Wed.Nov 01, 2023

article thumbnail

Researcher Claims to Crack RSA-2048 With Quantum Computer

Data Breach Today

As Ed Gerck Readies Research Paper, Security Experts Say They Want to See Proof A scientist claims to have developed an inexpensive system for using quantum computing to crack RSA, which is the world's most commonly used public key algorithm. If true, this would be a breakthrough that comes years before experts predicted. Now, they're asking for proof.

Paper 364
article thumbnail

Thales Wins Big in 2023

Thales Cloud Protection & Licensing

Thales Wins Big in 2023 madhav Thu, 11/02/2023 - 05:09 Here at Thales, we are incredibly proud of what we do. Protecting our customers from cybersecurity threats brings us immense satisfaction, and being recognized for our efforts is both humbling and validating. 2023 has been a particularly good year for us; keep reading for a run-through of our most recent successes.

Cloud 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US to Set Up New AI Safety Institute

Data Breach Today

UK-US Will Partner on Monitoring Advanced AI Before Its Release The U.S. government will set up a dedicated artificial intelligence safety institute to lead cooperation among the public and private sectors to develop secure AI systems, said Secretary of Commerce Gina Raimondo. Raimondo is in the United Kingdom for the AI Safety Summit.

article thumbnail

News alert: AdviserCyber launches to help ‘RIAs’ meet SEC’s cybersecurity infrastructure rules

The Last Watchdog

Phoenix, Ariz. — Nov. 1, 2023 — AdviserCyber , a cybersecurity service provider for Registered Investment Advisers (RIAs) with $500M to $3B Assets Under Management (AUM) who must comply with the Securities and Exchange Commission (SEC) cybersecurity requirements, announced its formal launch today. In the last year alone, advisers and wealth managers in financial sectors have witnessed an 80% increase in cyber threats and intrusion activity, with investment advisers being particularly vulner

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Exterro Acquires Startup Divebell to Analyze Structured Data

Data Breach Today

Divebell Buy Will Help Exterro Handle Structured Data Without Big Ingestion Woes Exterro has purchased a data discovery vendor led by a GE and Symantec veteran to help organizations detect, measure and remediate risk around structured data. The deal will allow Exterro customers to analyze structured data without ingesting tons of information or putting a load on company systems.

Risk 269

More Trending

article thumbnail

DHS Says National Security at Risk as Key Authorities Expire

Data Breach Today

DHS Secretary Alejandro Mayorkas Urges Congress to Reauthorize Key Security Powers. U.S. Department of Homeland Security Secretary Alejandro Mayorkas urged Congress to take action to prevent loss of critical authorities for the Cybersecurity and Infrastructure Security Agency, warning of severe security risks for chemical facilities seen as attractive targets for terrorist attacks.

Risk 268
article thumbnail

Threat actors actively exploit F5 BIG-IP flaws CVE-2023-46747 and CVE-2023-46748

Security Affairs

Experts warn that threat actors started exploiting the critical flaw CVE-2023-46747 in F5 BIG-IP installs less than five days after PoC exploit disclosure. F5 this week warned customers about a critical security vulnerability, tracked as CVE-2023-46747 (CVSS 9.8), that impacts BIG-IP and could result in unauthenticated remote code execution. The vulnerability resides in the configuration utility component, it was reported by Michael Weber and Thomas Hendrickson of Praetorian on October 4, 2023

article thumbnail

Splunk Lays Off Another 7% of Workers Amid Purchase by Cisco

Data Breach Today

Second Round of Layoffs Comes 9 Months After Splunk Eliminated 325 Workers Globally Splunk has executed its second round of layoffs since February, axing 7% of its workforce weeks after Cisco announced plans for a $28 billion acquisition. Splunk will reduce its 8,000-person staff by 7% - or approximately 560 positions - with most of the job cuts taking place in the United States.

IT 263
article thumbnail

British Library suffers major outage due to cyberattack

Security Affairs

Last weekend, the British Library suffered a cyberattack that caused a major IT outage, impacting many of its services. The British Library is facing a major outage that impacts the website and many of its services following a cyber attack that took place on October 28. The British Library is the national library of the United Kingdom and one of the world’s largest libraries.

Libraries 115
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ensuring Privacy in AI Systems Is Critical, VP Harris Says

Data Breach Today

Kamala Harris Says Now Is the Moment to Lay Groundwork for the Future of AI U.S. Vice President Kamala Harris called on artificial intelligence developers to ensure consumer privacy and security. "History will show that this was the moment when we had the opportunity to lay the groundwork for the future of AI," Harris said.

article thumbnail

CISA adds two F5 BIG-IP flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

US CISA added two vulnerabilities, tracked as CVE-2023-46747 and CVE-2023-46748, in BIG-IP to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the vulnerabilities CVE-2023-46747 and CVE-2023-46748 in BIG-IP to its Known Exploited Vulnerabilities catalog. CISA has the two new vulnerabilities to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation.

IT 114
article thumbnail

AI Doom Not Imminent, Say Officials at UK Summit

Data Breach Today

AI Systems Don't Yet Pose Risk of Loss of Control, Say Attendees As day one of the U.K. AI Safety Summit draws to an end, attendees said fears over losing control over AI systems is a future worry, although they appeared to agree that securing AI is a pressing topic for today. The summit is set to conclude on Thursday.

