Tue.Sep 05, 2023

article thumbnail

Zscaler Data Security Platform Takes on Symantec, CASB Tools

Data Breach Today

CEO Jay Chaudhry: In-Line Inspection, App-to-App Protection Aid Data Defense Growth Zscaler's ability to inspect traffic in-line and secure application-to-application communications has driven massive growth in its data protection business, CEO Jay Chaudhry said. Customers have embraced Zscaler's data protection technology over both incumbents like Symantec as well as CASB tools.

Security 299
article thumbnail

STEPS FORWARD: Regulators are on the move to set much needed IoT security rules of the road

The Last Watchdog

New government rules coupled with industry standards meant to give formal shape to the Internet of Things (IoT) are rapidly quickening around the globe. Related: The need for supply chain security This is to be expected. After all, government mandates combined with industry standards are the twin towers of public safety. Without them the integrity of our food supplies, the efficacy of our transportation systems and reliability of our utilities would not be what they are.

IoT 180
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

APT28 Spear-Phishes Ukrainian Critical Energy Facility

Data Breach Today

Energy Facility Impeded Attack by Blocking the Launch of the Windows Script Host Ukrainian cyber defenders say Russian military hackers targeted a critical energy infrastructure facility with phishing emails containing a malicious script leading to cyberespionage. An energy facility cyber defender impeded the attack by blocking the launch of indows Script Host, CERT-UA says.

Phishing 292
article thumbnail

Mainframe and the cloud? It’s easy with open source

IBM Big Data Hub

This is part four in a five-part series on mainframe modernization. The secret to mainstreaming the mainframe into today’s modern, cloud-centric IT environments is to make the experience of working with the mainframe like the experience of working off the mainframe—especially the developer experience (DX). Historically, working on the mainframe was an entirely different experience from the distributed world.

Cloud 126
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

EU Artificial Intelligence Act Not a Panacea for AI Risk

Data Breach Today

Dutch Citizens 'Should Not Expect Miracles' From AI Act, Says Dutch Privacy Agency The Dutch privacy regulator says imminent artificial intelligence regulation in the European Union may fail to prevent the rollout of dangerous algorithms. Europe is close to finalizing the AI Act, but citizens of the Netherlands "should not expect miracles," the regulator said.

More Trending

article thumbnail

Why Tenable Is Eyeing Security Vendor Ermetic at Up to $350M

Data Breach Today

Ermetic Is in Line for a 9-Figure Deal Just 40 Months After Emerging From Stealth A startup founded by the longtime leader of Secdo and backed by the likes of Qumra Capital and Accel could soon be acquired by Tenable. The company is in advanced negotiations to purchase cloud infrastructure security startup Ermetic in a deal valued at between $300 million and $350 million.

Security 273
article thumbnail

Freecycle data breach impacted 7 Million users

Security Affairs

The nonprofit organization Freecycle Network (Freecycle.org) confirmed that it has suffered a data breach that impacted more than 7 million users. The Freecycle Network (TFN,) is a private, nonprofit organization that coordinates a worldwide network of “gifting” groups to divert reusable goods from landfills. The organization confirmed that it has suffered a data breach that impacted more than 7 million users In response to the incident, The Freecycle Network prompted users to reset

article thumbnail

Feds Publicly Name 130 Healthcare Firms Using Web Trackers

Data Breach Today

FTC, HHS Warn Hospitals, Telehealth Firms of Privacy Violations With Tracker Use The Federal Trade Commission and the Department of Health and Human Services have publicly named 130 hospitals and telehealth companies that were recently warned that the use of online tracking tools in their websites or mobile apps potentially violates federal data privacy and security regulations.

article thumbnail

Five Obstacles to IG Policy Approval

ARMA International

In the best circumstances, a well-crafted draft IG policy will sail through an approval process like a ship in warm water with strong breezes. Too often, though, the proposed policy hits an iceberg, which stops it in its tracks. At best, there’s little damage and the approval process can continue; at worst, the ship sinks and you head back to the drawing board.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Battery Ventures Buys GrammaTech's Application Security Unit

Data Breach Today

Research Services Business Will Keep GrammaTech Name, Five Points Capital Ownership GrammaTech has separated its security software products and cyber research services divisions, and venture capital firm Battery Ventures has acquired the former and renamed it CodeSecure. The Washington, D.C.-area application security testing software business will pursue M&A in adjacent markets.

Security 272
article thumbnail

Hackers stole $41M worth of crypto assets from crypto gambling firm Stake

Security Affairs

Crypto gambling site Stake suffered a security breach, and threat actors withdrew $41M of funds stolen including Tether and Ether. Researchers reported abnormally large withdrawals made from the crypto gambling site Stake to an account with no previous activity, a circumstance that suggests that threat actors have hacked the platform and stolen crypto assets, including Tether and Ether.

article thumbnail

Official Slams Aussie Firms for Data Breach Reporting Delays

Data Breach Today

Information Commissioner Urges Organizations to Accelerate Breach Notifications Australia's information commissioner has urged organifzations to quicken the process of notifying those affected by data breaches instead of spending months analyzing each incident. Angelene Falk said it can take anywhere from 20 days to five months to notify breach victims, putting them at risk.

article thumbnail

Hackers Target High-Privileged Okta Accounts via Help Desk

Dark Reading

Threat actors convince employees to reset MFA for Super Admin accounts in the IAM service to leverage compromised accounts, impersonating users and moving laterally within an organization.

