Mon.Nov 27, 2023

article thumbnail

US, UK Cyber Agencies Spearhead Global AI Security Guidance

Data Breach Today

Global Cybersecurity Agencies Say 'Secure by Design' Is Key to AI Threat Mitigation Nearly two dozen national cybersecurity organizations on Sunday urged AI developers to embrace "secure by design" and other preventive measures aimed at keeping hackers out from the mushrooming world of AI systems. The United Kingdom and United States spearheaded its development.

Security 310
article thumbnail

You Don’t Need to Turn Off Apple’s NameDrop Feature in iOS 17

WIRED Threat Level

Yes, your iPhone automatically turns on NameDrop with the latest software update. But you shouldn’t really be worried about it—regardless of what the police are saying.

IT 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Udderly Insecure: Researchers Spot Cow-Tracking Collar Flaws

Data Breach Today

IoT Hackers Could Inject Data to Fool 'Smart' Farmers and Vets About Animal Welfare Not even dairy cows appear to be safe from internet of things flaws, researchers report after reverse-engineering health-monitoring collars for cows and finding they could eavesdrop on and alter data. Once addressed by the manufacturer, they said the non-updateable collars would have to be replaced.

IoT 307
article thumbnail

California Privacy Protection Agency Publishes Draft Regulations on Automated Decisionmaking Technology

Hunton Privacy

On November 27, 2023, the California Privacy Protection Agency (“CPPA”) published its draft regulations on automated decisionmaking technology (“ADMT”). The regulations propose a broad definition for ADMT that includes “any system, software, or process—including one derived from machine-learning, statistics, or other data-processing or artificial intelligence—that processes personal information and uses computation as whole or part of a system to make or execute a decision or facilitate human de

Privacy 121
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

How Biden's AI Executive Order Will Affect Healthcare

Data Breach Today

President Joe Biden's recent executive order for artificial intelligence encourages investment in AI while setting a vision for a regulatory framework to address issues involving AI technology safety, bias and other concerns in healthcare, said attorney Wendell Bartnick of the law firm Reed Smith.

More Trending

article thumbnail

Welltok's MOVEit Hack Affects Nearly 8.5 Million, So Far

Data Breach Today

About 2 Dozen Welltok Health Plan Clients Affected in File Transfer Software Hack The tally of individuals whose health data was compromised in a hack on MOVEit file transfer software used by Welltok, a provider of online wellness resources to dozens of health plans, has soared to nearly 8.5 million. The hack is among the biggest health data breaches reported so far this year.

article thumbnail

Section 702 Surveillance Reauthorization May Get Slipped Into ‘Must-Pass’ NDAA

WIRED Threat Level

Congressional leaders are discussing ways to reauthorize Section 702 surveillance, including by attaching it to the National Defense Authorization Act, Capitol Hill sources tell WIRED.

IT 113
article thumbnail

Hospital Chain Hit With Ransomware Attack

Data Breach Today

Ardent Health Services Operates 30 Hospitals, 200 Other Care Facilities in 6 States Tennessee-based Ardent Health Services, which operates dozens of hospitals and other healthcare facilities in several states, said on Monday that it is dealing with a ransomware attack that has forced the entity to divert some patients and cancel or reschedule certain procedures.

article thumbnail

Secret White House Warrantless Surveillance Program

Schneier on Security

There seems to be no end to warrantless surveillance : According to the letter, a surveillance program now known as Data Analytical Services (DAS) has for more than a decade allowed federal, state, and local law enforcement agencies to mine the details of Americans’ calls, analyzing the phone records of countless people who are not suspected of any crime, including victims.

Mining 109
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How Generative AI Will Reshape the Financial Services Sector

Data Breach Today

Wipro Americas 2 CEO Suzanne Dann on How Generative AI Can Address Risk, Compliance Generative AI can improve operational efficiencies, enhance risk and compliance and elevate the client experience for financial services firms, said Wipro's Suzanne Dann. Wipro embraced generative AI to reduce fraud by spotting anomalous behavior and used synthetic data to test deep learning models.

article thumbnail

General Electric, DARPA Hack Claims Raise National Security Concerns

Dark Reading

Weapons systems data, AI research, and other classified information may be up for sale, not to mention access to other government agencies.

Sales 122
article thumbnail

Zscaler Taps Generative AI to Measure Risk, Predict Breaches

Data Breach Today

Zscaler Brings Generative AI to Data Protection Bundles, Debuts Standalone AI Tools Zscaler infused generative AI features into its data protection bundles and is introducing AI-powered products that quantify risk and predict breaches, said CEO Jay Chaudhry. The cloud security firm enhanced its data protection policies for AI/ML apps and tools to lower the likelihood of data loss.

Risk 257
article thumbnail

Initial Access Broker Activity Doubles in One Year’s Time

KnowBe4

New data sheds light on just how active the Initial Access Broker (IAB) business is, and the growth uncovered doesn’t bode well for potential victim organizations.

Access 106
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Harnessing AIOps for IT Operations and Management

Data Breach Today

Gartner's Padraig Byrne on Data Challenges and Operational Excellence IT leaders are poised to employ AIOps to combat the challenges faced by ITOps teams due to vast data volumes, alert fatigue and task prioritization. AIOps can potentially revolutionize IT operations, streamline alert management, and enhance overall reliability by combining AI and ML.

