The FBI recommends using longer passwords composed of multiple words into a long string of at least 15 characters instead of short passwords including special characters. Recent guidance from the National Institute of Standards and Technology (NIST) highlights that the password length is much more important than password complexity. The recommendations are part of the Protected Voices initiative launched by the FBI to help 2020 political campaigns and American voters protect against online forei

Passwords 126
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

BEC Group Favors G-Suite, Physical Checks: Report

Data Breach Today

Agari Says 'Exaggerated Lion' Has Targeted Businesses Throughout US A business email compromise group targeting U.S. businesses is using G-Suite for their scams and collecting money through physical checks instead of wire transfers, according to the security firm Agari.

Security 236

More Trending

article thumbnail

Irish Privacy Report Gives Glimpse Into GDPR Investigations

Data Breach Today

Facebook and Twitter Among the Technology Giants Being Probed A newly released report offers a glimpse into how European Union authorities are applying the General Data Protection Regulation to some of the biggest U.S. technology firms, including social media giants Facebook and Twitter.

GDPR 195
article thumbnail

SSRF 101: How Server-Side Request Forgery Sneaks Past Your Web Apps

Dark Reading

Server-side request forgery is a dangerous attack method that is also becoming an issue for the cloud. Here are some of the basics to help keep your Web server from turning against you.

Cloud 112
article thumbnail

'Privacy by Design' Implementation Tips

Data Breach Today

Implementing the concept of "privacy design" requires a series of critical steps, says Heikki Tolvanen, chief legal engineer at PrivacyAnt, a Finland-based privacy consulting firm, who offers insights on mistakes to avoid.

Privacy 163
article thumbnail

7 Tips to Improve Your Employees' Mobile Security

Dark Reading

Security experts discuss the threats putting mobile devices at risk and how businesses can better defend against them.

Security 134
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

DevOps Best Practices: Scaling DevOps for the Enterprise

Micro Focus

Information technology has been an integral component of the modern enterprise for decades now. That dependency is only bound to grow. With such digital transformation comes soaring demand for new applications. Software development services will continue to be an integral component of the business amidst a rising pressure to innovate and deliver. As a result, View Article.

article thumbnail

PRINCIPAL SOLUTIONS ADVISOR EZRIEL GROSS NAMED “BEST OF THE BEST” AT SHARE

Rocket Software

SHARE is the oldest computer user group in the world, and the organization plays a critical role in driving innovation in the IBM Z community. Rocket Software has been a long-time member of SHARE, and we are committed to supporting its goals and ideals. That’s why we are excited to announce that Principal Solutions Advisor Ezriel Gross has received the SHARE Best of the Best Session award for his presentation Intro to IPCS for CICS People.

article thumbnail

Slickwraps discloses data leak that impacted 850,000 user accounts

Security Affairs

Slickwraps has disclosed a data breach that impacted over 850,000 user accounts, data were accidentally exposed due to security vulnerabilities. Slickwraps is an online store that offers for sale skins mobile devices, laptops, smartphones, tablets, and gaming consoles. The data leak was disclosed last week, on February 21 the company that customer records were accidentally exposed online via an exploit.

article thumbnail

Russia Is Trying to Tap Transatlantic Cables

Schneier on Security

The Times of London is reporting that Russian agents are in Ireland probing transatlantic communications cables. Ireland is the landing point for undersea cables which carry internet traffic between America, Britain and Europe. The cables enable millions of people to communicate and allow financial transactions to take place seamlessly. Garda and military sources believe the agents were sent by the GRU, the military intelligence branch of the Russian armed forces which was blamed for the nerve a

Military 124
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Raccoon Malware, a success case in the cybercrime ecosystem

Security Affairs

Raccoon Malware is a recently discovered infostealer that can extract sensitive data from about 60 applications on a targeted system. Racoon malware , Legion, Mohazo, and Racealer, is an infostealer that recently appeared in the threat landscape that is advertised in hacking forums. The malware is cheap compared to similar threats, it is able to steal sensitive data from about 60 applications, including (browsers, cryptocurrency wallets, email and FTP clients).