110
110
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Exploring the Boundless Possibilities of IoT: Connecting the World Through Smart Devices

Data Breach Today

Claro Enterprise Solutions' Kelly Rein on the Role of IoT Devices, AI-Based Video Scanning in Security Historically, IT and physical security teams have served in separate areas, but that is changing due to emerging threats such as a drone that landed on a firm's roof to steal data. Both teams need to be alerted to threats, said Kelly Rein, senior director of product at Claro Enterprise Solutions.

IoT 260
article thumbnail

Why Marketing Compliance for Financial Services Is A Big Deal

Hanzo Learning Center

In today's fiercely competitive business landscape, financial services companies, like their counterparts in other industries, rely on advertising and digital marketing strategies to create brand recognition, promote their products and services to potential customers, and engage with their existing client base. According to a comprehensive market analysis conducted by Statista , digital advertising expenditures in the financial services sector in the United States surged to a staggering $21 bill

article thumbnail

Proactively Prepare for AI Regulation: Report

Data Breach Today

Mounting Regulation Will Add Complexity to Compliance, Says KPMG Regulatory scrutiny over artificial intelligence will only mount, warns consultancy KPMG in a report advising companies to proactively set up guardrails to manage risk. Even in the absence of regulatory regimes, "companies must proactively set appropriate risk and compliance guardrails.

article thumbnail

Inconsistencies in the Common Vulnerability Scoring System (CVSS)

Schneier on Security

Interesting research : Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities Abstract: The Common Vulnerability Scoring System (CVSS) is a popular method for evaluating the severity of vulnerabilities in vulnerability management. In the evaluation process, a numeric score between 0 and 10 is calculated, 10 being the most severe (critical) value.

Security 103
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Supporting cybersecurity in education

Jamf

Schools are a common target for cyber criminals trying to steal personal information. This blog discusses how schools can foster digital citizenship while defending students and their network from cyber threats.

article thumbnail

GhostSec Leaks Source Code of Alleged Iranian Surveillance Tool

Dark Reading

GhostSec has made the source code for what it calls a powerful surveillance tool openly available in a 26GB file, but FANAP denies its legitimacy.

IT 109
article thumbnail

Improve enterprise security with three new Edge features

Collibra

We all know that security, the price of entry for applications that live within your company’s firewall, is crucial for data intelligent organizations. However, it can still pose numerous challenges and become a time consuming process. Security teams within your organization may require container security scans for images that are included in Edge.

article thumbnail

Russia Undertakes Disinformation Campaign Across Africa

Dark Reading

Following coups in some African nations, Russia is exploiting the instability with the manipulation of media channels to stoke anti-French sentiment, among other things.

99
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Weekly Vulnerability Recap – September 4, 2023 – Attackers Hit Network Devices and More

eSecurity Planet

Major cybersecurity events in the last week make clear that hackers just keep getting savvier — and security teams need to be vigilant to keep up. Ransomware groups continue to exploit unpatched vulnerabilities. Remote code execution (RCE) vulnerabilities, such as those exploited by a pair of botnets, highlight the hazards of unpatched devices and the need for patch management.

article thumbnail

Data Initiatives Force Closer Partnership Between CISOs, CDOs

Dark Reading

Though security leaders and chief data officers both care about data management, their different missions have created a tension that needs addressing.

Security 104
article thumbnail

How Duress Buttons Can Save Lives in Schools

HID Global

HID’s wireless duress button is incorporated into a credit card-sized ID badge that integrates with emergency call systems and internal security systems.

article thumbnail

As LotL Attacks Evolve, So Must Defenses

Dark Reading

Because living-off-the-land (LotL) attacks masquerade as frequently used, legitimate companies, they are very difficult to block and detect.

108
108
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Strange Afterlife of Wagner’s Yevgeny Prigozhin

WIRED Threat Level

Posts praising the Wagner Group boss following his death in a mysterious plane crash last month indicate he was still in control of his "troll farm," researchers claim.

article thumbnail

Researchers Discover Critical Vulnerability in PHPFusion CMS

Dark Reading

No patch is available yet for the bug, which can enable remote code execution under the correct circumstances.

CMS 95
article thumbnail

5 ways an ERP integration partner combats business disruption  

OpenText Information Management

ERP modernization is a hot topic as many organizations look to move from the monolithic ERP systems of the past to new and flexible cloud-based composable ERP solutions. However, the process of implementing new ERP programs is far from straightforward. Some estimates put the failure rate of implementing new ERP as high as 75%. Gartner … The post 5 ways an ERP integration partner combats business disruption appeared first on OpenText Blogs.

Cloud 62