Risk 252
article thumbnail

Exciting Announcements at HashiCorp’s Annual Conference

Daymark

HashiCorp recently held their annual conference, HashiConf 2023, in San Francisco (and virtually) to unveil some exciting enhancements to their suite of multi-cloud infrastructure automation software. Key themes revolved around infrastructure and security with an emphasis on how to use the cloud operating model to achieve operational cloud maturity and improve the developer experience while enabling platform teams to put controls in place to manage risk and cost.

Cloud 111
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Healthcare's Ransomware Attackers Are Addicted to Encryption

Data Breach Today

Extortionist Crypto-Locking Hackers Keep Hitting Healthcare Sector, Experts Report Once ransomware hackers get inside a healthcare sector organization's systems, three out of four attackers will also maliciously encrypt data, says security firm Sophos. Attackers successfully encrypted data in 75% of ransomware attacks on healthcare sector entities, researchers report.

article thumbnail

3 Ways to Close the Cybersecurity Skills Gap — Now

Dark Reading

The future of the cybersecurity workforce will rely less on long-led legacy education models and more on skills-now training.

article thumbnail

Why CISOs Should Pay Attention to SolarWinds SEC Allegations

Data Breach Today

Attorney Discusses Impact of Charges Against CISO Tim Brown in Wake of 2020 Breach The fallout from the SEC's charges of fraud and internal control failures against SolarWinds and its CISO has implications for the industry. Cordery Compliance attorney Jonathan Armstrong advises security leaders to "take heed and remember that the actions of today can determine your fate tomorrow.

article thumbnail

Atlassian Customers Should Patch Latest Critical Vuln Immediately

Dark Reading

Atlassian CISO warns Confluence Data Center and Server customers they're vulnerable to "significant data loss" if all on-premises versions aren't patched.

102
102
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The New Era of Social Media Looks as Bad for Privacy as the Last One

WIRED Threat Level

The slow-motion implosion of Elon Musk’s X has given rise to a slew of competitors, where privacy invasions that ran rampant over the past decade still largely persist.

Privacy 93
article thumbnail

Doing It Together: Detection and Incident Response with Your Cloud Provider

Dark Reading

Detection and incident response in a cloud environment can be a new challenge for security professionals who build their expertise before the cloud, and requires coordination between your organization’s internal teams and your cloud security provider’s security apparatus.

Cloud 94
article thumbnail

New Export Controls on Advanced Computing and Semiconductor Manufacturing: Five Key Takeaways

Data Matters

On October 25, 2023, the U.S. Department of Commerce Bureau of Industry and Security (BIS) published updated export controls on advanced computing items and semiconductor manufacturing equipment under the Export Administration Regulations (EAR). Specifically, BIS published two interim final rules that revise and expand on the restrictions implemented in the initial interim final rule issued on October 7, 2022 (October 7, 2022 rule). 1 The post New Export Controls on Advanced Computing and Semico

article thumbnail

Global AI Cybersecurity Agreement Signed At Turing's Bletchley Park

Dark Reading

Dozens of countries commit to collaborate on artificial intelligence cybersecurity, fittingly at the British home of the WWII codebreakers.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

29 Countries Reach Agreement On AI Risks and Opportunities

Hunton Privacy

On November 1, 2023, 29 nations, including the U.S., the UK, the EU and China (full list available here ), reached a ground-breaking agreement, known as the Bletchley Declaration. The Declaration sets forth a shared understanding of the opportunities and risks posed by AI and the need for governments to work together to meet the most significant challenges posed by the technology.

Risk 72
article thumbnail

More Than 100 Vulns in Microsoft 365 Tied to SketchUp 3D Library

Dark Reading

While Microsoft patched the issues in June, support for SketchUp appears to remain disabled in Microsoft 365.

article thumbnail

Where Can I Scan My Documents?

Record Nations

The transition to a paperless world is undeniable, and as a result, document scanning has become a daily need for many. Digitizing important documents efficiently has become more critical than ever. Whether it’s for work, school, or personal use, the question on many minds is, “Where can I scan my documents?” The answer lies in. Where Can I Scan My Documents?

IT 75
article thumbnail

It's Cheap to Exploit Software — and That's a Major Security Problem

Dark Reading

The solution? Follow in the footsteps of companies that have raised the cost of exploitation.

IT 99
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Outsourcing vs. insourcing customer communications

OpenText Information Management

It’s a dilemma faced by many organizations in the era of rising customer expectations: should you keep customer communications management (CCM) in-house or move to an outsourced model? What is outsourcing? Organizations often turn to outsourcing to fill gaps and drive value. Outsourcing is the business practice of hiring outside specialists to do specific tasks … The post Outsourcing vs. insourcing customer communications appeared first on OpenText Blogs.

article thumbnail

ISC2 Study: Economic Conditions Continue to Sandbag Cyber Hiring

Dark Reading

Nearly 1.5 million people work in cybersecurity in North America, but even with a growing gap in skilled specialists, they bear a higher chance of hiring freezes and layoffs.

article thumbnail

FTC amendment to Safeguards Rule

Data Protection Report

Under the Federal Trade Commission’s (“FTC”) new amendment to the Safeguards Rule (the “Amended Rule”), non-banking financial institutions will have to report certain data breaches and other security events to the agency. Requirements Approved on October 27, 2023 by a 3-0 vote by the Commission after a public comment period, the amendment requires non-banking financial institutions that are regulated by the FTC to report “notification events” the Commission as soon as possible, and no later than