IT 208
article thumbnail

Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity

Dark Reading

Companies must do a delicate dance between consumer privacy protection, upholding their product's efficacy, and de-risking cyber breaches to run the business.

Privacy 97
article thumbnail

Revealing our Ethics and Values

CILIP

Advocacy, values and ethics - making a case for library services David McMenemy. Photo: SLIC © Alan Richardson Pix-AR.co.ukDavid McMenemy. Photo: SLIC © Alan Richardson Pix-AR.co.uk A new piece of work to support advocacy work in libraries has put ethics and values at the heart of those conversations. Senior Lecturer in Information Studies at University of Glasgow, Dr David McMenemy, created the REVEAL toolkit and here he explains how to make best use of it, and why it is needed.

article thumbnail

How better key management can close cloud security gaps troubling US government (Part 1 of 2)

Thales Cloud Protection & Licensing

How better key management can close cloud security gaps troubling US government (Part 1 of 2) sparsh Tue, 11/28/2023 - 05:20 Bruce Schneier recently blogged : A bunch of networks, including US Government networks , have been hacked by the Chinese. The hackers used forged authentication tokens to access user email, using a stolen Microsoft Azure account consumer signing key.

Cloud 83
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Cyber Threats to Watch Out for in 2024

Dark Reading

As cyber threats evolve in 2024, organizations must prepare for deepfakes, extortion, cloud targeting, supply chain compromises, and zero day exploits. Robust security capabilities, employee training, and incident response plans are key.

Cloud 83
article thumbnail

Huntress Finds Business Email Compromise (BEC) Increases In Q3, 2024

KnowBe4

Huntress has released a report finding that business email compromise (BEC) attacks have risen in the third quarter of 2023.

article thumbnail

CISA, NCSC Offer a Road Map, Not Rules, in New Secure AI Guidelines

Dark Reading

US and UK authorities issued new recommendations for companies that build and rely on AI, but they stop short of laying down the law.

article thumbnail

IBM watsonx AI and data platform, security solutions and consulting services for generative AI to be showcased at AWS re:Invent

IBM Big Data Hub

According to a Gartner® report , “By 2026, more than 80% of enterprises will have used generative AI APIs or models, and/or deployed GenAI-enabled applications in production environments, up from less than 5% in 2023.”* However, to be successful they need the flexibility to run it on their existing cloud environments. That’s why we continue expanding the IBM and AWS collaboration, providing clients flexibility to build and govern their AI projects using the watsonx AI and

Cloud 77
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Ardent Health Hospitals Disrupted After Ransomware Attack

Dark Reading

More than two dozen hospitals have been impacted by the breach and are diverting emergency care for patients to other healthcare facilities.

article thumbnail

UK and U.S. Develop Global Guidelines for AI Security

Hunton Privacy

On November 27, 2023, the UK government announced the first global guidelines to ensure the secure development of AI technology (the “Guidelines”), which were developed by the UK National Cyber Security Centre (“NCSC”) and the U.S. Cybersecurity and Infrastructure Security Agency (“CISA”), in cooperation with industry experts and other international agencies and ministries.

article thumbnail

Balancing Simplicity and Security in the Digital Experience

Dark Reading

New data shows consumer preferences for security in digital experiences and indicates ways businesses can best protect digital identity in today's digital world.

article thumbnail

UK and Republic of Korea Issue Warning about DPRK State-Linked Cyber Actors

Hunton Privacy

On November 23, 2023, the UK government’s National Cyber Security Centre (“NCSC”) and the Republic of Korea’s National Intelligence Service (“NIS”) issued a joint advisory detailing techniques and tactics used by cyber actors linked to the Democratic People’s Republic of Korea (“DPRK”) that are carrying out software supply chain attacks. The publication follows the recent announcement of a new Strategic Cyber Partnership between the UK and the Republic of Korea where the two nations have committ

Access 61
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Blazor State Management: Best Practices To Consider

Enterprise Software Blog

When we talk about Blazor, state is an essential part of any app that you build with a framework that includes user interaction. Consider a scenario where a user must log in to view sensitive data. However, because the state is not properly managed, they must log in again and again each time they reload the page. How likely are they to continue using the application in the future?

article thumbnail

HHS’ Office for Civil Rights Settles HIPAA Investigation of St. Joseph’s Medical Center for Disclosure of Patients’ Protected Health Information to a News Reporter

IG Guru

U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES Office for Civil Rights November 20, 2023 HHS’ Office for Civil Rights Settles HIPAA Investigation of St. Joseph’s Medical Center for Disclosure of Patients’ Protected Health Information to a News Reporter St. Joseph’s Medical Center provided a national media outlet access to COVID-19 patients’ protected health information Today, […] The post HHS’ Office for Civil Rights Settles HIPAA Investigation of St.

Access 75
article thumbnail

Angular 17 Control Flow: Elevate Your Development Experience

Enterprise Software Blog

I'm excited to share that you can enhance your Angular development experience within Ignite UI for Angular components by embracing the new block template syntax for optimized, built-in control flow. This powerful feature simplifies your code, improves type checking, reduces bundle size, and boosts performance. So now, let's dive into some code samples to see the syntax in action!