Sales 88
article thumbnail

Organizations Struggle with Cloud Security in the Post Digital Transformation Era – Highlights from our 2020 Data Threat Report-Global Edition

Thales Cloud Protection & Licensing

2020 marks the launch of the Thales Data Threat Report-Global Edition for the seventh consecutive year. This year the report focuses on the post digital transformation era. In previous years, we have discussed the efforts of businesses to digitally transform their processes to maintain or gain a competitive advantage and many of these transformative technologies involves moving to the cloud.

article thumbnail

FireEye Mandiant M-Trends 2020 report: 500+ new Malware strains in 2019

Security Affairs

FireEye’s report revealed that the incident response division Mandiant observed more than 500 new malware families in 2019. According to the FireEye Mandiant M-Trends 2020 report , FireEye analyzed 1.1 million malware samples per day in 2019 and identified 1,268 malware families. The most worrisome figure is related to the number of previously unseen malware families which is greater than 500 (41%). “In 2019, we observed over 500 new malware families, 58% of which were discovered through M

article thumbnail

Wanted: Hands-On Cybersecurity Experience

Dark Reading

Organizations lament a lack of qualified job candidates as they continue to struggle to hire and retain security teams, the new ISACA State of Cybersecurity 2020 report shows.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Lampion malware v2 February 2020

Security Affairs

Since end-December 2019 lampion malware has been noted as the most prominent malware targeting Portuguese organizations. Several devices have been infected when the victims open the zip file downloaded from the URL embedded in the malicious email that lures the Portuguese Government Finance & Tax (ATA) , Energias de Portugal (EDP) , and more recently the DPD firm – an international parcel delivery service.

article thumbnail

Verizon: Attacks on Mobile Devices Rise

Dark Reading

Companies of all sizes are being hit by mobile attacks and feeling the effects for extended periods of time, according to the 2020 Verizon Mobile Security Index.

article thumbnail

New privacy legislation could increase the burden for companies in Quebec

Data Protection Report

Quebec’s minister of justice announced her intention to introduce a bill aimed at modernizing the privacy regime provided by the Act respecting the protection of personal information in the private sector. Although few details have yet to be publicly disclosed, the changes proposed by the new legislation seem to focus on the following five themes: (i) tighter rules governing the consent of persons concerned, (ii) the possibility for these individuals to withdraw their consent and the company’s o

Privacy 76
article thumbnail

DoD Issues Cybersecurity Maturity Model Certification Version 1.0

Data Matters

On January 31, 2020, the Department of Defense released its latest version of the Cybersecurity Maturity Model Certification (“CMMC”) for defense contractors. Under the CMMC plan, DOD contractors will be required to obtain a cybersecurity rating from Level 1 through Level 5. Self-certification will not be permitted. Given the significant investment of industry resources the CMMC may require, the DOD eased some concerns by announcing that it would roll out the CMMC program out in stages.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Enterprise Cloud Use Continues to Outpace Security

Dark Reading

Nearly 60% of IT and security pros say deployment of business services in the cloud has rushed past their ability to secure them.

Cloud 75
article thumbnail

DHS Issues Ransomware Warning for Critical Infrastructure Operators

Adam Levin

The U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory following a ransomware attack on a natural gas compression facility. In the warning, CISA announced that a “cyber threat actor used a Spearphising Link to obtain initial access to the organization’s information technology (IT) network before pivoting to its OT network.

article thumbnail

Solving the Cloud Data Security Conundrum

Dark Reading

Trusting the cloud involves a change in mindset. You must be ready to use runtime encryption in the cloud.

Cloud 80
article thumbnail

Quick Reads 2020

CILIP

Discover the books on the 2020 Quick Reads list. The Reading Agency's Quick Reads are ready to tackle life's big problems. One in six adults in the UK find reading difficult. Research shows that when we inspire people to read for pleasure they benefit from far greater opportunities in everyday life, education and employment. ? The Reading Agency is a national charity that tackles life?

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

As Cyber Attacks Mount, Small Businesses seek Authentication Fix

The Security Ledger

Small and medium-sized businesses find themselves in the cross hairs of sophisticated hacking groups. Improved identity and access management (IAM) tools are critical to keeping hackers at bay. But what do SMBs want? A LastPass survey of IT leaders has some valuable clues. The post As Cyber Attacks Mount, Small Businesses seek Authentication. Read the whole entry. » Related Stories Opinion: AI and Machine Learning will power both Cyber Offense and Defense in 2020 Passwordless?

article thumbnail

ICO Consultation on Draft AI Auditing Framework Guidance for Organizations

Hunton Privacy

On February 19, 2020, the Information Commissioner’s Office (“ICO”) launched a consultation on its draft AI auditing framework guidance for organizations (“Guidance”). The Guidance is open for consultation until April 1, 2020 and responses can be submitted via the ICO’s online survey. This is the first piece of guidance published by the ICO that has a broad focus on the management of several different risks arising from AI systems, as well as governance and accountability measures.

article thumbnail

Security, Networking Collaboration Cuts Breach Cost

Dark Reading

CISOs report increases in alert fatigue and the number of records breached, as well as the struggle to secure mobile devices in a new Cisco study.